• Title/Summary/Keyword: Compliance and verification mechanism

Search Result 7, Processing Time 0.025 seconds

Compliance and Verification Mechanism of STCW'95 and Its Implementation in China

  • Hao, Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2000.06a
    • /
    • pp.33-40
    • /
    • 2000
  • To improve the compliance and verification mechanism is one of the important reasons to revise the STCW Convention. The mechanism includes the assessment of competence, control, precision of description of competence, quality standard system, communication of information and so on. Chinese seaman's education an training institute & the organization of evaluating and issuing certificates should enhance realizing the importance of compliance and verification mechanism and carry out it down to earth. The current work that should be reinforced is to control the qualified evaluation effectively.

  • PDF

A Study on Web Accessibility Status of Metropolitan and Provincial Offices of Education from the Universal Design View (유니버설 디자인 관점에서 본 국내 시도 교육청의 웹 접근성 실태에 관한 연구)

  • Seo, Mi-Ra
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.405-410
    • /
    • 2013
  • Due to the enforcement of a law about disability nondiscrimination and rights protection in 2008, the web accessibility has become an obligation. According to a survey targeting public sectors such as central administrative organization, local autonomous entity and etc., the level of compliance with web accessibility appeared to be improved every year. However, such legal mechanism focuses on the improvement of convenience for disabled people only and does not meet the concept of universal design that aims to satisfy every user. Therefore, this study verifies the status of web accessibility on 17 homepages of metropolitan and provincial offices of education. The status survey was carried out with 3 steps: 1) Verification through automated verification tool by National Information Society Agency, 2) Verification through Web Content Accessibility Guidelines(UD-WCAG) that adopts the concept of universal design, 3) Verification by using screen reader. Compared to the verification through automated verification tool, the overall compliance rate verified through UD-WCAG was reported lower.

The Impact of IS Policy and Sanction Perceptions on Compliance Intention through Justice: The Role of Justice Sensitivity (정보보안 정책 및 제재 인식이 공정성을 통해 준수 의도에 미치는 영향: 공정 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.337-348
    • /
    • 2023
  • As protecting organizations' information assets affects their substantiality, they are increasing their investments in policies, regulations, and technologies for systematic information asset management and protection. This study confirms the impact on information security(IS) compliance from the perspective of employees who apply IS policies to actual work. In particular, this study identifies mechanisms linked to IS policy awareness, sanction, justice, and IS compliance from the perspective of expanding deterrence theory. We applied 316 samples obtained from workers of organizations that applied IS policies and regulations to work and verified the relationship between mechanisms by using AMOS and SPSS packages. As a result of the verification, IS policy awareness had a positive effect on organization justice and compliance intention through the severity and clarity of sanctions. Individual justice sensitivity had a moderating effect on the cause and outcome of justice. The sanction-related mechanism presented in this study provides strategic implications for organizations that require active IS activities by insiders.

A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention (조직의 정보보안 목표 설정과 공정성이 보안정책 준수의도에 미치는 영향)

  • Hwang, In-Ho;Kim, Seung-Wook
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.117-126
    • /
    • 2018
  • The threat to information security is growing globally. To this, organizations are increasing the weight of adapting and operating the more specialized information security policy and system. Information security requires participation from the employees who execute the security system and policy, and to increase the level of organization's internal security, requires organization's systematic support to improve employees' information security compliance intention. This research finds the mechanism for improving employee's information security compliance intention by applying justice theory and goal setting theory in information security. We use structural equation modeling to verify the research hypothesis, and conducted a survey on the employees of organization with information security policy. In other words, this research performs verification of the research model based hypothesis which claims that security policy goal setting has positive influence on employee's level of security related justice recognition, and claims that justice has positive influence on compliance intention. The object of study is the employees of the organization that adapts information security policy, and 383 valid samples were collected via survey. Structural equation modeling was performed to verify the research hypothesis. The result shows that security policy goal factor (goal difficulty, goal specificity) improves employee's security related justice recognition, and that security related justice (distribution, process, and information justice) has positive influence on compliance intention. The result suggests the strategic approach directions for improving employees' compliance intention on organization's security policy.

The Case Studies of Artificial Intelligence Technology for apply at The Sewage Treatment Plant (국내 하수처리시설에 인공지능기술 적용을 위한 사례 연구)

  • Kim, Taewoo;Lee, Hosik
    • Journal of Korean Society on Water Environment
    • /
    • v.35 no.4
    • /
    • pp.370-378
    • /
    • 2019
  • In the recent years, various studies have presented stable and economic methods for increased regulations and compliance in sewage treatment plants. In some sewage treatment plants, the effluent concentration exceeded the regulations, or the effluent concentration was manipulated. This indicates that the process is currently inefficient to operate and control sewage treatment plants. The operation and control method of sewage treatment plant is mathematically dealing with a physical and chemical mechanism for the anticipated situation during operation. In addition, there are some limitations, such as situations that are different from the actual sewage treatment plant. Therefore, it is necessary to find a more stable and economical way to enhance the operational and control method. AI (Artificial Intelligence) technology is selected among various methods. There are very few cases of applying and utilizing AI technology in domestic sewage treatment plants. In addition, it failed to define specific definitions of applying AI technologies. The purpose of this study is to present the application of AI technology to domestic sewage treatment plants by comparing and analyzing various cases. This study presented the AI technology algorithm system, verification method, data collection, energy and operating costs as methods of applying AI technology.

Design and Implementation of an Automated Privacy Protection System over TPM and File Virtualization (TPS: TPM 및 파일 가상화를 통한 개인정보보호 자동화 시스템 디자인 및 구현)

  • Jeong, Hye-Lim;Ahn, Sung-Kyu;Kim, Mun Sung;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.7-17
    • /
    • 2017
  • In this paper, we propose the TPS (TPM-enhanced Privacy Protection System) which is an automated privacy protection system enhanced with a TPM (Trusted Platform Module). The TPS detects documents including personal information by periodic scanning the disk of clients at regular intervals and encrypts them. Hence, system manages the encrypted documents in the server. In particular, the security of TPS was greatly enhanced by limiting the access of documents including the personal information with regard to the client in an abnormal state through the TPM-based platform verification mechanism of the client system. In addition, we proposed and implemented a VTF (Virtual Trusted File) interface to provide users with the almost identical user interface as general document access even though documents containing personal information are encrypted and stored on the remote server. Consequently, the TPS automates the compliance of the personal information protection acts without additional users' interventions.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF