• Title/Summary/Keyword: 제3자 피해

Search Result 83, Processing Time 0.032 seconds

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

Actual Analysis and Solution of Aquatic Leisure Activity Safety Accident Around Coast (연안역 수상레저활동 안전사고 실태분석 및 개선방안)

  • Jeong Jong-Seok
    • Journal of Navigation and Port Research
    • /
    • v.30 no.3 s.109
    • /
    • pp.247-251
    • /
    • 2006
  • By becoming 21st century which run be charactered as highly industrialized society which spreads diversification and individualization, there have been elevation of income level and increase of time for leisure activity by introducing 5 working days system. And this brings out increasing of aquatic leisure activity population and the contents of the leisure becomes very active. Static indoor activity which was the main current of the leisure activity in the past, however, it is now called for outdoor activity accompanied by the society growth and even expands towards that people get into action and experience by their own free will. With this point of view, the aquatic leisure run become a safe activity. But with a rapid growth of aquatic leisure activity, safety concerns become a serious problem. To prevent safety accident, training should be given, safety inspection and registration should be requested, and strong support of system is needed so users can have an insurance for safety accident. These complements are necessary for overall nourishment and management measure to charge in systematical safety for the users.

Studies on Diplosis mori Yokopama (mulberry shoot Gall midge) on mulberry tree (뽕나무 순집이 혹파리에 관한 연구)

  • 전대략;이영렬;조철호
    • Journal of Sericultural and Entomological Science
    • /
    • v.2
    • /
    • pp.49-61
    • /
    • 1962
  • The insect Diplosis mori Yokoyama is causing extensive destruction of mulberry trees in Korea with a resultant loss in silk production. This study was made to determine an effective method of control. Methods and Materials Used Preliminary studies were made to determine more exactly the life cycle of the insect. Based on this information, various control measures were tested, including the use of spray methods with BHC and control of larvae by tilling. Results Obtained 1. Life cycle studies (a) In the Suwon area, this-insect has 5 generations per year. The first starts in the later part of June and the final cycle ends in the later part of September. (b) The adult insects appear about 7: 00-8: 00 P.M. and live for 2-5 days. Females live in longer periods than the male. (c) Larvae lives inside the second and third stipules (A. B.) before mulberry leaf development. They cause extensive damage to the leaves at the point where they are attached to the stem. (d) Weather conditions considerably affect the life cycle. The pupa particularly are affected and not be able to change into the moth stage when there is a long period of no rain. (e) Larvae are large......0.3 to 2.0mm......and are milky-white immediately after hatching but turn to pinkish as the worm matures. The matured worm has a jumping ability up to 15-20cm. The worm burrows into the ground 1.5 to 3.0 cm before changing into the pupal stage. (f) The pupal stage usually lasts 7-8 days, in summer weather conditions and the pupa is surrounded with a coarse cocoon. (g) These insects, as a general rule, overwinter as pupae but sometimes as larvae. 2. Control measures (a) BHC dust applied on the ground seem most effective. It should be done 4-5 days after the worm has burrowed into the ground. For this control, it is recommended that 6kg of a 2% formation Tanbo(l0ares) be used. (b) For the effective spraying against the fly, it is recommended that a formulation of liquid BHC spray terials be used at the rate of 400-600 liters per Tanbo. (c) Tillage methods which provide a cover of soil 5cm or more in depth above infested areas will effect-maively prevent the emergence of the fly from the pupal stage. 3. Conclusions Methods of control against Diplosis mori Yokoyama can be tied more closely to the life cycle of the insect with more effective results. Further studies are needed to complete information on possible controls during or after hibernation. Economic studies on the cost of these control measures are also needed.

  • PDF

Attorney's Duty to Protect Personal Information (변호사의 개인정보 보호의무)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.1-10
    • /
    • 2014
  • In February 2014 Korean Bar Association has amended Professional Ethics Code as to stipulate attorney's duty to protect personal information. While existing Korean law and Professional Ethics Code has made attorney to keep client's confidential information, attorney's newly promulgated obligation has its meaning in that personal information of subject other than client is not protected through confidentiality rules, given that confidentiality obligation is interpreted to protect only client's information relating to representation. Moreover, duty to protect personal information deals with not only disclosure and use of information, which confidentiality rules is about, but also collection and retention process, access to and correction and care of information and even destruction of information. Amid unprecedented theft of personal data in several national banks and other serious leakage reported recently, this paper is going to contemplate the scope and application of the duty to protect personal information with hope to contribute to starting discussion on it.

A Study on the Countermeasures of Cyber Crimes Among Nations - Focusing on the Global Governance - (국가간 사이버범죄 대응체제 구축에 관한 연구 - 글로벌 거버넌스적 측면에서 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.307-318
    • /
    • 2005
  • Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. It was not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.

  • PDF

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

A Study on Japanese Disaster Relevant Regulations and NHK (일본의 재난방송 관련 법규와 NHK에 관한 연구)

  • Lee, Yeon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.212-215
    • /
    • 2019
  • 지난 4월4일 고성 산불로 사망자 2명과 부상자 1명, 가옥 500여 채, 삼림 1757ha가 불에 탔다. 강원 산불에 이어 영덕지진 등에서 늑장대응을 보여준 재난방송시스템에는 많은 국민들에게 실망감을 안겨주었다. 재난방송 주관방송사인 KBS는 물론, MBC, SBS의 경우도 재난방송시스템에 관련 된 측면에서 본다면 아직 이웃나라 인 일본에 비해서는 매우 열악한 형편이다. 그럼에도 불구하고 점점 대형화, 다발화 하는 재난발생에 대응하기 위해서는 국가적인 차원에서도 특단의 조치가 필요하다. 미국의 경우는 차세대 재난정보 전달체계인 IPAWS(Integrated Public Alert and Warning System)를 개발해 지상파뿐만 아니라, 케이블TV, SNS 등 다양한 매체를 통해 재난정보를 신속하게 전달하고 있다. 일본도 이와 유사한 재난경보전달시스템인 J-Alert를 개발해 2020년까지는 '재난 약자 제로(Zero)시대'를 목표로 구현하고 있다. 우리나라는 지난 아현동 KT 화재사건에서도 경험했듯이 통신이 먹통이 되는 통신블랙아웃도 경험했다. 따라서 대형재난발생 시는 신속한 재난경보전달시스템이 재난피해를 줄일 수 있는 가장 중요한 생명줄이 될 수 있다. 미국이나 일본의 경우는 재난방송전달시스템을 관련법령으로 제도화 하고 있다. 특히, 일본에는 재난에 관한 모법이라고 할 수 있는 (1)"재해대책기본법"이 있는데, 이는 재해로부터 국토, 국민의 생명과 재산을 보호하기 위한 기본법으로 규정되어 있다. 그 밖에도 (2)방송법 (3)대규모지진대책특별 조치법 (4)국민보호법 (5)소방조직법 (6)수해방지법 등으로 규정하고 있다. 과거 일본도 우리나라와 같이 대형 산불이 잦았으나 요즘은 소형 산불만 발생하는 추세다. 이는 NHK가 보유한 700여 대의 로봇카메라와 전 국토를 샅샅이 감시하는 CCTV 덕택이다. 또한, NHK 보도국의 '기상 재해센터'는 재난에 대비해 40여 명의 전문 인력이 24시간 대응체제를 갖추고 있다. 나아가 NHK는 전국 12개의 거점지역에 헬리콥터 15대를 배치하여 신속하게 취재하고 있다. 이 뿐만 아니라, 46개의 지역방송국을 7개의 거점방송국으로 분할하여, 거점방송국마다 40여명의 카메라맨을 상주시켜 언제든지 재난을 취재할 수 있도록 하고 있다. 세계 각국에서 사용하고 있는 방송 주파수는 공공재(公共材)다. 국제전기통신연합(ITU : International Telecommunication Union)으로부터 주파수를 할당받아 사용하고 있기 때문에 주파수에 관한 사용 권한은 각국의 국민 모두에게 있다. 그러나 효과적인 주파수 활용을 전제로 정부가 일정한 자격을 갖춘 방송사업자에게 일시적으로 주파수 사용권을 위임하고 있다. 따라서 일본 정부도 국가적인 위기나 대형 재난발생으로 국민들의 생명과 재산이 위협받고 있을 때에는 공공재인 주파수를 즉시 재난방송으로 사용할 수 있도록 <재해대책기본법 제6조>와 방송법 제108조에 규정하고 있다.

  • PDF

울진 3&4호기 CFMS 화면설계의 인간공학적 검토

  • 정광태;이용희
    • Proceedings of the ESK Conference
    • /
    • 1996.10a
    • /
    • pp.171-178
    • /
    • 1996
  • CFMS(Critical Function Monitoring System)는 원자력발전소의 비상시에 운전원에게 보조장보를 제공하는 지원시스템이다. 본 연구에서는 원자력발전소 울진 3&4호기 CFMS의 화면설계에 대한 인간 공학적 검토를 수행하였다. CFMS에 대한 규제 및 법규를 만족시키는 것과 CFMS 화면설계가 운전원에게 편의성을 제공할 수 있는지에 대한 인간공학적 타당성 평가의 사례를 제시하고자 한다. 본 연구에서는 인간공학적 검토의 공식적인 체계를 설정하기 위하여, CFMS 설계에서 필요한 인간공학 업무를 규정하고 수행절차를 기술하는 인간공학 프로그램 계획 (Human Factors Engineering Program Plan; HFEPP)과 설계평가의 방법과 업무 내용을 기술하는 확인 및 검증 프로그램 계획(Human Factors Engineerign Verification and Validation Plan; HFE V&V Plan)을 개발하였다. CFMS 설계에 대한 인간공학적 확인 및 검증을 위하여 CFMS의 정보 가용성 (information availability)과 화면 적합성 (display suitability)을 확인하였다. 정보 가용성의 확인은 CFMS 설계 요건서에서 정의된 정보를 중심으로 한 필요정보의 목록과 CFMS 화면상에서 제공되는 정보의 목록을 비교함으로써 수행되었다. 화면 적합성의 확인은 검토항목 선정, 검토양식 개발, 전문가 검토, 실험검토 등의 과정을 통하여 수행되었다. 관련 규제 문건으로 부터 규제요건상 만족해야할 최소한의 검토항목을 선정하고 검토양식을 개발하였으며, 인간공학 전문가들의 주관적 평가를 통하 여 수행되었다. 또한 화면의 조작방식에 대한 상세검토를 수행하였다. 검토결과로부터 발견된 문제점들은 HED (Human Engineerign Discrepance) 목록으로 정리하여 설계에 반영하도록 하였다.로 마음의 안정감, 몸의 긴장 이완에 따른 건강 상태 유지, 수업 집중도 향상 등이 나타났다. 위와 같은 종합 적 분석 결과에 따라, 본 연구는 제조 현장의 생산성 향상 및 품질 향상과 연계하여 작업자의 작업 집중도 향상, 작업자의 육체적, 심리적 변화에 따른 생산성 및 품질 향상 변화 정도 등의 산업공학(인간공학) 제 분야의 여러 측면에서 연구 및 적용이 가능하리라 사료된다.l, 시험군:25.90$\pm$7.16mg/d1, 47% 감소)를 나타내었으며, 시험군의 AUC는 대조군에 비해 39% 감소하였고, 혈중 아세트알데히드의 농도는 투여 60분후 시험군(3.96$\pm$0.07nmo1/$m\ell$)이 대조군(6.45$\pm$0,64nmo1/$m\ell$)에 비해 유의성 있는 감소(39%)를 나타내었으며, 시험군의 AUC는 대조군에 비해 48% 감소하였다 한편, 시험관내 에탄올 대사 효소에 대한 바이오짐의 효과를 검색해본 결과 바이오짐(2.0 $\mu\textrm{g}$/assay)에 의해 Aldehyde dehydrogenase(1.5unit/assay)의 활성이 14% 증가되었다. 본 연구의 결과로 볼 때, 비지니스 및 바이오짐은 음주 후 상승된 혈중 에탄을 농도 및 아세트알데히드의 농도를 현저히 감소시키는 효과가 있었다.량 보호 관리, 도시 소공원 개발, 역사 문화 공원 조성, 하천 공간 복원, 공원 시설 기능 개선, 이용 프로그램 개발, 공원 관리 개선, 환경 피해 녹지의 회복, 도시 환경 림 조성, 녹지 기능 증진, 도시 자연 경관 보전, 공원 녹지체계 구성, 공원 녹지 공급 균형, 주변 환경 녹화, 가로 녹화의 17개 시책을 제안하였다. 이러한 정책사업의 원활한 추진을 위해서는 기존의 관주도의 일방적인 공원 녹지 행정이 아닌 시민의 참여를 통

  • PDF

The Meaning and the Legislative Suggestion about Data Manipulation of Pharmaceutical Companies in the Aspect of the Medicine Approval System (의약품 품목허가 제도에서 제약기업 자료조작의 의미와 입법 개선 방안-대법원 2008. 11. 13. 선고 2008두8628 판결을 중심으로-)

  • Park, Sungmin;Shin, Youngkee
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.59-88
    • /
    • 2021
  • The National Assembly of the Republic of Korea recently enacted laws to fortify sanctions about data manipulation of pharmaceutical companies. The medicine approval system is the result of legislative efforts to prevent accidents that caused damages to patients' life and health. The medicine approval system is based on the trust that the data submitted by pharmaceutical companies is not manipulated. The Supreme Court of Korea clarified that strict standard shoud be required to secure the medicine safety in Supreme Court Decision 2008Du8628 decided November 13, 2008. We agree. This paper suggest legislation to weaken the economic incentives for pharmaceutical companies to choose data manipulation by minimizing the expected profit. In addition to revoking the marketing authorization of the medicine, the 'unfair' profits the pharmaceutical company has earned must be recovered. In addition, in order to increase the possibility to discover data manipulation, it is necessary to strengthen the review capacity and to activate the whistle-blowing.

An Analysis of Terrorism against Korea to Overseas and its Implications - Focusing on the companies advancing to overseas - (한국을 대상으로 한 국제테러리즘의 분석과 시사점 - 해외진출기업을 중심으로 -)

  • Chang, Suk-Heon;Lee, Dae-Sung
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.153-179
    • /
    • 2011
  • Korea has been a victim of State supporting terrorism by North Korea even before international society realize the terrorism threats because of 9.11 in US. However, state supporting terrorism against South Korea by North Korea went along with East/West Cold War System by US and the Soviet Union. It is because socialism that Kim Il-sung who established a separate government in North Korea with the political, economic, social and military support of the Soviet Union selected as his political ideology justifies terrorism as the tool to complete the proletariat revolution. North Korea's state supporting terrorism is being operated systematically and efficiently by military of North Korea. It gives big worries to international society not only by performing terrorism against Korea but also by dispatching terrorists and exporting terrorism strategies to the third world countries. In this situation, terrorism against Korea has met a new transition point at 9${\cdot}$11 in US. As South Korea is confronting North Korea and the war has not ended but suspended, the alliance between US and Korea is more important than anything else. Because of this Korea decided to support the anti-terrorism wars against Afghanistan and Iraq of US and other western countries and send military force there. The preface of the anti-terrorism war has begun as such. On October 7, 2001, US and UK started to attack Afghanistan and Taleban government in Afghanistan was dethroned on December 7, 2001. US and western countries started a war against Iraq on March 20, 2003. On April 9, 2003 Baghdad, the capital of Iraq fell, and Saddam Hussein al-Majid al-Awja government was expelled. During the process, the terrorism threat against South Korea has expanded to Arab terrorists and terrorism organizations as well as North Korea. Consequently, although Korean government, scholars and working level public servants made discussions and tried to seek countermeasures, the damages are extending. Accordingly, terrorism against Korean companies in overseas after 9${\cdot}$11 were analyzed focusing on Nation, Region, Victimology, and Weapons used for the attacks. Especially, the trend of terrorism against the Korean companies in overseas was discussed by classifying them chronologically such as initiation and termination of anti-terrorism wars against Afghanistan and Iraq, and from the execution of Iraqi President, Saddam Hussein al-Majid al-Awja to December 2010. Through this, possible terrorism incidents after the execution of Osama bin Laden, the leader of Al-Qaeda, on May 2, 2011 were projected and proposals were made for the countermeasures.

  • PDF