• Title/Summary/Keyword: Data Protection Act

Search Result 188, Processing Time 0.027 seconds

Text Network Analysis on Stalking-Related News Articles (스토킹 관련 언론기사에 대한 텍스트네트워크분석)

  • Eun-Sun Ji;Sang-Hee Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.579-585
    • /
    • 2023
  • The purpose of this study is to explore keywords within stalking-related news articles according to political orientation through the text network analysis, and then to examine the implicit intentions. Selecting total 1,607 articles including 824 articles of the conservative press(The Chosun Ilbo, The Joongang Ilbo) and 783 articles of the progressive press(The Hankyoreh, The Kyunghyang Shinmun) reported from January 1, 2018 to December 31, 2022, this study explored the aspect of topic category drawn through the topic modeling technique based on LDA(Latent Dirichlet Allocation). In the results of this study, the common topics of the conservative and progressive press were improvement of the perception of gender-based violence, personal protection & intensity of punishment, and disclosure of stalkers' personal information. Regarding the topics differently shown in those two press, the conservative press showed stalkers' harmful act, and outline of 'murder case at Sindang Station' while the progressive press showed request for aggravated punishment on the 'murder case at Sindang Station', and eradication of sexual exploitation crime (in cyber space). The results of this study imply that there are changes in the type of reporting according to ideological opinions about stalking in news articles.

Analysis of Regulation Standard and Radiological Characteristics of NORM Industry (국내·외 NORM 취급 산업 규제 기준 및 방사선학적 특성 분석)

  • Seung Beom Yoo;Ju Young Kim;Ga Eun Oh;Kwang Pyo Kim
    • Journal of Radiation Industry
    • /
    • v.18 no.3
    • /
    • pp.195-207
    • /
    • 2024
  • International organizations such as IAEA and EC recommend graded approach by identifying NORM industries requiring radiation protection. In Korea, single regulation rather than graded regulation for NORM industry is applied. Therefore, it consumes more manpower and costs than necessary for both regulators and workers, and is not optimized. The purpose of this study is to analyze domestic and foreign NORM industry regulatory standards and radiological characteristics for graded approach of NORM industry in Korea. Safety reports and publications such as SRS 49 and ICRP 142 published by international organizations were investigated, and domestic and foreign NORM regulatory guidelines and legislation such as Health Canada and the Act on Protective Action Guidelines Against Radiation in the Natural Environment were investigated to indicate NORM industries and regulatory standards. The radioactivity concentration of raw materials or by-products, radiation dose by industrial process of the NORM industry identified in IAEA and Korea were investigated. Nine NORM industries in Korea were identified based on the NORM industry from IAEA and KINS survey report. Foreign countries such as Canada, UK and Denmark were executing graded approach such as classification of dose level or licensing, registration, notification based on safety assessment. Radioactivity concentration of domestic and foreign NORM industries were widespread up to 200 Bq g-1 or higher based on industrial process and work type, and numerous NORM industries that exceeded radiation dose of 1 mSv y-1 were indicated. Therefore, it is necessary to consider handling materials and work types of identified NORM industry when establishing graded approach for NORM industry in Korea considering domestic situation. The results of this study are expected to be used as basic data for developing methodology of graded approach for NORM industry in Korea.

A Study on Spatial Distribution of Villages in Border Region according to Change in Civilian Control Line (민간인통제선 변화에 따른 접경지역 마을의 공간적 분포에 관한 연구)

  • JEONG, Haeyong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.2
    • /
    • pp.91-101
    • /
    • 2021
  • This study attempted to conduct the study from a macro perspective more specifically through the temporal and spatial analysis of Minbuk villages according to a change in a Civilian Control Line, such as a social and spatial distribution and a change of the existing Minbuk villages. To this end, this study conducted the spatial analysis for the change in the Minbuk villages according to the adjustment of the Civilian Control Line in time series by using a map of the Armistice Agreement Vol. 2, Google Earth, a digital cadastral map, an administrative district map, and the like are used as spatial data, and summarizing and constructing, as attribute data, a statistical yearbook, Ministry of Defense and Cheorwon-Gun notification data, a Land Use Regulation Information System, and cadastral map attribute information. After the enactment of the Military Facility Protection Act, the analysis was performed on a 20-year basis based on the 1976 statistical yearbook of which the Civilian Control Line was drawn. As a result, the total area of the Civilian Control Zone in Cheorwon from 1975 to 2015 decreased by 105.8 km2, and 9 of 14 Minbuk villages were released and only 6 villages existed. The unoccupied villages were analyzed as 14 villages, 10 fewer than the existing surveyed or statistical villages. The movement of the Civilian Control Line to the north may disappear the unique characteristics of the Minbuk villages but should be done carefully as it is closely related to the lives of the current residents, and policies should be established in terms of sustainable development and conservation of the villages. This study is significant in conducting the temporal and spatial analysis, which is the basis of the Minbuk regions and the Minbuk villages, and may be used as basic data necessary for subsequent analysis study.

A Study on the Exposure Factors Used in the Assessment of Inhalation Exposure to Household Chemicals (생활화학제품의 흡입노출평가에 사용되는 노출계수에 대한 고찰)

  • Yoon, Chungsik;Kwon, Taehong;Oh, Gitaek;Kim, Minjung;Kim, Boowook;Shin, CheolWoong;Lee, Kiyoung;Zoh, Kyungduk
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.4
    • /
    • pp.195-205
    • /
    • 2022
  • Background: The biggest concern when using household chemical products is the health risk from inhalation exposure. Objectives: The purpose of this paper was to provide information necessary for estimating inhalation exposure factors in several countries/organizations and to present some examples. Methods: We attempted to use PRISMA-ScR for a systematic review, but no major reports were found. We used the Google search function instead to find 'exposure factor handbook'. As for the results, inhalation exposure factors from South Korea, the United States, Canada, the EU, Australia, Japan, and China were compared. Results: The basic concept and origin of exposure factors was the US Environmental Protection Agency's Exposure Factor Handbook. Its latest version is 2011, but several chapters have been updated in 2017, 2018, and 2019. South Korea's Exposure Factor Handbook was updated in 2019, more recently than those of other countries, and was systematically investigated. In South Korea, the average daily respiratory rate is 14.62 m3/day for adults and 12.73 m3/day for children. It is difficult to compare breathing rate by country because each country divides age groups differently and uses different methods to estimate it. Information on household chemical products, space used, and ventilation rate are in the exposure factor handbook in some countries and not in others. It is not in the handbook in South Korea, but in the notice from the NIER (National Institute of Environmental Research), a sub-regulation of the Chemical Product Safety Act. Conclusions: The exposure factors registered in South Korea's exposure factor handbook have been systematically studied and reflect the most recent data. When using data not in the relevant handbook, data from other countries might be applied, but it should be determined whether the nature and quality of the original data have been managed.

Discussions on Pesticides Production and Supply in Korea (농약의 생산과 소비의 실태에 관한 고찰)

  • Bai Dai Han
    • Korean journal of applied entomology
    • /
    • v.17 no.2 s.35
    • /
    • pp.115-123
    • /
    • 1978
  • Present status on the pesticides production, supply, manufacture and pests control in Korea are summarized. The data in the past several years (1971-76) are analyzed to find out the problems and solutions for the further development of plant protection and pesticide industry in Korea. Since the acreages of crop plantation and the quantities of pesticides uses are already near to the stage of plateau, pesticide formulation with imported technical grade should be modified by local synthesis with imported quality. The government pesticides management act and regulations must be modernized urgently in connection with the synthesis. formulation, tests, registration, quality control. price and supply system as well as the safety use of pesticides. Recommendation concerning acceptable daily intakes(ADI) and residue limits must be established for the strengthning pesticide safety use and plant protection activities as soon as possible. The use of fungicide-insectide mixture in dust formulation must be authorized and practiced immediately for the labor saving and one-hit cooperative mass control of rice disease and insect pests, especially. At present, serious considerations on pesticide safety use and integrated pest control are strongly urged to help the farmers, to save the industries and to keep the nature as it is required.

  • PDF

A Study on Estimating Air Pullution in the Port of Incheon (인천항의 대기오염물질 배출량 산정 연구)

  • Lee, Jeong-Uk;Lee, Hyang-Suk
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.1
    • /
    • pp.143-157
    • /
    • 2021
  • International organizations such as the World Health Organization, the Organization for Economic Development and Cooperation, and major developed countries recognize the seriousness of air pollution. International organizations such as the International Maritime Organization have also implemented various regulations to reduce air pollution from ships. In line with this international trend, the government has also enacted a special law on improving air quality in port areas, and is making efforts to reduce air pollution caused by ports. The purpose of the Special Act is to implement comprehensive policies to improve air quality in port areas. This study sought to identify the emissions of each source of air pollutants originating from the port and prepare basic data on setting the policy priorities. To this end, the analysis was conducted in six categories: ships, vehicles, loading and unloading equipment, railways, unloading/wild ash dust, road ash dust, and the methodology presented by the European Environment Agency(EEA) and the United States Environmental Protection Agency(EPA). The pollutants subject to analysis were analyzed for carbon monoxide(CO), nitrogen oxides (NOX), sulfur oxides(SOX), total airborne materials(TSP), particulate matter(PM10, PM2.5), and ammonia(NH3). The analysis showed a total of 7,122 tons of emissions. By substance, NOX accounted for the largest portion of 5,084 tons, followed by CO (984 tons), SOX (530 tons), and TSP (335 tons). By source of emissions, ships accounted for the largest portion with 4,107 tons, followed by vehicles with 2,622 tons, showing high emissions. This proved to be the main cause of port air pollution, with 57.6% and 36.8% of total emissions, respectively, suggesting the need for countermeasures against these sources.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

Variation Analysis of Distance and Exposure Dose in Radiation Control Area and Monitoring Area according to the Thickness of Radiation Protection Tool Using the Calculation Model: Non-Destructive Test Field (계산 모델을 활용한 방사선방어용 도구 두께에 따른 방사선관리구역 및 감시구역의 거리 및 피폭선량 변화 분석 : 방사선투과검사 분야 중심으로)

  • Gwon, Da Yeong;Park, Chan-hee;Kim, Hye Jin;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.3
    • /
    • pp.279-287
    • /
    • 2020
  • Recently, interest in radiation protection is increasing because of the occurrence of accidents related to exposure dose. So, the nuclear safety act provides to install the shields to avoid exceeding the dose limit. In particular, when the worker conducts the non-destructive testing (NDT) without the fixed shielding structure, we should monitor the access to the workplace based on a constant dose rate. However, when we apply for permits for NDT work in these work environments, the consideration factors to the estimation of the distance and exposure dose are not legally specified. Therefore, we developed the excel model that automatically calculates the distance, exposure dose, and cost if we input the factors. We applied the assumption data to this model. As a result of the application, the distance change rate was low when the thickness of the lead blanket and collimator is above 25 mm, 21.5 mm, respectively. However, we didn't consider the scattering and build-up factor. And, we assumed the shape of the lead blanket and collimator. Therefore, if we make up for these limitations and use the actual data, we expect that we can build a database on the distance and exposure dose.