• Title/Summary/Keyword: Illegally Division

Search Result 24, Processing Time 0.022 seconds

A Study on Management of Chemicals Susceptible to Illegally Diversion (불법전용 가능성 화학물질 관리방안 연구)

  • Kim, Sungbum;Ahn, Seungyoung;Park, Choonhwa;Chun, Kwangsoo
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.2
    • /
    • pp.123-127
    • /
    • 2013
  • Chemicals only likely illegally, depending on the user's intention can be used for malicious purposes. In addition, these chemicals are chemicals, and readily available for purchase on, through a simple mixing ratio to home made bomb manufacturing can be. In this study, to illegally division the list of chemicals and the chemical when handling the regulatory status and distribution system, identify and propose effective management plan prepared. Presented by foreign chemicals management, including a list of relevant laws and illegal sales activities on the Internet the eradication measures were collected, and chemical substance management system improvement and response system (proposition) for material to be used as maintenance is expected.

A Survey on Consumers' Perception of Illegally Reused Standing Wreaths and the Introduction of New Standing Wreaths

  • Kwon, Song;Ryu, Ju Hyun;Kwon, Hye Jin
    • Journal of People, Plants, and Environment
    • /
    • v.21 no.6
    • /
    • pp.493-500
    • /
    • 2018
  • The distribution of standing wreaths has reached about 7.1 million per year and the size of the standing wreath market is estimated to be at least 700 billion won. Among them, 20 to 30 percent are estimated to be reused, resulting in damage to flowerfarms' sales of 110 to 160 billion won per year. Due to the unique characteristics of conventional 3-tier standing wreaths in terms of transportation and installation, companies that lack design expertise have monopolized local distribution markets, and the issue of illegally using standing wreaths has been raised. These issues have highlighted the need for developing new designs and establishing a distribution system to expand the consumption of flowers. This study was carried out to identify consumers' perception of reused standing wreaths and the current systems introduced to prevent the distribution of reused standing wreaths such as the real-name standing wreath production system, the authenticity certificate system, and new standing wreaths. The results of a consumer survey showed that consumers' perception of reused standing wreaths has been high and that reused standing wreaths need to be actively regulated to establish fair trade order and protect consumers' rights. Although the effectiveness of the real-name system, the authenticity certificate system, and new standing wreaths was found to be insufficient, the introduction of these systems was essential and necessary for continuous promotion through broadcasting media.

A Case of Nonthrombotic Pulmonary Embolism after Facial Injection of Hyaluronic Acid in an Illegal Cosmetic Procedure

  • Jang, Jong Geol;Hong, Kyung Soo;Choi, Eun Young
    • Tuberculosis and Respiratory Diseases
    • /
    • v.77 no.2
    • /
    • pp.90-93
    • /
    • 2014
  • Hyaluronic acid is widely used in medical procedures, particularly in cosmetic procedures administered by physicians or nonmedical personnel. The materials used for cosmetic procedures by physicians as well as illegally by non-medical personnel can cause nonthrombotic pulmonary embolism (NTPE). We report the case of a woman with acute respiratory failure, neurologic symptoms and petechiae after an illegal procedure of hyaluronic acid dermal filler performed by an unlicensed medical practitioner 3 days before symptom onset. Although a few cases of NTPE after injection of hyaluronic acid have been reported yet, this is the first typical case showing a NTPE manifestation after the facial injection of hyaluronic acid.

A Study on Development of Civil Defense CBR Virtual Training Simulation Scenario (민방위 화생방 가상훈련 시뮬레이션 시나리오 개발 연구)

  • Jung, Tae-Ho;Jang, Jae-Soon;Park, Sang-Hyun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.175-183
    • /
    • 2014
  • In spite of international efforts to control nuclear weapons and chemical, biological, and radiological (CBR) weapons, North Korea obtains and sells CBR weapons illegally. As a result, the worldwide threat of CBR weapons is increasing. Unfortunately, civil defense education and training for CBR weapons have not been adopted for real situations because of the long period of absence of an actual combat. In this study, virtual training scenarios that are applied to the simulation were made in 5 steps to cope with CBR situations. These scenarios are expected to have three effects. First, trainings can be improved with experience and education. Second, the problems and health hazards of CBR weapons and supplies can be solved with CBR virtual training simulation experience. Finally, corresponding effects can be recognized and predicted in real situations through roles and mission procedures of simulation scenario.

A Study an Effective Copyright Protection Method for Webtoons (효과적인 웹툰 저작권 보호 방법에 관한 연구)

  • Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.106-112
    • /
    • 2019
  • The Korea Copyright Commission has pursued copyright technology R&D projects to prevent illegal copying of comics and Webtoons. We developed a feature-based scanned comic filtering technology in order to apply technical measures to specific types of online service providers. We also developed technologies in order to monitor and identify illegally distributed comics on webhard sites and to monitor and identify illegally distributed webtoons. Even though all comic books posted on webhard sites are illegal, it is no trouble to download and access popular comics by accessing websites in foreign countries. Even under these circumstances, the comic and webtoon copyright protection technologies developed over the past six years have been used at all. In this paper, we examine what the problems are and find solutions to propose a copyright protection method for webtoons.

Secure biometric information delivery scheme of implantable device using code-division multiplexing method (코드 분할 다중화 방식을 이용한 체내삽입장치의 안전한 생체 정보 전달 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.235-241
    • /
    • 2016
  • Among recent issues emerging in the areas related to the society, health has received the most attention. In this paper, for a patient unable to do self-care because of worsened diseases, a biological information transfer method is proposed by which the disease information can be securely managed, by attaching an implantable device into the body. Our method object of the invention is to prevent a third party from illegally intercepting and interfering with the biological information attached to the insertion device in the body. In the proposed technique to improve the safety of the patient between the hospital and physician by assigning each code to the biometric information of the patient in order to prevent a third party tapping and interfering. In addition, our method is assigned a code necessary for encoding in advance to confirm the biological information between the patient and the hospital (doctor) in a manner dividing the bio-information code. In particular, the proposed technique makes a third party unable to illegally tap or interfere in, by previously generating a code used for encoding so that it can be stored in the database of the hospital, which not only decreased hospital care time to 6.9%, but also increased work efficiency rate up to 12.7%.

Development and Evaluation of Consumer Educational Contents on Safety Management of Imported Foods for Female College Students in Seoul (수입식품 안전관리에 관한 소비자 교육 컨텐츠 개발 및 교육효과 조사 - 서울시에 거주하는 여대생 중심으로 -)

  • Jung, Ji-In;Kang, Eun-Jin;Cho, Mi-Young;Choi, Gye-Sun;Hong, Young-Pyo;Seo, Kab-Jong;Kim, Gun-Hee
    • Journal of Food Hygiene and Safety
    • /
    • v.24 no.4
    • /
    • pp.291-298
    • /
    • 2009
  • This study was carried out to evaluate the consumer recognition with regard to the safety management for imported foods. In order to evaluate the effect of the prgram on consumer education, the program was practiced for 89 female college students in Seoul, Korea. The participants were given an instruction with materials on imported food safety, including the safety management of imported foods and their distribution. The results showed that the participants achieved a greater understanding of imported foods. In particular, they had firmly grasped the importance of expiration date in selecting imported foods. Before the instruction, 50.6% of total participants blamed the Korean government for the problems arising from imported foods; only 18.0% placed the blame on individuals or businesses importing from foreign countries. After the instruction, 39.3% had blamed the individuals or businesses importing from foreign countries. Furthermore, 36.0% had disapproved of the foods that are imported from China before the instruction, while 32.6% found objectionable the views on the illegally distributed foods; 29.2% criticized the junk foods that target children (after the instruction). In addition, the level of participant satisfaction via-a-vis imported foods safety supervision had improved from $2.76{\pm}1.59$(before the instruction) to $3.37{\pm}1.58$(after the instruction). The results indicate that consumers are concerned with the imported foods that contain adulterated or forbidden substances and the illegally distributed foods from foreign countries. Thus, consistent and informative educational programs on imported food safety could help consumers in choosing safer products, resulting in an improvement in the consumer confidence with respect to imported foods.

Analysis of Effect of Ditch Restoration on Soil Loss Reduction in Highland Agricultural Fields (고랭지밭의 구거복원에 따른 토양유실저감 효과분석)

  • Sung, Yunsoo;Kim, Dong Jin;Lee, Suin;Ryu, Jichul;Kim, Jonggun;Lim, Kyoung Jae;Kim, Ki Sung
    • Journal of Korean Society on Water Environment
    • /
    • v.36 no.5
    • /
    • pp.385-391
    • /
    • 2020
  • Soil loss is a serious problem frequently caused by local torrential rainfalls due to climate change. In particular, soil loss is occurring in agricultural areas rather than urban areas, and many pollutants are introduced into rivers, causing environmental problems. To reduce soil loss, the Ministry of Environment has designated and managed non-point source management areas. The Jaun-district in Hongcheon-gun, which was designed as a non-point pollution source management area in Gangwon-do, is located in the upper stream of Soyang Lake. Most of the agricultural fields are composed of highland agriculture fields. The highland agricultural fields in the Jaun-district are also composed of large-scale farming areas, and the ditches located near the agricultural fields have been illegally used for farmland. Therefore, the local government in Hongcheon-gun is conducting a project to restore the ditches occupied by agricultural fields. However, an analysis of the amount of soil loss that can be reduced by the restoration of the ditches has not been conducted yet. Thus, the purpose of this study was to analyze the effect of reducing the soil loss from the restoration of the ditches used as agricultural fields in the Jaun-district. The SATEEC L Module was used to analyze the reduction in soil loss by ditch restoration. The SATEEC L Module was constructed to estimate the LS factor using Moore and Burch's method after calculating the slope length using the digital elevation model and the maximum allowable slope length. The LS factor and the USLE formula were used to estimate the amount of soil loss that could be reduced by ditch restoration. The analysis showed that the ditch restoration could reduce about 16.6% of the soil loss in the Jaun-district. The results of this study will contribute to the study of methods to reduce soil loss in non-point pollution management areas.

The provision of neutral program and limit of criminal liability (가치중립적 프로그램의 제공과 형사책임의 한계)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.13-21
    • /
    • 2014
  • The problem of the cases of Soribada and Winny is their duplexity that they could be used legally and illegally. The issue called 'The crime of aiding through the neutral behavior' is about whether the program developer who shared the file sharing program letting unspecified public infringe the copyright could be punished or not. Many theories about limiting the traditional scope of punishment of aider have been maintained. However, it is questionable whether it is possible to limit the scope of punishment following the former cases and theories even for the action that is causal and facilitates the principal's criminal conduct, like the aid through the neutral action which is hard to perceive as illegal aid because of its characteristics. Therefore, using the case of Soribada in Korea and the case of Winny in Japan as the examples of illegal aid through neutral behavior case, this paper examines the characteristics and problems of aid through existing theories and cases, and suggests new scope of punishment limitation standard through the elaboration of the action of aid and judgment of degree.

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.