• Title/Summary/Keyword: 침해

Search Result 2,145, Processing Time 0.03 seconds

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

A Study on the first inventor defense in the US patent law (미국에서의 선발명자 항변에 관한 연구)

  • Chang, Eun-Ik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1319-1336
    • /
    • 2006
  • The successive round of talks oil Korea-USA Free Trade Agreement (FTA) has continued, and it also has the Intellectual property(IPR) unit. Until now, tile one of most disputing concerns in IPR unit through talks is the limitation of compulsory license of claimed invention. The US is urging to establish a safeguard for IPR, as similar measure of the US, to protecting the profit of the US enterprises through these on-going talks, it is more likely expected to take the offensive about infringement of the patent seriously. Based on the current circumstances, the provision strategy study is needed to obtain Korea inventors the first inventor defense under the US patent law system as well as understand the current Korea's patent law and its revision against that in the US. In patent Law, both nations with first to file system and first to invent system permit a prior user of an invention to continue to use the invention notwithstanding its subsequent patenting by another under being subject to certain qualifications and limitations, even though a patent by a later inventor is granted. Normally, the first inventor defense has been used to compensate the drawbacks of the first to file system. The US patent Law, however, adopting the first to invent system admits the first inventor defense. Therefore, pursuing counteract provision under consideration with Korean patent Law system and research environment along with investigating the reason why the US adopted its patent law system, the scope of right, and the new reform of Act. 2005 of the institute, which promotes the first Korean inventor to possess the defense right of the US, provides certain preparations for Korean companies against the expected offensive from the US ones under the US patent Law system.

  • PDF

A Study on Imposing Contribution in the Compensation for Uncontrollable Medical Malpractice during Delivery (분만관련 불가항력적 의료사고 보상제도에 있어 분담금부과에 관한 연구 -헌법재판소 2018. 4. 26. 선고 2015헌가13 사건을 중심으로-)

  • Beom, Kyung Chul
    • The Korean Society of Law and Medicine
    • /
    • v.19 no.2
    • /
    • pp.139-171
    • /
    • 2018
  • The 「Act on Remedies for Injuries from Medical Malpractice and Mediation of Medical Disputes」(hereinafter referred to as 'the Act on Mediation of Medical Disputes') provides that the state should compensate the victims of medical accidents occurred irresistibly in childbirth despite that health and medical service personnel fulfilled their duty of care for their damage within the range of its budget(Article 46 of the Act on Mediation of Medical Disputes). Given that victims of medical accidents could expect demage recovery only through lawsuits thus far, this act can be said to be a groundbreaking act. However, However, as 30% of the costs for such medical accident compensation projects are borne by those who have records of childbirth among the founders of health and medical institutions (Article 21 of the Act on Mediation of Medical Disputes), there has been a question about whether doctors are held responsible despite that the accidents such as the deaths of mothers and newborn babies occurred irresistibly without doctors' fault. However, recently, the Constitutional Court ruled that 'the range of founders of health and medical institutions' and 'share ratios of finances for compensation' in Article 46 (3) of the Act on Mediation of Medical Disputes' related to the imposition of the share of costs are institutional (Constitutional Court ruling dated April 26, 2018, 2015Heonga13, hereinafter referred to as 'the ruling in the case'). Although the ruling in the case was made based on only the principle of statutory reservation and the principle of ban on comprehensive authorization, this paper added a practical judgment. This paper proved that the share of costs in this case has the nature of burden charges in pursuit of study and does not infringe on the property rights of the founders of health medical institutions even in light of the principle of proportionality because there is a legitimate reason for imposing the burden charge. The imposition of the share of costs in the system for compensation for medical accidents occurred irresistibly is against the principle of liability with fault in part. However, the medical accident compensation projects are rational a national policy for the victims of medical accidents and the medical world clearly gains some benefits from the effect to terminate medical disputes. The expansion of finances for compensation through the payments of the share of costs will reduce the suffering and misunderstanding of victims of medical accidents occurred in the process of childbirth and will be very helpful to the construction of stable treatment environments of medical workers by quickly establishing the medical accident compensation projects as such.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on Recognition of Foreign Judgements Obtained by Fraud (사기에 의하여 취득한 외국재판의 승인에 관한 연구)

  • Lee, Hun-Mook
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.553-591
    • /
    • 2017
  • This article discussed whether so-called 'foreign judgments obtained by fraud' is in breach of public policy provided in Article 217(1)(3) of Civil Procedure Act and, if so, what the specific requirements could be. The summary of the conclusion is as follows. The 'foreign judgments obtained by fraud' is against the municipal procedural public policy and then shall not be recognized. In this regard one more question comes up whether reviewing if 'foreign judgments obtained by fraud' is in breach of the municipal procedural public policy is allowed in consideration of the principle of prohibition of $r{\acute{e}}vision$ au fond. Since the principle is applied entirely in the course of the above reviewing, it is allowed only when it does not breach the principle. The two instances that the reviewing is allowed are where the defendant was not able to produce evidences of fraud during foreign procedures and where the defendant's claim of fraud without evidences was rejected by the foreign court and then evidences of fraud were found after the foreign procedure was completed. On the other hand, the specific requirements for 'foreign judgments obtained by fraud' to be against public policy are following four requirements based on principle of strict interpretation of public policy. (1) plaintiff's intention to fraud, (2) preventing the defendant from being involved in the procedure by fraud or cheating the foreign court using manipulated evidences, (3) the defendant could not present himself in the foreign court procedure due to the plaintiff's extraneous fraud or the foreign court decided wrongly due to intrinsic fraud, and (4) defendant's fundamental procedural rights were breached to the extent that recognizing the effect of foreign judgments was against justice defendant's fundamental procedural rights. These results differ from the Supreme Court 2004. 10. 28. ruling 2002da74213 in many aspects. Most of all, in my opinion there is no need to distinguish between intrinsic fraud and extraneous fraud and reviewing 'foreign judgments obtained by fraud' is not in conflict with the principle of prohibition of $r{\acute{e}}vision$ au fond but the both may coexist. In this regard I expect the variation of the Supreme Court's position and hope to contribute to academia and practitioners.

Improvement of Personal Information Protection Laws in the era of the 4th industrial revolution (4차 산업혁명 시대의 개인정보보호법제 개선방안)

  • Choi, Kyoung-jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.177-211
    • /
    • 2017
  • In the course of the emergence and development of new ICT technologies and services such as Big Data, Internet of Things and Artificial Intelligence, the future will change by these new innovations in the Fourth Industrial Revolution. The future of this fourth industrial revolution will change and our future will be data-based society or economy. Since there is personal information at the center of it, the development of the economy through the utilization of personal information will depend on how to make the personal information protection laws. In Korea, which is trying to lead the 4th industrial revolution, it is a legal interest that can not give up the use of personal information, and also it is an important legal benefit that can not give up the personal interests of individuals who want to protect from personal information. Therefore, it is necessary to change the law on personal information protection in a rational way to harmonize the two. In this regard, this article discusses the problems of duplication and incompatibility of the personal information protection law, the scope of application of the personal information protection law and the uncertainty of the judgment standard, the lack of flexibility responding to the demand for the use of reasonable personal information, And there is a problem of reverse discrimination against domestic area compared to the regulated blind spot in foreign countries. In order to solve these problems and to improve the legislation of personal information protection in the era of the fourth industrial revolution, we proposed to consider both personal information protection and safe use by improving the purpose and regulation direction of the personal information protection law. The balance and harmony between the systematical maintenance of the personal information protection legislation and laws and regulations were also set as important directions. It is pointed out that the establishment of rational judgment criteria and the legislative review to clarify it are necessary for the constantly controversial personal information definition regulation and the method of allowing anonymization information as the intermediate domain. In addition to the legislative review for the legitimate and non-invasive use of personal information, there is a need to improve the collective consent system for collecting personal information to differentiate the subject and to improve the legislation to ensure the effectiveness of the regulation on the movement of personal information between countries. In addition to the issues discussed in this article, there may be a number of challenges, but overall, the protection and use of personal information should be harmonized while maintaining the direction indicated above.

Mediating Effect of Opportunity Recognition Among Entrepreneurial Alertness, Mentoring, & Number of Mentoring on New Ventures' Performance (기업가적 기민성과 멘토링 및 멘토링 횟수와 기업성과 관계에서 기회인지의 매개효과 영향)

  • Park, Mi-Jung;Lee, Seon-Ho;Hwangbo, Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.4
    • /
    • pp.1-24
    • /
    • 2021
  • The Korean government is currently expanding the business startup incubator support program and funds for new ventures with innovative technology in order to spread the second venture boom. However, despite the fact that entrepreneurial education and mentoring that entrepreneurs should have are important parts for the sustainable growth of the startup, some companies selected for government support programs are reluctant to participate in programs such as entrepreneurship education and mentoring for the sole purpose of funding commercialization. This research addressed the effects of entrepreneurial alertness with opportunity awareness as its medium and the small business mentoring service along with the number of times the mentoring has taken place, on the corporate performances. The results of empirical research are as follow: the first one is that scanning-search and evaluation-judgment can influence a company's performance (financial, non-financial) through opportunity recognition, with the exception of association-connection, which is a sub-factor of entrepreneurial alertness. Secondly, it was found to affect a company's financial and non-financial performance through opportunity recognition for financing mentoring, technical support mentoring, and management support mentoring. Thirdly, it was found that the number of mentoring also affects the financial and non-financial performance of a company through opportunity recognition. The implications of this study are that it should be revisited that program managers consider rooms that do not violate the startup founder's strategic decision-making opportunities when designing and operating the program as entrepreneurial alertness sub-factor association-connection does not affect corporate performance through opportunity recognition. This study also emphasizes the need for customized mentoring to meet the outcome goals of each startup, as it has been empirically clarified that the mentoring provided to the startup by the government's support is important. The contribution of this research is that entrepreneurial alertness and opportunity recognition that are treated as important components in research for entrepreneurship, and the factors of mentoring and mentoring frequency that are recognized as important elements in the practical aspect of startup business are clarified theoretically and empirically as an influential factor in corporate performance. And this study also provide a rationale for the startup business support agency supplying mentoring.