• Title/Summary/Keyword: Information Breach

Search Result 127, Processing Time 0.02 seconds

Comparative and analysis of multimedia author tools (멀티미디어 저작도구의 비교.분석)

  • Kwon Oh-Tack;Hong Dong-Heon
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.23-46
    • /
    • 1998
  • In this paper, comparative and analysis of multimedia author tools for to proper compatible multimedia author tools on multimedia author tools function and usage, and which breach of contract each author tools specific property prepare to forecast future multimedia expansion trend on information technology expansion. Multimedia essential element is hardware(storage, digital video, CD), software, sound, hypertext and hypermedia etc. Analysis criteria of multimedia author tools is programming environment, which are card, script, icon, time method.

  • PDF

A Study on the Bank's Breach of Contract to keep the Business Secrecy in Transferable Credit Transactions - with a Special Emphasis on the English Case Law, Jackson v. Royal Bank of Scotland - (양도가능신용장거래에서 은행의 영업상 비밀 유지의무위반에 관한 연구 - Jackson v. Royal Bank of Scotland 사건에 대한 영국법원의 판결을 중심으로)

  • Hahn, Jae-Phil
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.277-314
    • /
    • 2006
  • This article aims at analysing the reality of banks' liability resulting from the breach of contract on its part to keep the business secrecy with the supplier in the transferable credit, focusing on a English decision, Jackson v. Royal Bank of Scotland [2005] UKHL 3. In this case, the applicant, 'Econ', had purchased various varieties of pre-packed dog chews in bulk through 'Sam'(lst beneficiary) from 'PPLtd'(2nd beneficiary) in Thailand, using a transferable letter of credit issued by 'RBank'. 'Sam' charged a tremendous amount of mark-up on each transaction and it had not been disclosed to 'Econ', although the identity of 'PPLtd' was revealed to 'Econ' by various documents. However, 'RBank' made an unfortunate error to send an completion statement and other documents including 'PPLtd.'s invoice to 'Econ' instead of to 'Sam'. The effect of the Bank's error was to reveal to 'Econ' the substantial profit that 'Sam' was making on these transactions. CEO of 'Econ' was furious and, as a result, decided to cut 'Sam' out of its importing system and terminated their relationship. 'Sam' sued 'RBank' for damages to recover the loss of profits which could have been possibly made, if the information on the mark-up would not have been exposed to 'Econ'. The House of Lord held that 'RBank' was in breach of its duty of confidence, so 'Sam' was entitled to recover damages on a decreasing scale over 4 years, since there was no specific undertaking from the letter of credit.

  • PDF

Development of Probabilistic Flood Risk Map Considering Uncertainty of Levee Break (하천제방 붕괴의 불확실성을 고려한 확률론적 홍수위험지도 개발)

  • Nam, Myeong-Jun;Lee, Jae-Young;Lee, Chang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.125-133
    • /
    • 2019
  • In this paper, probabilistic flood risk maps were produced for levee break caused by possible flood scenarios. The results of the previous studies were employed for flood stages corresponding to hydrological extreme event quantified uncertainties and then predicted the location of a levee breach. The breach width was estimated by combining empirical equation considered constant width and numerical modeling considered uncertainties on compound geotechnical component. Accordingly, probabilistic breach outflow was computed and probabilistic inundation map was produced by 100 runs of 2D inundation simulation based on reliability analysis. The final probabilistic flood risk map was produced by combining probabilistic inundation map based on flood hazard mapping methodology. The outcomes of the study would be effective in establishing specified emergency actin plan (EAP) and expect to suggest more economical and stable design index.

Exploring the Association between Board Structure and Information Security Breaches

  • Hsu, Carol;Wang, Tawei
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.531-557
    • /
    • 2014
  • Although the area of information security planning and management has gained an increased attention, not much discussion was available on the role and the impact of the board members towards a firm's security management and governance decisions. In this research, we draw on corporate governance and the organizational demography literature to conduct an exploratory empirical study on the association between the board structure of a firm and the possibility of information security breaches. Our results show that the board size, the average age/tenure and the heterogeneity of age could reduce the possibility of security breaches while the proportion of independent directors and the heterogeneity of tenure could increase it. Our findings shed lights on the important role played by the board when managing information security risks in organizations.

A Study on the Problems of the Doctrine of Utmost Good Faith in English Marine Insurance Law (영국(英國) 해상보험법(海上保險法)에서 최대선의원칙(最大善意原則)의 문제점(問題點)에 관한 고찰(考察))

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.103-152
    • /
    • 2000
  • English contract law has traditionally taken the view that it is not the duty of the parties to a contract to give information voluntarily to each other. In English law, one of the principal distinctions between insurance contract law and general contract law is the existence of the doctrine of utmost good faith in insurance law. The doctrine gives rise to a variety of duties, some of which apply before formation of the contract while others apply post-formation. This article is, therefore, designed to analyse the overall structure and problems of the doctrine of utmost good faith in English marine insurance law. The results of analysis are as following : First, the requirement of utmost good faith in marine insurance law arises from the fact that many of the relevant circumstances are within the exclusive knowledge of the assured and it is impossible for the insurer to obtain the facts to make a appropriate calculation of the risk that he is asked to assume without this information. Secondly, the duty of utmost good faith provided in MIA 1906, s. 17 has the nature as a bilateral or reciprocal, overriding and absolute duty. Thirdly, the Court of Appeal in Skandia held that breach of the pre-formation duty of utmost good faith did not sound in damages since the duty did not arise out of an implied contractual term and the breach did not constitute a tort. Instead, the Court of Appeal held that the duty was an extra-contractual duty imposed by law in the form of a contingent condition precedent to the enforceability of the contract. Fourthly, the scope of the duty of utmost good faith is closely related to the test of materiality and the assured is required to disclose only material circumstances subject to MIA 1906, s. 18(1) and 20(1). The test of materiality, which had caused a great deal of debate in English courts over 30 years, was finally settled by the House of Lords in Pan Atlantic and the House of Lords rejected the 'decisive influence' test and the 'increased risk' test, and the decision of the House of Lords is thought to accept the 'mere influence' test in subsequent case by the Court of Appeal. Fifthly, the insurer is, in order to avoid contract, required to provide proof that he is induced to enter into the contract by reason of the non-disclosure or misrepresentation of the assured. Sixthly, the duty of utmost good faith is, in principle, terminated before contract is concluded, but it is undoubtful that the provision under MIA 1906, s. 17 is wide enough to include the post-formation duty. The post-formation duty is, however, based upon the terms of marine insurance contract, and the duty lies entirely outside s. 17. Finally, MIA 1906, s. 17 provides expressly for the remedy of avoidance of the contract for breach of the duty. This means rescission or retrospective avoidance of the entire contract, and the remedy is based upon a fairly crude 'all-or-nothing' approach. What is needed in English marine insurance law is to introduce a more sophiscated or proportionate remedy.

  • PDF

Detecting Rogue AP using k-SVM method (k-SVM을 이용한 Rogue AP 탐지 기법 연구)

  • Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.87-95
    • /
    • 2014
  • Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

A Scenario Development on the Personal Information Breach in Telemedicine Service (원격의료 서비스의 개인정보 침해 시나리오 개발)

  • Choi, Hyun-Wook;Kim, Taek-Young;Kim, Tae-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.301-304
    • /
    • 2021
  • 4차 산업혁명 시대가 도래함에 따라 사물인터넷(IoT)이 다양한 산업의 영역에서 활용되고 있다. 특히 IoT 기술 및 서비스를 활용하는 분야 중 하나인 스마트 의료 분야는 최근 소프트웨어 및 네트워크의 연결성이 강화되면서 사이버보안 사고가 급증하고 있다. 따라서 스마트 의료 기기·서비스 개발단계부터 보안을 고려하여 안전하게 개발하는 것이 필요하며, 서비스 제공시에도 보안을 고려하여 안전하게 관리 및 서비스를 제공하는 것이 필요하다. 이에 본 연구에서는 IoT 서비스 활용 분야 중 스마트 의료 분야에서 원격의료 서비스의 개인정보 침해 요인을 도출하고 이를 토대로 어택트리 기반의 시나리오 분석을 수행하고자 한다.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]