• Title/Summary/Keyword: Divulgence

Search Result 7, Processing Time 0.024 seconds

A Study on the Feasibility of the Espionage Charges for the Industrial Technology Divulgence (산업기술의 해외유출행위에 대한 간첩죄 처벌 타당성 연구)

  • Kim, Hang-Gon;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.253-275
    • /
    • 2018
  • Economic security emerged as a strong element of national security. Nations around the world are exerting their efforts to collect economic intelligence to serve their national interest while making added efforts to uncover industrial espionage and arrest industrial spies in defensive aspect. Cases in point are the enactment of "Economic Espionage Act(1996)" of the U.S. and the "Act on Prevention of Divulgence and Protection of Industrial Technology(2006)"of Korea. Korea is trying to punish industrial spying on the same level as espionage that poses national security threat by revising Criminal Code. It is necessary to review whether the move to toughen the punishment of industrial spying from "up to 15 years in prison and/or up to 1.5 billion won in fine" to "minimum seven years of imprisonment, life imprisonment or death penalty" is appropriate. Advanced nations regulate industrial spying with a special act on economy although they have applied espionage act not to "enemy states" but to "foreign countries" in the first place. Likewise, preventing industrial spying by applying espionage act through the revision of criminal code poses a risk of undermining the autonomy of industry sector by excessive influence of state power. Furthermore, the penalty of minimum imprisonment of seven years, life imprisonment or death penalty with the application of espionage act under the criminal code is an legal application by stretching of the law, posing a risk of dampening healthy economic activities. Therefore, revising and applying relevant economic laws such as aforementioned 'Act on Prevention of Divulgence and Protection of Industrial Technology(2006)' is thought to be desirable to achieve the goal of protecting industrial technologies.

Measures for Enhancing System of Crime Victim's Information Protection (범죄피해자 정보보호법제의 개선방안에 대한 연구)

  • Lee, Kwon Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.175-187
    • /
    • 2016
  • Protection of personal information has significant meaning in current information age. Information of crime victim is one of top in value in that divulgence of the information to perpetrators may threat safety of the victim or cause psychological demage as $2^{nd}$ harm if disclosed to public. Legal system protects the information with scattered statutes including Criminal Procedure Act. Existing studies have been limited to discussion of the single statute without integrated approach. Bearing necessity of the approach in mind, as issues of protection system this research proffers too broad subject of eligible inspection of case document, inactive practice of identity management cards and omission of personal information, and inappropriate punishment on the disclosure or divulgence. After reviewing systems of foreign jurisdictions to get useful implications, this paper suggests several measures with two separate aspect of legal provisions and protection practice.

Biometric Features and Responsible Person Information Hiding by Watermarking Technique (워터마킹 기법을 이용한 생체정보와 취급자 정보의 은닉)

  • Lee, Wook-Jae;Lee, Dae-Jong;Park, Jin-Il;Cho, Jae-Hoon;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.75-82
    • /
    • 2009
  • This paper propose a method to hide not only biometric features in the biometric image such as face and fingerprint for protecting them from unauthorized entity but also information of responsible person expressed as binary image which can be used to identify the responsibility of divulgence. For this, we investigate the recognition rates and bit error rates of extracted responsible person information watermark for the cases of using face and fingerprint images as cover images for fingerprint and face recognition which are the most popular biometric techniques. From these experiments, we confirm that the proposed method can be used for various application requiring to protect personal biometric information

Judgment Litigation about Intellectual Property Rights and Response Strategy of Both Parties (지식재산권 침해에 대한 심판소송과 쌍방 간 대응전략)

  • Jang, Tae-Jong;Kim, Seok-Jin
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.141-159
    • /
    • 2006
  • This paper presents the response strategy taken by the both parties who possess and infringe the patent rights in the case of patent litigation occurring in local companies. It is common that many entrepreneurs suffer from patent judgment litigation related to the intellectual property rights. Response strategy on the standpoints of patentees and trespassers are discussed in several cases such as infringement and abuse of patent rights, divulgence of trade secret and invention during employment in small & medium sized enterprises.

Behavior Improvement of Unethical Information-Sharing by The Ethical Program : Social Capital and Ripple Effect (윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선: 사회적 자본과 잔물결 효과)

  • Jung, Byoung-Ho;Kim, Byung-Cho
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.169-182
    • /
    • 2017
  • The purpose of this study is to empirically examine a behavior improvement of unethical information sharing through the ethics program in organization. An unethical behavior of information sharing on organization members is to be get to private interests through divulgence of company's confidential information. An unethical information-sharing of individual is the opportunist and selfish behavior for an expansion of social capital and shows a negative ripple effect in organization. When conducting the research methods, the analysis order performs the cluster, discriminant, t-test and multiple regressions. According to the study, There are differences the behavior of unethical information sharing between opportunist and non-opportunist. The opportunist member for unethical behavior improvement required the program operation both value and compliance oriented program. Non-opportunist member required only the value-oriented program. The upcoming research needs to explore both ethics program's frequency and action of a punished person.

Understanding the Behavior of Physical Therapists and Occupational Therapists in Protecting Patient’s Medical Information - An Application of the Theory of Planned Behavior - (일부 물리치료사와 작업치료사의 환자 의료정보보호 행동 이해)

  • Lee, In-Hee;Shin, A-Mi;Son, Chang-Sik;Park, Sang-Young;Park, Hee-Joon;Yoon, Kyung-Il;Kim, Yoon-Nyun
    • The Journal of Korean Physical Therapy
    • /
    • v.22 no.2
    • /
    • pp.55-60
    • /
    • 2010
  • Purpose: The purpose of this study was to use the theory of planned behavior, past habit and moral obligation to better understand the behavior of physical therapists (PTs) and occupational therapists (OTs) in protecting the medical information of patients. Methods: We conducted a survey using self-writting questionnaires structured within the framework of the theory of planned behavior to understand to analyze information from 103 clinical PTs and OTs in their efforts to protect patient medical information. Results: The PTs and OTs' medical information protecting behavior was 2.85 mean points. That point failed to reach 1.0 points. Behavior intention was 3.83 mean points. That was judged to be improved. Behavioral intention was closely correlated with behavior, behavioral attitude, subjective norms, behavior control, and past habit. Variables related to the theory of planned behavior, attitude, subjective norms, and perceived behavior control all explained 50% of the behavioral intention of PTs and OTs regarding future divulgence of patient information. The past habits of PTs and OTs were also a significant predictor in explaining the behavioral intention to protect a patient's medical information (p<0.01). Conclusion: Revising the behavioral attitudes, subjective norms, perceived behavior control, and past habits of PTs and OTs helped improve their behavior regarding protection of the medical information of patents.

A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident (산업기밀 유출사고 사례분석을 통한 유형별 대응방안 연구)

  • Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.39-45
    • /
    • 2015
  • Industrial secrets that companies own recently protected by various act related industrial security such as Trade Secret Act, Act on Prevention of Divulgence and Protection of Industrial Technology, etc. However, despite such protection infringement and leakage accidents of industrial secrets is increasing every year. According to a survey conducted by KAITS(Korean Association for Industrial Technology Security) annual average of estimated damage by industrial secrets leakage is estimated to be "50 trillion won." This is equivalent to the amount of annual revenue of small businesses more than 4,700 units. Following this, industrial secrets leakage causes serious damages to competitiveness of nation and companies and economic. However investment and effort to the industrial secrets leakage crime is lack of level compared to the scale of damage. Actually, most companies except some major companies are lack of response action about industrial secrets leakage because of shortage of separate organization, workforce, budget for industrial secrets leakage security. This paper aims to understand the overall flow of the industrial secrets leakage crime through various taxonomy such as cause of occurrence and leakage pathway and grasp the condition of damage from industrial secrets leakage through analyzation of internal and external industrial secrets leakage crime. This is expected to be the basis for related research.