• Title/Summary/Keyword: 침해사례

Search Result 266, Processing Time 0.032 seconds

A Study on Privacy Influencing the Continuous Intention to Use in Closed-Type SNS: Focusing on BAND Users (폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구: 밴드 사용자를 중심으로)

  • Lim, Byungha;Kang, Dongwon
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.191-214
    • /
    • 2014
  • In this study, based on Privacy Calculus Model, we study whether users' intention of continuous use of closed-type SNS is affected by information privacy concern. In addition, we propose a model that studies if the major factors of the intention of continuous use which are trust, satisfaction and benefits could control the information privacy concern's effect on the intention of use. As a result, companies have to consider protecting the psychological privacy and information privacy of the individual when they design SNS.

A Study on the Establishment of Anti-Drone Concept and Effective Response System (안티드론 개념 정립 및 효과적인 대응체계 수립에 관한 연구)

  • Lee, Donghyuk;Kang, Wook
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.9-31
    • /
    • 2019
  • Due to the development of technology and popularization of drone, the so-called "dirty drone" that exploits drones for crimes and terrorism has become a social problem, and it is time to seriously consider the "revenge of drones." Indeed, the cases of threats posed by drones are expanding not only to threats to ground facilities, but also to aviation safety threats, more recently to large-scale events, demonstrations and crimes targeting specific personnel, and terrorism. This research clearly defined the concept of anti-drone when it emerged as a new type of social safety threat as it was abused in crime and terrorism, while response to it was not enough yet. Through this process, it was intended to present an effective anti-drones system. We analyzed the major controversial elements of anti-drone, and defined them as "comprehensive response activities at the legal, institutional and technical levels performed by law enforcement agencies, related technology and industrial entities in a way that prevents, detects, and blocks acts that violate public well-being and order, such as crimes and terrorism caused by the drones." To effectively respond to dirty drones, the authority of law enforcement agencies and the enactment of relevant laws were proposed. In the future, a comprehensive and systematic follow-up study of the anti system should be conducted.

A Study on Economic Evaluation of Beneficiary Pays Principle in Water Resource Management - The Case of Namyangju in Korea - (수자원관리 부문에서 수혜자부담원칙 경제적 평가에 관한 연구 - 남양주시 사례분석 -)

  • Yoon, Jaehyun
    • Journal of Environmental Impact Assessment
    • /
    • v.23 no.5
    • /
    • pp.323-336
    • /
    • 2014
  • Using hedonic price method, this paper analyzes the impact of restriction for water quality protection on property value with the officially announced price of reference land in the city of Namyangju in 2012 to evaluate Water Use Fee, based on beneficiary pays principle, levied on the downstream area of the Han River in Korea. The results from the regression analyses of the models used show that the double-log model is the preferred model in the case of Namyangju. Using the double-log model, the total compensation for the city of Namyangju is estimated to be 8.6 trillion won with 95% confidence interval between 4.4 trillion and 12.4 trillion won. Under the perpetuity compensation scheme at the discount rate of 10%, the estimated annual compensation is 0.9 trillion won with 95% confidence interval between 0.4 trillion and 1.2 trillion won. This is more than Water Use Fee collected in 2012 for the Han River, which is approximately 0.5 trillion won. Considering the size of the restricted area of the Paldang area, which is more than 18 times of that of Namyangju, the rate of Water Use Fee, which is based on beneficiary pays principle and imposed on the residents of the downstream area, needs to be increased to sufficiently compensate the economic loss caused to the upstream areas of the Han River in Korea.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

A Study on the Human Rights Sensitivity of Employees in the Vagabond Facilities (부랑인복지시설 종사자들의 인권민감성에 관한 연구)

  • Jung, Sun-Young;Kong, Sang-Gil;Im, Eun-Kyung;Chun, Duk-Hee;Oh, Young-Rim
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.263-289
    • /
    • 2010
  • This study did by purpose to be utilized to basic data for elevation of human rights consciousness of homeless facilities employees through examining their human rights consciousness by investigating human rights sensitivity that can grasp degree of human rights consciousness of homeless facilities employees. The human rights sensitivity of 390 homeless facilities employees who are working at 38 facilities around the whole country is compared and investigated. As a result, human rights sensitivity of employees displayed very low score by average 64.55 points in total score 150 points. Human rights sensitivity academic career of employees was shown meaningful difference, and human rights consciousness of substantial administrator is appeared very low in human rights sensitivity by duties. According to the existence and nonexistence of human rights education at the homeless facilities, the employs who had got human rights education shows higher human rights sensitivity than the employs who had not go human rights education. Therefore, regular program that can enforce human rights education Collectively as a formal curriculum in homeless facilities should be established and it's proposed to develop practical and efficient human rights education manual case by case related with the violation of human rights.

  • PDF

A Study on the Characteristics of lawsuits between the Freedom of the Press and Individual Rights over the Investigative Reporting Program (TV탐사보도 프로그램의 법적분쟁에 나타난 특성 연구)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.29
    • /
    • pp.233-269
    • /
    • 2005
  • The purpose of the study is to explore the characteristics of lawsuits against investigative reporting programs of the broadcast media. This study proposed three research questions: (1) what were the characteristics of court derisions on the investigative reporting programs? (2) what were the reasonings on which judges rely in the lawsuits for a right of reply? (3) what were the critical issues and how the libel laws were applied in balancing between the freedom of the press and the protection of individual rights. To answer these questions, the study employed quantitative and qualitative methods analysing 35 related cases. This study revealed that investigative reporting programs must deal with the Issues of 'public figures' and 'matters of public concern' to be protected under the freedom of the press. The study also found that the broadcast media must prove legitimate public interests and the truth of the facts to prevail in a case. In 1999, the Constitutional Court of Korea held that pubic figures in libel cases must be regarded differently from private figures. In accordance with the decision, the Supreme Court has applied differing criteria for public figures in libel cases. However, courts have not set a clear definition of the public figure yet. To advocate the freedom of the press, as the results of this study indicate, TV producers and journalists should behave lawfully in the course of newsgathering and provide the opportunities of reply for their news sources.

  • PDF

Narratives and Emotions on Immigrant Women Analyzing Comments from the Agora Internet Community(Daum Portal Site) (이주여성에 관한 혐오 감정 연구 다음사이트 '아고라' 담론을 중심으로)

  • Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.75
    • /
    • pp.43-79
    • /
    • 2016
  • An increase in the number of immigrants to Korea since the late 1980s' has signified the proliferation of globalization and global capitalism. In Korea, most married immigrants are women, as the culture emphasizes patrilineage and the stability of the institution of marriage, particularly in rural areas. Immigrant women have experienced dual ordeals. The Aogra Internet community in Korea has been one of the most representative sites that has shown the power of communities in cyberspace since 2002, leading the discussion of social issues and deliberative democracy both online and offline. This paper analyzed Koreans' writings (such as long comments) on immigrant women in the Agora community. The analysis revealed the following results: first, immigrant women were referred to using terms related to prostitution, with excessive expression of disgust, which is called a "narrative of identity." Second, anti-multiculturalists called Korean men victims of married immigrant women and expressed hatred toward immigrant women, which is called a "narrative of sacrifice." Third, anti-multiculturalists justified their emotions as just resentment based on ideas of justice, equality, and patriotism, concealing the emotion of disgust, which is called the "narrative of justice, equality." Fourth, antimulticulturalists played roles to spread the emotion of disgust, by repeatedly referring to international marriage fraud and immigrant workers' crimes, which is called "narrative of crime." Fifth, some positive writings on immigrant women were based on empathy(a concept defined in this context by Martha Nussbaum), but they can be analyzed as narratives encouraging cultural integration through the perspective of orientalism. Therefore, comments on immigrant women in the Agora represent a "catch-22" dilemma. To deal with conflicts arising from disgust and violations of human rights, civic education focusing on humanism is needed in this multicultural era.

  • PDF

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Patent Trend and Characteristics of Major Companies in the Field of Seismic Nodal System (탄성파 탐사 무선 수진기 특허동향 및 주요 기업의 기술 분석)

  • Park, Jung Kyu
    • Journal of the Korean Society of Mineral and Energy Resources Engineers
    • /
    • v.55 no.6
    • /
    • pp.635-648
    • /
    • 2018
  • This study analyzed patent trends of seismic nodal systems and the technical characteristics of core patents of three major companies, including Fairfield, Sercel, and Wireless Seismic, to examine the focus of technology development of each company. From the analysis, the patent application growth rate of seismic nodal systems has steadily increased since early to mid-2000s and has recently shown a higher growth rate. Over the same period, the patent application growth rate of the three major companies examined was higher than that of the global trend, and patent infringement cases was also examined to evaluate market competition in this field. Analysis of the technical characteristics of the three companies' 33 core patents showed that they are generally focused on seismic signal detection. Sub-technologies included improved reliability of data acquisition, data transmission efficiency, and overall operating of the seismic nodal system. New entrants in field of technology development or manufacturing of seismic nodal systems where the market is growing must closely analyze the contents of major companies' products and patents to prevent possible patent disputes or duplicate research.