• Title/Summary/Keyword: Information Protection Policy

Search Result 539, Processing Time 0.036 seconds

An extension plan of Yakushima Biosphere Reserve as a case study of consensus building of islanders

  • Matsuda, Hiroyuki;Yumoto, Takakazu;Okano, Takahiro;Tetsuka, Kenshi;Fujimaki, Aomi;Shioya, Katsunori
    • Journal of Ecology and Environment
    • /
    • v.38 no.2
    • /
    • pp.241-247
    • /
    • 2015
  • A participatory approach of local stakeholders is important to create a balance between nature protection and the sustainable use of natural resources in a nature reserve and its vicinity area. The zoning and management policy of biosphere reserves (BRs) is a good example of this idea, especially for island reserves. Yakushima was inscribed as a World Natural Heritage (WH) in 1993. Almost all of its residents did not remember that Yakushima was a BR. In addition, Yakushima has some problems in nature reserve management. Overabundance of the deer population is a critical threat to both agriculture and natural vegetation in the world heritage site. There are too many tourists visiting the WH site and Nagata-hama beach. The beach is a Ramsar site and one of the most important spawning grounds of sea turtles in the north Pacific. Now, residents and the municipality have decided to reactivate the Yakushima BR. Although the Ministry of the Environment of Japan has an initiative to manage the WH and the Ramsar site, the BR is managed by the municipality and local stakeholders. Local activities of both nature conservation and the sustainable use of natural resources are encouraged in the BR site. The islanders willingly included all areas of the island into the BR site. Scientists who have participated in the Society of Yakushimaology have played a significant role to build trust between local stakeholders and to seek feasible policies on the nature reserves. The concept of the "Yakushima Environmental Culture Village" is a good model for the extension plan of the Yakushima and Kuchinoerabujima BRs.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

Interpretation of Safeguard Agreement and Application to Korean domestic law under the WTO (WTO 세이프가드 협정의 해석과 국내법에의 적용방안)

  • Lee, Eun-Sup;Kim, Neung-Woo
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.271-298
    • /
    • 2011
  • This paper seeks the proper and efficient operation of Korea's safeguard mechanism by examining the judicial interpretation and application of the safeguard measures under the WTO Safeguard Agreement. The judicial examination is focused on the terms of "unforeseen development" in GAIT XIX, "evaluation of all relevant factors", and "clear justification of measure" in Safeguard Agreement. Such an intensive examination. of the judicial interpretation is used for the comparative analysis of the Korea's domestic provisions to find out problems in operation and the interpretative and legislative responses to them. It is found that the Korea's adaptation of the Safeguard Agreement into the domestic provisions and the operation of such provisions in the practical field have generally been consistent with the WTO's basic principles and provisions. Korea's safeguard mechanisms should stably be operated for securing the proper protection of domestic industry under certain emerging circumstances. For such policy objective to be ensured, it is legislatively required to make additional provisions in line with the appellate body's consistent interpretations of the debating issues including the term of unforeseen development.

  • PDF

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

A Framework of Service Level Agreement for Activating Cloud Services (클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.173-186
    • /
    • 2018
  • While cloud services are expanding, many users are having difficulty in adopting cloud services. This is because there is no information as to which cloud services can be trusted by users. loud service level agreement (Cloud SLA) is an agreement between cloud service providers and cloud service consumers using qualitative and quantitative indicators including quality and performance, etc. of cloud services. In this study, we propose a framework for cloud SLA that can be applied to the domestic cloud industry to improve service levels for cloud service providers and to protect users and also derive the detailed components of cloud SLA applicable to the domestic cloud industry using the proposed framework. Through this result, it is expected that the government will utilize the policy to enhance the reliability between cloud service providers and users under "the Act on the Development of Cloud Computing and Protection of Users", and eventually to activate cloud services by improving the quality and performance level of domestic cloud services and building a user trust.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

A Study on the Intention to Use MyData Service based on Open Banking (오픈뱅킹 기반의 마이데이터 서비스 이용의도에 관한 연구)

  • Lee, Jongsub;Choi, Jaeseob;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.1-19
    • /
    • 2022
  • With the revision of the Credit Information Use and Protection Act in August 2020, the MyData service based on open banking policy will take effect in January 2022. Nonetheless, the previous studies focused on the legal system or security-related issues of such service. Therefore, this paper conducted an empirical study on financial consumers aged 20 or older nationwide to analyze the factors which influence the intention to use MyData services based on open banking. Five characteristics representing open banking-based MyData service were derived through prior research, and a research model that combined value-based adoption model and privacy calculus theory was presented. The proposed research model and the relationship of its variables was analyzed using a sample of 400 users that is randomly selected. The results of empirical analysis showed that personalization had the greatest influence on benefits and reliability on sacrifice among service characteristics. They also suggested that MyData operators should devote themselves to providing customized services optimized for customers and establishing trust relationships. It was confirmed that both usefulness and enjoyment had a great influence on perceived value, and in terms of sacrifice, the burden of financial costs had a greater influence than privacy concerns. This study is meaningful in that it explored the psychological propensity of financial consumers to identify service utilization factors and presented a new approach that can contribute to the successful settlement of the domestic MyData industry.

Patient Safety Culture Among Dental Hygienists and Perception of Infection Control Activities (치과위생사의 환자안전문화인식과 감염관리활동)

  • Jeong, Yong-Ju;Lee, Sun-Mi
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.161-172
    • /
    • 2022
  • Purpose : The study was to promote patient safety by analyzing the effect of dental hygienist's perception of patient safety culture on infection control activities. Methods : The study is based on a survey of 210 dental hygienists in total working in dental settings. To find out infection control activities according to patient safety culture awareness, there were 6 general characteristics, 3 teamwork within the department, 2 infection control systems, 4 surface management, 9 equipment washing, disinfection, and laundry management, 4 infectious wastes, and 3 personal protection phrases.The data was analyzed using the SPSS version 20.0, and p<.05 was adopted to decide on significance. Results : The longer dental hygienists have worked n the dental settings, the more active they become in infection control activities. Among the different types of dental care settings, general (university) hospitals had the largest number of infection control activities, followed by dental clinics, and network dental clinics, in descending order. The dental settings possessing a higher number of dental hygienists were found to conduct more infection control activities than other dental settings. In addition, it was found that when a dental setting adopts a patient safety policy across all the units in the hospital, more systems and procedures for patient safety tend to be established, and that stricter management response to error leads to improvement of infection control activities. Conclusion :In order to enhance infection control activities, infection control activity programs should develop and implement periodic reinforcement of infection control education. regular monitoring of infection control activities.

An Exploratory Investigation of Archival Reference Services in the National Archives of Korea (국가기록원의 기록제공서비스에 관한 탐색적 연구)

  • Seol, Moon-Won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.3
    • /
    • pp.103-124
    • /
    • 2022
  • This study aims to suggest the use-based policies for archival reference service by investigating the actual archival uses and services of the National Archives of Korea (NAK). Considering that there is little information on the overall archival reference service by NAK, an exploratory research method is adopted to understand the current status and issues of the service. In this study, the use of archival records in NAK is investigated from statistical data, and service cases by record type are collected through interviews with archival service professionals of NAK. Then, the success and risk factors of the archival reference service are analyzed in three categories of human resources (reference archivists' competency), tools (finding aids), and records (appropriateness and sufficiency). Based on these analyses, archival reference service policy directions are proposed to strengthen the two different archival roles as "arsenal of rights protection" and "academic information provider."