• 제목/요약/키워드: Information Protection Practice

검색결과 118건 처리시간 0.03초

한.인도간의 통상분쟁 현황과 사례 분석 -인도의 반덤핑 관세정책을 중심으로- (Case analysis of trade dispute between Korea and India)

  • 이종원
    • 통상정보연구
    • /
    • 제12권3호
    • /
    • pp.391-412
    • /
    • 2010
  • As traditional import regulations have decreased all over the world in recent decades, the usage of "unconventional" trade protection measures has grown in the developing countries. In particular, antidumping investigations have risen rapidly and have growing in India and China. Therefore, this thesis aims to provide countermeasures to our government and Korean exporting companies by studying characteristics of antidumping. India is one of the most frequent initiators of antidumping cases by protecting their industries and impeding imports from FTA. This year, economic exchanges of Korea and India will be increasing by the conclusion of CEPA. This will lead to the increase of dispute by import regulations. Under such circumstances, to decrease Indian antidumping cases Korea will respond as follows. i)If antidumping laws, system and practice of India have injustice or are different from WTO rules, our government will have to indicate injustice and actively urge Indian government to make corrections. For example, they are continuous bilateral contact about the problems, fallacy of calculation of dumping margin, and intense investigations into cause and effect relationship and losses in dumping market, ect. ii)Our government should give more support to the small and medium exporting company which have difficulties in dealing with trade conflicts, counseling, arbitrating a lawyer. iii)Our government which is in control of domestic trade relief system should strengthen its investigation ability about new regulations and moniter import regulations of India. Over the long time, Korean companies need to export competitive advantage items of a higher value-added business and build solidarity by technology transfer. Accordingly, that will result in the decrease of trade dispute in India.

  • PDF

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code

  • Han, Mu;Wang, Yunwen;Ma, Shidian;Wan, Ailan;Liu, Shuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1100-1123
    • /
    • 2019
  • A code-based cryptosystem can resist quantum-computing attacks. However, an original system based on the Goppa code has a large key size, which makes it unpractical in embedded devices with limited sources. Many special error-correcting codes have recently been developed to reduce the key size, and yet these systems are easily broken through side channel attacks, particularly differential power analysis (DPA) attacks, when they are applied to hardware devices. To address this problem, a higher-order masking scheme for a McEliece cryptosystem based on the quasi-dyadic moderate density parity check (QD-MDPC) code has been proposed. The proposed scheme has a small key size and is able to resist DPA attacks. In this paper, a novel McEliece cryptosystem based on the QD-MDPC code is demonstrated. The key size of this novel cryptosystem is reduced by 78 times, which meets the requirements of embedded devices. Further, based on the novel cryptosystem, a higher-order masking scheme was developed by constructing an extension Ishai-Sahai-Wagne (ISW) masking scheme. The authenticity and integrity analysis verify that the proposed scheme has higher security than conventional approaches. Finally, a side channel attack experiment was also conducted to verify that the novel masking system is able to defend against high-order DPA attacks on hardware devices. Based on the experimental validation, it can be concluded that the proposed higher-order masking scheme can be applied as an advanced protection solution for devices with limited resources.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

신변보호요원의 윤리적 딜레마에 대한 현상학적 연구 (Phenomenological Study about Bodyguards' Ethical Dilemmas)

  • 박영만
    • 시큐리티연구
    • /
    • 제46호
    • /
    • pp.31-62
    • /
    • 2016
  • 본 연구는 신변보호요원의 윤리적 딜레마에 대한 현상학적 연구로 신변보호요원을 대상으로 윤리적 딜레마에 대한 경험적 사실들을 근거로 의미와 본질을 찾아 신변보호요원들의 윤리적 딜레마에 대한 과정과 경험을 연구하여 본질을 이해하고 예방과 대처를 할 수 있는 기초적자료를 위한 방안을 제시하는데 목적이 있다. 이러한 연구목적을 달성하기 위하여 Colaizzi의 6단계 분석 절차를 사용하여 5년이상 근무를 한 7명의 윤리적 딜레마를 경험한 신변보호요원을 연구대상으로 선정하여, 2015년 10월 1일부터 2015년 11월 20일까지 면접 및 질문지를 통해 자료를 분석하고 연구의 타당성과 윤리적 고려사항을 통해 내용을 분석하여 다음과 같은 결과를 도출할 수 있었다. 연구 결과 신변보호요원의 윤리적 딜레마의 중심의미는 6개와 20개의 주제진술로 파악되었다. 첫째, 중심의미는 갈등요인으로 주제는 직전관행과의 충돌, 규정 절차 문제, 조직 직무소통, 서비스불일치이다. 둘째, 중심의미는 업무상 역할제한으로 주제는 제도적 관행, 의사결정, 우선순위이다. 셋째, 중심의미는 업무상 상황판단의 어려움으로 주제는 결정의 모호성, 지식 및 경험, 의견대립이다. 넷째, 중심의미는 합리적 자기 방어로 주제는 책임감결여, 합리화, 의도적 외면, 자괴감이다. 다섯째, 중심의미는 대인관계 어려움으로 주제는 상 하관계, 중간 관리자 역할, 비협조적 업무, 불쾌한 언행이다. 여섯째, 중심의미는 비밀유지로 주제는 묻혀진 행태, 불법관행이다.

  • PDF

초등학생의 환경 의식 변화에 관한 종단적 조사 연구 (A Vertical Survey on the Change of Environmental Awareness of Elementary School Students)

  • 최영분;정완호
    • 한국환경교육학회지:환경교육
    • /
    • 제11권2호
    • /
    • pp.118-129
    • /
    • 1998
  • This survey is made to offer the fundamental data for the establishment of practical environmental education plan based on understanding of the change of the environmental awareness of elementary school students under the longitudinal-sectional research design. In this research, the questionnaire made by Kim Jong-ki in 1988 and by Kim Hak-Bong in 1993, is amended and filled up, which is used to the 624 numbers of fifth and sixth grade students lived in Seoul, Pyungtaek and Yangjugu. This research ares are devided into 5 ares which are the environmental general, environmental pollution, living environment, environmental education and consciouness of environmental crisis to humen beings. First, it is grasped general tendency and then is compared and analyzed the level of awareness by residence, sex, grade. stsdard of living parental academic, the background variation of parental job with the status in 1988 and 1933. The results are as follows: 1) The rate of interest for environmental pollution and population is reduced but the rate of interest for animal protection is increased. 2) In spite of reinforcement of environmental education In school, the numbers of the students who became to know some information about that from the class are diminished. 3) Even if the children are aware of sewage seriousely, the numbers of the students who answer it is caused by domestic sewage are a few. 4) On the environmental education area, the various materials of the are not utilized well in a class. 5) On the environmental crisis to the human beings the rate is much increased in 1993 ttan that of 1988 environmental contamination is the important cause of the human beings' crises but now the rate is reduced again. In other variables except the environmental contamination, it is increased the that of 1993 on the war, on population it is showed a tendency of reduction. The results of this study are as follows : 1) It is supposed that the education should be done only not for the knowledge of environmental education but for the practice of that - animal breeding, field experience of the ecological destruction places. 2) The various environmental education materials such as TV, VTR are demanded to give the students proper information about that and to educate sufficently. 3) The course of fields exploration for environmental education should be prepared under cooperation of the authorities concerned. 4) It has to be groped for an epoch-making teaching method and the training and the practice of teachers in order to reform environmental pollution.

  • PDF

중국 한단시 자연성지 내 노거수의 특성과 관리방안 (A Study on the Characteristics and Management Plan of Old Big Trees in the Sacred Natural Sites of Handan City, China)

  • 석소정;신현실
    • 한국전통조경학회지
    • /
    • 제41권2호
    • /
    • pp.35-45
    • /
    • 2023
  • 첫째, 본 연구는 지역 원림국이 집계한 한단시 노거수의 수종과 수령 등 기본 정보를 결합해 노거수의 공간적 분포 특징을 ArcGIS 그림으로 분석하였다. 수종의 유형, 수령분포, 소유권 현황, 성장세 및 다양성 현황을 종합적으로 분석하였다. 통계적으로 콩나무과의 회화나무속, 아카시아속, 쥐엄나무속, 자귀나무속이 다수의 비중을 차지하였고, 이중 회화나무은 가장 높은 비중을 차지하였다. 회화나무는 한단시 각 현 및 구에 이르기까지 널리 또한 집중적으로 군락을 이루어 분포되어 있었다. 수령 및 분포를 보면 1000년 이상의 노거수는 회화나무, 느티나무, 향나무, 산뽕나무, 황단나무, 쥐엄나무, 황련목, 측백나무가 주를 이루었다. 둘째, 각 유형의 노거수 현황에서 발견한 바와 같이 다양한 유형의 노거수의 현황을 조사한 결과, 한단시 노거수보호 관리 체계, 보호 관리 과정 및 보호 관리 이점을 연구하여 자연성지 보호 관리에서 한단시 노거수의 역할을 분석하여, 노거수의 보호는 주로 지역사회를 주체로 하는 문화, 신앙적 보호형태를 보이며 보호상태는 성장환경과 밀접한 관련이 있다. 현재 노거수 보호의 핵심 동력은 주로 노거수에 대한 숭배이다. 그 신성함을 노거수에 기탁하여 자연이 노거수에 부여한 자연적 성품을 사회 활동의 지도의식으로 승화시켜 자연의 '미(美)'와 인격의 '선(善)'이 잘 결합되어 있다. 노거수의 보호 상태는 주변 환경과의 상호 작용 정도 및 여러 문화 및 주체의 참여와 밀접한 관련이 있다. 장기간의 노거수 성장 과정에서 점차 주변 환경과 지속적으로 상호 작용하여 상향식 및 하향식의 교차 지역, 다문화 및 다중 주체가 참여하는 '자연-문화-경관' 시스템이 자발적으로 구축되는 과정에서 노거수를 중심으로 자연성지가 형성된 것으로 보인다. 셋째, 중국은 노거수보호와 회복 조치를 중점으로 하였지만, 노거수 자원의 관리 과정에서 노거수에 대한 역사, 문화적 가치, 식물 다양성 의의 및 사회적 가치에 대한 종합적인 고려가 부족하여 보호 관리시스템이 허술하다. 공간의 지역적 특징, 재산권 및 보호 상 특징, 가치상 특징의 세 가지 지표는 한단시 노거수의 자연성지 평가에 있어서 노거수를 중심으로 하여 자발적으로 형성 중인 자연성지를 발견할 수 있으며, 이는 전통 의식 관리, 자원 보호 실천, 신앙 체계 구축, 생명공동체 가치 실현 면에서 높은 가치가 있다. 이들을 장기간 보호하고 발전시킬 수 있는지에 대해서는 체계적인 관리 체계가 뒷받침되어야 한다. 넷째, 현재 중국에서는 보호 구역에 대한 인식이 아직 성숙하지 않아 '자연성지'는 자연보호구역 체계가 구축되는 과정에서 중요한 연구 내용으로 다루어야 한다. 상향식 지역사회 참여를 주체로 하는 자연성지 관리 형태는 현재 중국의 하향식 자연보호구역 관리 유형에 대한 강력한 보완이다. 이를 기초로 하여 노거수 보호를 자연보호구역 체계에서 천연기념물이라는 자연보호구역 형태에 포함해야 한다. 또한 자연보호구역 주변 지역 주민도 생물 다양성 보전의 주체 중 하나가 되어야 한다.

심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례 (The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case)

  • 이은곤
    • Asia pacific journal of information systems
    • /
    • 제24권3호
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

콘텐츠 중심 네트워킹 환경에서의 Interest Packet Flooding 대응 연구 (A Study on Countermeasure for CCN Interest Flooding Attack)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제16권8호
    • /
    • pp.954-961
    • /
    • 2013
  • 미래 인터넷 기술 중 하나인 콘텐츠 중심 네트워킹(CCN)은 네트워크 성능 향상을 위하여 네트워크 노드들이 수신된 콘텐츠를 임시 저장하고, 해당 콘텐츠에 대한 요청을 수신하면 임시 저장된 콘텐츠를 이용하여 네트워크 노드가 이를 직접 처리한다. 또한, CCN은 IP 주소와 같은 호스트 Identity 대신 계층화된 콘텐츠 이름을 이용하여 패킷을 전송하고, 요청자 프라이버시 보호를 위하여 요청 메시지는 요청자 정보를 포함하지 않기 때문에 콘텐츠 제공자와 네트워크 노드들은 실제 요청자를 식별할 수 없다. 수신된 콘텐츠를 요청자에게 전송하기 위하여 네트워크 노드는 PIT(Pending Interest Table)에 요청 메시지와 해당 요청 메시지의 유입경로 정보를 기록하고, 콘텐츠를 수신하면 기록된 PIT 정보를 이용하여 해당 콘텐츠를 요청자에게 전송한다. 만약 PIT 저장 공간이 고갈되면, 콘텐츠 요청 메시지와 수신된 콘텐츠를 정상적으로 처리할 수 없다. 그러므로 안전한 CCN 구현을 위해서는 PIT 저장 공간 고갈을 목적으로 하는 공격의 탐지와 대응이 필요하다. 본 논문에서는 PIT 저장 공간에 대한 공격 탐지 및 대응을 위하여 공격 메시지 유입 경로에 따른 공격탐지/제어 방안을 제안하고, 공격 제어를 위한 메시지 구조를 함께 제안한다. 또한, 제안된 방식을 시뮬레이션을 통하여 그 성능을 평가 한다.

영국 NHS의 모성서비스 관련 의료과오보상제도의 경험과 그 함의 (The NHS litigation scheme related to Maternity Services in UK: its experiences and implications)

  • 한동운;황정혜
    • 의료법학
    • /
    • 제11권2호
    • /
    • pp.181-208
    • /
    • 2010
  • Maternity services is often perceived as a troublesome business and obstetric litigation is on the increase in Western countries. Overall, the number of claim and cost of litigation to the NHS Litigation Authority (NHSLA) from maternity services in the UK is increasing every year. Maternity services account for 60-70% of the total sum paid. This has widespread implications for both the individual practitioners and the institutions where they work, due to increasing malpractice insurance premiums. Fear of litigation is also attracting fewer medical graduates into the specialty, leading to a recruitment crisis in obstetrics and gynaecology. The litigation process can cause pain, suffering and distress to clinicians as well as to the patients and their families. Litigation in maternity services is the result of a complex of events when malpractice (presumed or real) impacts on the attitude of pregnant women and their environment. In such complexity, information is mandatory but may often be misinterpreted. If messages are not tailored to the receiver's capacity, communicating well with the pregnant patient becomes crucial. Therefore, to reduce medicallegal issues in obstetrics, increasing attention and an applicable standard of obstetric care to avoid negligence and medical errors should go along with other measures. Considering UK's experiences, NHS redress scheme make it easier to pursue small claims and birth related claims, without necessarily reducing the number of claims processed through the conventional legal system and perhaps encouraging even more of them. The task of dealing with the greater number of inquiries into their practice would inevitably create an added burden for clinicians and hospital managers. Thus further proposals are required to limit the cost of processing inflated claims and to consider whether clinicians should be given some protection from litigation alleging a failure to prevent birth related impairment.

  • PDF

수의학 훈련을 위한 슬개골 수술 햅틱 시뮬레이터 (A Patellar Surgery Haptic Simulator for Veterinary Training)

  • 이준;엄기동;서안나
    • 한국컴퓨터그래픽스학회논문지
    • /
    • 제26권1호
    • /
    • pp.1-6
    • /
    • 2020
  • 소동물의 슬개골 수술은 인간의 뼈보다 약하여 수술의 난이도가 어렵기 때문에, 소 동물의 슬개골 탈구 치료 수술 과정의 학습은 수의사에게 매우 중요하다. 소 동물의 슬개골 수술 훈련은 사체를 이용한 훈련을 하고 있으나 소 동물의 사체가 부족하기 때문에 시청각 자료나 수술 참관으로 수술을 학습하고 있어 수의학과 학생 및 전문 수의사들에게 충분한 훈련 환경이 제공되지 못하는 상황이다. 본 논문에서는 이러한 문제를 해결하기 위하여 소동물의 슬개골 수술을 위한 햅틱 시뮬레이터를 제안한다. 제안한 시뮬레이터는 슬개골 드릴링 수술에 적용시켰으며 소동물의 드릴링에 대한 Force Feedback을 모델링하고 햅틱 인터페이스를 제공하고, 사용자가 몰입하여 수술 경험을 할 수 있는 워크 벤치를 제공하였다. 본 논문에서 제안된 슬개골 햅틱 시뮬레이터가 제공하는 드릴링 과정에서 햅틱 피드백에 대한 사용자 평가 결과 유의미한 결과를 얻을수 있었다.