The Journal of the Convergence on Culture Technology
/
v.7
no.2
/
pp.157-163
/
2021
This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.
Journal of Korea Spatial Information System Society
/
v.8
no.2
s.17
/
pp.1-11
/
2006
This paper addresses a GIS (Geographic Information System) based system in order to reduce the rate of public transportation accidents occurring in Iranian roads network. Over the years, the road accidents are a major issue throughout the world. Today, particular consideration is given to those technologies which can lead to diminish on the number of critical incidents. One of the main factors resulting in accidents and fatalities rates growth is the speed violation of buses in Iranian road network. The conventional speed controlling approach in Iran based on the Tachograph which records vehicle's speed, time, and stoppage in the mechanical processing has many problems. Hence, this research is intended to design and implement a GIS-based system to manage road accident of Bus transportation system using offline tracking system. This was accomplished using a GIS-based technique that encompasses three steps. The first step is developing a GIS-based accident system. The second step includes designing and applying a tracking system inside 90 buses for recording Bus information for speed controlling. Lastly, by using mentioned system in police center, the illegal drivers' punishment would be considered properly. Overall, this system has been successfully applied in this work. Therefore, the police and transportation office are able to control and make policy to diminish the number of accident. It is anticipated that online tracking system through the Web GIS would be utilized In this system in the near future.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.11
no.1
/
pp.396-413
/
2017
Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.
Journal of Fisheries and Marine Sciences Education
/
v.10
no.2
/
pp.139-161
/
1998
This thesis includes a study on the legal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the lists of illegal fishing controlled by fishing patrol vessels of Ministry of Maritime Affairs and Fisheries from 1994 to 1996 in adjacent sea area of Korea. The results are summarized as follows ; 1. The fishing patrol vessels controlled total 826 cases in 2,726 days of 292 voyages by 17 vessels in 1994, total 1,086 cases in 3,060 days of 333 voyages by 18 vessels in 1995 and total 933 cases in 3,126 days of 330 voyages by 19 vessels in 1996. 2. The fishing period of illegal fishing was generally concentrated from April to September. But year after year, illegal fishing was scattered throughout the year. 3. The most controlled sea area of illegal fishing was the south central sea area in the sea near Port of Tongyeong. The sea area occupied about 36~51% of totality and the controlled cases were gradually increased every year. The second was the south western sea area in the sea near Port of Yosu. The sea area occupied about 18-27% and the controlled cases were a little bit increased every year. The third was the south eastern sea area in the sea near Pusan. The sea area occupied about 13~23% and the controlled cases were gradually decreased year by year. 4. The most controlled kind of illegal fishing was the small size bottom trawl. This occupied about 81-95% of totality and the controlled cases were gradually increased year by year. The second was the medium size bottom trawl. This occupied about 4-7% and the controlled cases were gradually decreased year by year. The third was the trawl of the coastal sea, this occupied about 2~4% and the controlled cases were a little bit decreased every year. 5. The most controlled address of illegal fishing manager was Pusan city which occupied about 33-51% of totality. The second was Cheonnam which occupied about 24-29%. The third was Kyungnam which occupied about 16~35%. 6. The most controlled violation of regulations was Article 57 of the Fisheries Act which occupied about 56-64% of totality. The second was Article 23 of Protectorate for Fisheries Resources which occupied about 21-36%. And the controlled cases by it were gradually increased every year.
With controlling Drones, although it was discussed in the previous study which showed a possibility. Which is personality and property rights of third parties could be violated while operating the drone with a video camera. But It's hard to find out precedents related to drones in Korea. In case of that someone try to control the drone which is equipped with a camera in a yard of neighborhood, the German District Court (Potsdam) considered an operator of drone has little bit of careless to do his duty and admit nonfeasance claim in the owner of the one's property for prevention to repetition of similar situation according to a nonfeasance claim for prevention to Section 1004 (1) sentence 2 of the German Civil Code(BGB). The drone which is equipped with a camera have possibilities to disrupt property and personal rights of the owner. Because a danger in repetition is getting larger regarding the violation of law. Moreover, there is a case that someone shot down the drone which is equipped with a camer. Because it has a risk to interrupt private life and cause some dangerous in our life. The German district court(Riesa) recently have considered that controlling the drone with a camera in private spaces is illegal as a violation of personal life. In addtion to, the action of property owner shot down drone is a legal according to § 228 of the German Civil Code(BGB) which is caleed "Necessity". Although it is difficult to apply to foreign cases directly to Korea, similar cases are likely to be occurred in Korea. The decision of the German District Court showed implications to Korea. As demand for the camera-equipped drone increases in Korea, it is time to discuss specific measures for drone violations.
Under the new system of 'Separation of pharmaceutical prescription and dispensing' in Korea, which was implemented in 2000, physician could not dispense a medicine, and outpatient should have a physician's prescription filled at a drugstore. After pharmacist makes up outpatient's prescription, National Health Insurance Service(NHIS) pay for outpatient's medicine to pharmacist, except an outpatient's own medicine charge. And NHIS only pay for outpatient's prescription fee to physician and, physician doesn't derive profit from dispensing medicine in itself. Nevertheless, if physician writes out a prescription with violation of 'Criteria for the Medical Care Benefits', NHIS clawed back the payment of outpatient's prescription and medicine from the physician or the medical institution which the physician belongs to. In the past, NHIS's confiscation was in accordance with 'the National Health Care Insurance Act, Article 52, Clause 1'. But, since 2006 when the Supreme Court declared that there was no legal basis on the NHIS's confiscation of outpatient's medicine payment, NHIS had put in a claim for illegal prescriptions on the basis 'the Korean Civil law, Article 750(tort)'. So, Many medical institutions filed civil actions against NHIS. The key point of this actions was whether the issuing outpatient prescriptions with violations of Criteria for the Medical Care Benefits constitute of the law of tort. On this point, the first trial and the second trial took different position. Finally the Supreme Court acknowledged the constitution of the law of tort in 2013. In this paper, the author will review critically the decision of the Supreme Court, and consider the relativeness between the legal effect of Criteria for the Medical Care Benefits and the constitution of the issuing outpatient prescriptions with violations of Criteria for the Medical Care Benefits as the law of tort.
Cho, Yong Bin;Kim, Jin-Tae;Lim, Joon Bum;Oh, Sang Tae
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.21
no.1
/
pp.182-192
/
2022
Motorcycle accidents are increasing at an average annual rate of 10.01%, and fatalities are also increasing by 2.64%. Enforcement cameras are installed to enforce safe driving of more-than or equal-to four-wheeled vehicles on the road. Even though the main purpose of this enforcement camera is to disencourage the speed violation of all types of vehicle, one cannot expect complete enforcement by these cameras. In particular, enforcement of the motorcycle should rely on on-site activities through the input of on-site personnel. Recently, to discourage the illegal acts of motorcycling, the National Police Agency introduced the 'National Police Agency SMART National Report'. However, it is necessary to prepare an appropriate practical plan to maximize the effect of enforcement requiring continuous manpower management. This study proposed four types of rider certification IDs for delivery motorcycles. These IDs are institutional devices to manage delivery motorcycle riders. In addition, a experiment on enforcement was conducted using those license ID systems for delivery motorcycles. This experiment confirmed through the image-processing program (D-MESO) if one of the systems was possible to implement for enforcement on the delivery motorcycle rider's license.
Journal of the Korea Academia-Industrial cooperation Society
/
v.16
no.1
/
pp.652-657
/
2015
BitTorrent is an innovative protocol related to file-sharing and file-transferring, which allows users to receive pieces of files from multiple sharer on the Internet to make the pieces into complete files. In reality, however, free distribution of illegal or copyright related video data is counted for crime. Difficulty of regulation on the copyright of data on BitTorrent is caused by the fact that data is transferred with the pieces of files instead of the complete file formats. Therefore, the classification process of file formats of the digital contents should take precedence in order to restore digital contents from the pieces of files received from BitTorrent, and to check the violation of copyright. This study has suggested SVM classifier for the classification of digital files, which has the feature vector of histogram differential on the pieces of files. The suggested classifier has evaluated the performance with the division factor by applying the classifier to three different formats of video files.
Journal of the Korean Society for Aviation and Aeronautics
/
v.30
no.4
/
pp.117-131
/
2022
Human rights education is to acquire understanding and knowledge about human rights, to develop values, attitudes and character that respect human rights, to develop the ability to overcome human rights violations and discriminatory acts, and to protect and promote the human rights of others. In order to prevent human rights violations of the transportation vulnerable, such as the disabled, it is necessary to develop specialized human rights education plans for aviation security personnel to practice human rights perspectives. Therefore, in accordance with the 「National Civil Aviation Security Education and Training Guidelines」, specialized human rights education should be included in the initial aviation security education and regular education courses. The point is that there is a need to reexamine the aviation security education program for aviation security personnel based on the essential knowledge and educational contents for aviation security personnel to perform security screening tasks in the aviation security education course. When this happens, various efforts must be made to improve the human rights of the transportation vulnerable, such as the disabled, during the security screening process, so that human rights violations will be significantly reduced. In particular, it is necessary to enhance the ability to detect dangerous terrorist items such as weapons or explosives that can be used for illegal sabotage through practical security screening training. For aviation security and aircraft safety, efforts to improve the quality of aviation security personnel training, such as human rights training, must be continuously made while thoroughly preparing for terrorism in advance.
Medical practice with medical adaptability is not illegal. Consent to medical practice is also not intended to exclude causes of Illegality. The patient's consent to medical practice is the exercise of the right to self-determination, and the patient's right to self-determination is take shape through the doctor's information. If a doctor violates his duty to inform, failure to inform or lack of inform constitutes an act of illegality of omission in itself. As a result, the legal interest of self-determination is violated. The patient has the right to know and make decisions on his or her own, even when it is not connected to the benefit of life and body as the subject of the body. If that infringed and lost, the non-property damage shall be recognized and the immaterial damage must be compensated. On the other hand, the violation of the duty of information does not belong to deny the compensation for physical damage. Which the legal interest violated by violation of the obligation to inform is the self-determination, and loss of opportunity of choice is recognized as ordinary damage. However, if the opportunity of choice was lost because of the infringement of the right to self-determination and the patient could not choice the better way, that dose not occur plainly bad results, under the prove of these causal relationship, that bad results could be compensated. But the unexpectable damage could not be compensated, because the physical damage is considered as the special damage due to the violation of the right of the self-determination.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.