• Title/Summary/Keyword: Confidentiality

Search Result 686, Processing Time 0.027 seconds

The Principle of Confidentiality in Arbitration: A Necessary Crisis

  • Cremades, Bernardo M.;Cortes, Rodrigo
    • Journal of Arbitration Studies
    • /
    • v.23 no.3
    • /
    • pp.25-38
    • /
    • 2013
  • Confidentiality has always been considered one of the most important aspects of arbitral proceedings and until recently a principle that could never be ignored. However, under the shadow of the increasing number of arbitral cases in which States are involved, there has recently been a tendency towards publicity, not only in investment protection arbitrations but also in commercial arbitrations. That said, many questions arise: in the event of a conflict between confidentiality and publicity, which should prevail? What role does the arbitrator play in this conflict? Does confidentiality provide more benefits than harm.

  • PDF

Confidentiality and the Riddick Principle in International Commercial Arbitration

  • Ahn, Keon-Hyung
    • Journal of Arbitration Studies
    • /
    • v.31 no.3
    • /
    • pp.43-68
    • /
    • 2021
  • This paper seeks to provide a comprehensive review of the international rules of law on the obligations of confidentiality and its exceptions in international commercial arbitration, including the Riddick principle stemming from the common law jurisdiction. To this end, this article examines and analyzes developed countries' arbitration legislation including relevant case laws and the most recent leading institutional rules. Given the fact that the increasing use of discovery in international commercial arbitration and that the parties and practitioners in civil law countries are not familiar with the concept of the Riddick principle and its implied undertaking to a court, this article introduces the concept of the Riddick principle with some analysis for the recent case laws. Finally, this paper makes some suggestions to strengthen the compliance of confidentiality in international commercial arbitration by introducing new rules on confidentiality, inter alia, sanctions for breaching of the obligations of confidentiality.

Multi-watermarking method for copyright protection and confidentiality for digital image (디지털 영상의 저작권 보호와 기밀성을 위한 다중워터마킹 방법)

  • 이성우;이형욱;신재호
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1071-1074
    • /
    • 1999
  • In this paper, we present a multi-watermarking method for a copyright protection and confidentiality for an original digital image. One watermark is used for a copyright protection and another for a copyright protection and another for a confidentiality and a detection of unauthorized copies.

  • PDF

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

The Importance of Anonymity and Confidentiality for Conducting Survey Research

  • Eungoo KANG;Hee-Joong HWANG
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Purpose: Poor anonymity and confidential strategies by a researcher not only develop unprecedented and precedented harm to participants but also impacts the overall critical appraisal of the research outcomes. Therefore, understanding and applying anonymity and confidentiality in research is key for credible research. As such, this research expansively presents the importance of anonymity and confidentiality for research surveys through critical literature reviews of past works. Research design, data and methodology: This research has selected the literature content approach to obtain proper literature dataset which was proven by high degree of validity and reliability using only books and peer-reviewed research articles. The current authors have conducted screening procedure thoroughly to collect better fitted resources. Results: Research findings consistently mentioned the confidentiality and anonymity principles are preserved and implemented as a means of protecting the privacy of all individuals, establishing trust and rapport between researchers and study participants, as a way of critically upholding research ethical standards, and preserving the integrity of research processes. Conclusions: Confidentiality and anonymity are research ethical principles that help in providing informed consent to participants assuring subjects of the privacy of their personal data. As provided by research bodies and organizations, every research process has to incorporate the principles to meet credibility.

Comparison of Experiences of Ethical Dilemma between Intensive Care Unit and General Unit Nurses regarding Treatment Decisions and Confidentiality (의료처치 및 환자 비밀유지에 대한 중환자실 간호사와 일반병동 간호사의 윤리적 갈등 경험 비교연구)

  • Ko, Chungmee;Koh, Chin-Kang
    • Journal of Korean Critical Care Nursing
    • /
    • v.11 no.3
    • /
    • pp.1-11
    • /
    • 2018
  • Purpose : This study compares experiences of ethical dilemma between nurses working in intensive care units and those in general units under specific situations of treatment decisions and confidentiality. Method : This cross-sectional descriptive study utilizes the self-report survey method. The survey questionnaires were completed by 50 and 52 nurses working in intensive care units and general units, respectively. The instrument, which consisted of 16 items of ethical dilemma situations about treatment decision and confidentiality, was used. The mean scores for each item were compared between the two groups. Results : The study found no differences in terms of age, gender, education level, clinical experience in years, and being educated on healthcare ethics. For 9 out of 16 items, the mean scores of nurses in intensive care units were significantly higher than those of nurses in general units. Conclusions : Nurses in intensive care units experienced ethical dilemmas regarding treatment decisions and confidentiality more often than those in general units. This study emphasizes the need to establish strategies for improving the ethical competence of critical care nurses.

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication

  • Zhang, Meng;Wang, Zhe;Guo, Menghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.162-177
    • /
    • 2012
  • In this paper we present a novel method of applying image scrambling technology which belongs to the information hiding field in the error control coding to introduce confidentiality in wireless machine to machine communication. The interleaver in serial concatenated convolutional codes, which is the key module in overcoming burst errors, is deliberately designed with the scrambling function to provide a low error rate for those authorized transceivers. By contrast, the unauthorized transceivers without keys would get so high an error rate that decoding bits could bring little value, thus realizing both the confidentiality and reliability in wireless machine to machine communication.

Recent Debates in Attorney-Client related Privilege and Confidentiality in Korea and Its Implications to International Arbitration

  • Joongi Kim
    • Journal of Arbitration Studies
    • /
    • v.33 no.3
    • /
    • pp.3-30
    • /
    • 2023
  • This article provides an overview of the state of attorney-client related privilege and confidentiality in Korea. It reviews the statutory framework, and how Korean courts have analyzed the privilege and confidentiality related to attorneys and their clients. It then examines the legislative initiatives Korea is currently debating with regard to adopting a more common law-style attorney-client privilege (ACP). If adopted, the new legislation will mark a significant milestone in providing guidance on how communications between attorney and client will be treated. Its impact in the context of international arbitration practice and law related to Korea is explored.