• Title/Summary/Keyword: Concept of Protection

Search Result 528, Processing Time 0.028 seconds

A Comparison & Analysis of Electronic Commerce of Korea's FTA (한국의 FTA전자상거래규정 비교·분석)

  • Kim, Yun-keun;Park, Bok-Jae
    • International Commerce and Information Review
    • /
    • v.19 no.2
    • /
    • pp.25-44
    • /
    • 2017
  • Though electronic commerce has grown rapidly in international trade, there is no basic consensus for its concept and rule applied. So WTO has done practice of not imposing customs duties on digital contents and been researching overall on electronic commerce through Work Program while many countries of the world attempt to obtain their interests by stipulating chapter of electronic commerce in their FTAs. This paper has compared and analysed chapter of electronic commerce in all the FTAs which Korea has signed and enforced. Korea's FTA stipulates commonly no customs duties, the other chapter's priority when chapter of electronic commerce conflicts the other chapter, electronic authentication, protection of personal information and consumer protection. But it has weak consistency and framework as it has different provisions for the objects of electronic commerce respectively, reserves classification & applied rule for electronic commerce, stipulates differently on non discrimination treatment and so on. Korea should participate in the research of international organization including WTO and cope actively and elastically by analysing the provisions of electronic commerce of the other countries' FTA such as USA, EU, CHINA and so on.

  • PDF

ESTIMATION OF OFF-SITE DOSE AND RELEASE CONCENTRATION OF RADIOACTIVE LIQUID EFFLUENTS FROM RADWASTE TREATMENT SYSTEM IN KORI 3&4

  • Kim, H.S.;Son, J.K.;Kim, K.D.;Ha, J.H.;Song, M.J.
    • Journal of Radiation Protection and Research
    • /
    • v.26 no.3
    • /
    • pp.291-298
    • /
    • 2001
  • The designed release rate of liquid effluents from radwaste treatment system should be calculated and evaluated during normal operation, including anticipated operational occurrence and be assured that the release concentration and off-site dose at unrestricted area do not exceed the limits of regulation. The expected annual release rate and off-site dose for the currently operating nuclear power plants in Korea had been calculated and evaluated using PWR-GALE and LADTAP-II which was based on USNRC Regulatory Guide 1.109. Recently, the MOST Notice 2001-2 related to release concentration and off-site dose at unrestricted area was revised to reflect the concept of ICRP-60. It is necessary for KORI 3&4 to re-calculate the release concentration and off-site dose and to compare these results with the limits of regulation. As the results of assessment, we confirmed that the release concentrations were less than its limits of MOST Notice 2001-2 and the off-site dose at unrestricted area using K-DOSE60 was 3.61E-03 mSv/yr to the age of five for the effective dose, and 4.10E-2 mSv/yr to thyroid of the age of five for the organ equivalent dose. We also confirmed the off-site dose was within the limits of MOST Notice 2001-2. Therefore, the release concentration and off-site dose re-evaluated at unrestricted area in KORI 3&4 were well below the regulation limits of MOST Notice 2001-2.

  • PDF

Argument on the right to be forgotten and the freedom of expression-focused on the reforming the press arbitration system (잊혀질 권리와 표현의 자유를 둘러싼 논의 - 언론중재제도의 개선과 관련하여)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.1-11
    • /
    • 2014
  • With the drastic development of technology for almost eternally saving digital information, cases for giving sufferings to a person who deserves to enjoy privacy have increased. So I study the right to be forgotten focusing on the collision between that right and freedom of expression. I also study the concept of the right to be forgotten and its legal basis for the protection of that right. That right can be protected mainly by the self-decision making right under the Article 10, and secondly the privacy right under the Article 17 of the Constitutional Law. The Press Arbitration Law can be applied to protect the right to be forgotten, but that Law needs the revision of time-limit clause for complain, protection clause for the right to ask to delete factual past article, and the clause of staleness doctrine for the consent of giving personal information.

Preliminary Study of Performance Evaluation of a Dual-mode Compton Camera by Using Geant4 (Geant4 몬테칼로 전산모사 툴킷을 이용한 이중모드 컴프턴 카메라 최적화 설계 및 성능평가)

  • Park, Jin Hyung;Seo, Hee;Kim, Seoung Hoon;Kim, Young Soo;Kim, Chan Hyeong
    • Journal of Radiation Protection and Research
    • /
    • v.37 no.4
    • /
    • pp.191-196
    • /
    • 2012
  • A double-scattering type Compton camera which is appropriate to imaging a high-energy gamma source has been developed for nuclear material surveillance at Hanyang University. The double-scattering type Compton camera can provide high imaging resolution; however, it has disadvantage of relatively low imaging sensitivity than existing single-scattering type Compton camera. In this study, we introduce a novel concept of a dual-mode Compton camera which incorporates two different types of Compton camera, i.e., single- and double-scattering type. The dual-mode Compton camera can operate high-resolution mode and high-sensitivity mode in a single system. To maximize its performance, the geometrical configuration was optimized by using Geant4 Monte Carlo simulation toolkit. In terms of imaging sensitivity, high-sensitivity mode had higher sensitivity than high-resolution mode up to 100 times while high imaging resolution of the double-scattering Compton camera was maintained.

Development of a Coded-aperture Gamma Camera for Monitoring of Radioactive Materials (방사성 물질 감시를 위한 부호화 구경 감마카메라 개발)

  • Cho, Gye-Seong;Shin, Hyung-Joo;Chi, Yong-Ki;Yoon, Jeong-Hyoun
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.4
    • /
    • pp.257-261
    • /
    • 2004
  • A coded-aperture gamma camera was developed to increase the sensitivity of a pin hole camera made with a pixellated CsI(Tl) scintillator and a position-sensitive photomultiplier tube. The modified round-hole uniformly redundant array of pixel size $13{\times}11$ was chosen as a coded mask considering the detector spatial resolution. The performance of the coded-aperture camera was compared with the pin hole camera using various forms of Tc-99m source to see the improvement of signal-to-noise ratio or the improvement of the sensitivity. The image quality is much improved despite of a slight degradation of the spatial resolution. Though the camera and the test were made for low energy case, but the concept of the coded-aperture gamma camera could be effectively used for the radioactive environmental monitoring and other applications.

A Risk Assessment for A Korean Standard Nuclear Power Plant (한국표준형 원전의 중대사고시 MACCS 코드를 이용한 위험성평가)

  • Hwang, Seok-Won;Jae, Moo-Sung
    • Journal of Radiation Protection and Research
    • /
    • v.28 no.3
    • /
    • pp.189-197
    • /
    • 2003
  • The Level 3 PSA being termed accident consequence analysis is defined to assess effects on health and environment caused by radioisotopes released from severe accidents of nuclear power plants. In this study consequence analysis on health effects depending on release characteristics of radioisotopes has been peformed using the 3 MACCS code in severe accidents. The results of this study may contribute to identifying the relative importance of various parameters occurred in consequence analysis as well as to assessing risk reduction accident management strategies. Especially three parameters for the purpose of consequence analysis, such as the release height, the heat content, and the duration time, are used to analyze the variation of early fatalities and latent cancer fatalities. Also, in this study risk assessment using the concept, 'products of uncertainty and consequences', has been performed using consequence of MACCS and frequency on source term category 19 scenarios from IPE (Individual Plant Examination) analysis.

The Suggestion of Applicable Concepts and Directions for the Effective Management on Biotope Types (효율적 비오톱유형 관리를 위한 적용개념 및 방향 제안)

  • Choi, Il-Ki;Lee, Eun-Heui
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • The purpose of this study is to derive the actually applicable directions and measures for conservation and restoration according to biotope types. Recently biotope project-installing eco-river, restoring damaged area, protecting habitate for flora and fauna- is processed according to being interested in making and restoring the biotope. But it is lack of study to estimate and systematize which biotope preserve and restore primary. For this purpose, the direction and measures of conservation and restoration be applicable to actuality are drafted by a review on the preceded case studies until now at the inside and outside of the country. And then this study proposed the concept, direction and measures for the effective systematic biotope management through continual feed back such as field applications in selected case study areas and consultations. First, the applicable directions and measures for conservation and restoration according to biotope types is suggested with the 'conservation' divided into two parts; protection and maintenance, the 'restoration', and the 'enhancement' divided into two parts; improvement and creation. Second, for the effective biotope management, the biotope types are classified into urban type, agricultural types and natural types according to the naturalness and dominant landscape. However, this study suggests that the direction and measures suitable to the regional conditions should be reviewed enough and selected and also the detail measures should be supplemented with the foundation of directions and measures for biotope conservation and management proposed in this study because the biotope management should consider regional characteristics.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

A Study on the Public Interest of Collected Information (수집된 정보의 공익성에 관한 고찰)

  • Park, Kook-Heum
    • Informatization Policy
    • /
    • v.26 no.1
    • /
    • pp.25-45
    • /
    • 2019
  • With the advent of the data economy, interest in using big data has increased, but conflicts with protecting personal information have been also steadily raised. In this regard, major countries are accelerating use of big data by exempting de-identified, pseudonymous personal information from protection. However, these policies have been made without the understanding that the economic value of personal information has been actually changing slowly. This paper presents the concept of 'collected information' and defines it as having public interest and therefore, not the exclusive property of the collector of such information. The paper shows the collected information has public interest in terms of personal information protection, connectivity, and universal service and public goods. It also specifies that the 'data governance' cannot be applied to the current data utilization framework that depends upon the holder's consent; rather, it raises the need to improve the practices of information provision consent or provide the beneficiary right of information use to the information holder in order to ensure the proper 'data governance' that will turn market failure into success.

Integrated Pollinator-Pest Management (IPPM) Strategy as Future Apple IPM (사과 IPM 미래 전망: 화분매개자 친화형 병해충 종합관리 (IPPM) 전략)

  • Jung, Chuleui
    • Korean journal of applied entomology
    • /
    • v.60 no.1
    • /
    • pp.145-154
    • /
    • 2021
  • Integrated pest management system in Korean apple has significantly advanced for last few decades. However harmful effects of pesticides threats the ecosystem services of natural enemies and pollinators. Apple require cross-pollination and Insect pollination with diversity and abundance is one of the keys to profitable apple production in quantity and quality as well. Thus crop protection tools are to be administered in harmony to meet the pest suppression and protection of beneficial organisms such as natural enemies and pollinators. Adding onto the established IPM system, integrated pollinator-pest management (IPPM) concept is proposed as the future direction of apple IPM. For this, ecological enginnering of creating habitats for pollinators, landscape management and agroecosytem diversification as well as selective soft pesticide uses on time guided by pest monitoring and phenologyand targeted delivery are further proposed. Recent shift of agroecosystem from climate change and new pest outbreaks require new paradigm of pest management for sustainable agricultural production.