• Title/Summary/Keyword: Information Security Committee

Search Result 55, Processing Time 0.027 seconds

A Legal Study on the Game Industry Promontion Act Bill for Establishing The Game User Committee (게임산업법(안)상 게임물이용자위원회에 관한 법적 검토 연구)

  • Park, Se-Hun;Kyen, Seung-yup
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.173-174
    • /
    • 2022
  • 최근 확률형 아이템이 이용자들에게 투입 비용보다 높은 가치의 아이템을 획득할 수 있을 것이라는 막연한 기대감을 갖게 만들어, 게임 이용자의 사행성을 조장하고 과소비를 부추긴다는 우려가 제기되고 있다. 특히 복잡한 확률구조와 관련하여 허위로 표시하는 등 거짓 또는 과장 광고가 만연하여 게임 업계의 자율규제가 실효성을 잃고 게임제작업자가 허위로 확률을 고지하여 이용자들을 기만하는 사례 등이 사회적으로 문제가 되고 있다. 이에 국민의힘 하태경 의원이 일정 규모 이상 게임제작업자는 게임물이용자위원회를 두도록 하는 게임산업진흥에 관한 법률 일부개정(안)을 2021년 3월 24일 대표발의하였는데, 이 법안이 게임산업을 과도하게 규제한다는 비판이 제기되고 있는바, 해당 법안을 분석하여 입법취지에 부합하는 개선방안을 제시하고자 한다.

  • PDF

A National Monitoring System Supporting E-Navigation

  • Jeong, Jung-Sik;Park, Seong-Hyun;An, Kwang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.335-338
    • /
    • 2006
  • This report introduces a National Vessel Monitoring System(NVMS) within the General Information Center On Maritime Safety and Security(GICOMS) project and a national legislation system for ship's safety management in Korea. We also represent future directions of NVMS in terms of E-Navigation(E-Nav), which is the new study item for COMSAR and NAV that has been adopted from the Maritime Safety Committee(MSC) 81st session. It concludes the future E-Nav system, when it is built, that all functions of NVMS should be used by NVMS controllers as well as mariners, and we should also consider the existing NVMS infrastructure including S/W and H/W.

  • PDF

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

A Study on the Building Plan of Disaster Area Network for Establishment of Crisis Management System (위기관리체계 확립을 위한 재난통신망 구축방안에 관한 연구)

  • Park, Namkwun;Lee, JuLak
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.192-198
    • /
    • 2014
  • In the current times, large-scale disasters, such as the recent sinking of Se-Wol ferry, are occurring continuously and unexpectedly. In order to minimize damage in the disaster scene, quick delivery and sharing of information between crisis management agencies is one of crucial factors that determine the scale of the damage. However, ineffective communication persists between the agencies in disaster scenes where disaster management action has to be carried out urgently. For that, this research focused on the actual condition of the inter-agency communication method and wireless operations, and also suggested the building plan of effective and efficient networking through understanding of each agency's present state and duties.

An exploratory study on the development of a device for isolation unit in CBRNE disaster (CBRNE 재난 시 격리이송을 위한 장치 개발에 관한 탐색적 연구)

  • Ham, Seung Hee;Park, Namkwun;Yoon, Myong O
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.1
    • /
    • pp.65-71
    • /
    • 2018
  • In this study, it is aimed to prevent the spread of pollutants in the event of a major disaster caused by CBRNE accidents and attacks and build up system to provide optimal transport environment for each patient condition By identifying characteristics of existing products and make them immediately applicable in the field. The purpose of this study is suggesting essential consideration in both functional and performance in the development of the isolation unit. As a result of the study, it suggests (1) basic function, (2) efficient field utilization, (3) isolation unit interface and combination of modules in development of isolation unit.

Analysis on the Current Status of the Fourth Industrial Revolution-Oriented Curriculum of the Computer and Software-Related Majors Based on the Standard Classification (표준분류에 기준한 컴퓨터 및 소프트웨어 관련 전공의 제4차 산업혁명중심 교육과정 운영 현황 분석)

  • Choi, Jin-Il;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.587-592
    • /
    • 2020
  • This paper analyzed the curriculum of computer and software-related majors educating the core IT-related skills needed for the 4th Industrial Revolution. The analysis was conducted on 158 majors classified as applied software, computer science and computer engineering according to the standard classification of university education units by the Standard Classification Committee of the Korean Council of University Education. The current status of introduction of curricular divided into the fields of Internet of Things(IoT) & mobile, cloud & big data, artificial intelligence(AI), and information security was analyzed among the contents of education in the relevant departments. According to the analysis, an average of 81.6% of the majors for each group of curricular organized related subjects into the curriculum. The Curriculum Response Index for the 4th industrial revolution(CRI4th) by major, calculated by weighting track operations by education sector, averaged 27.5 point out of 100 point. And the IoT & mobile sector had the highest score of 42.3 points.

Design and Implementation of a Copyright Protection System base on the Program on-line Registration System (프로그램 온라인 등록 시스템기반의 저작권 보호시스템 설계 및 구현)

  • Jang Jae-Hyeok;Lee Jong-Sup;Choi Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.275-283
    • /
    • 2006
  • Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator's illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.

  • PDF

Development of an Assistant Model for Child Care Accreditation (보육시설 평가인증 조력 현황분석 및 조력체계 개발)

  • Hwang, Ock Kyeung
    • Korean Journal of Childcare and Education
    • /
    • v.3 no.2
    • /
    • pp.123-146
    • /
    • 2007
  • This study has attempted to suggest an assistant model for systematic child care accreditation. This has been carried out from the current consciousness of such needs for child care accreditation as large regional disparity in assistant level, no indication to definite contents and method of assistance, demand for assistant professionals with intensified capacity and requirement for the support of financial and human resources. Six stages of assistant process: the stage of establishment and management of preparation class, the stage of application for assistance and consultation, the stage of assistant meeting, the stage of workshop and observation to exemplary institutions, and the stage of practical application and evaluation of visiting assistance have been suggested. Particularly in order to improve the efficiency of assistance, organization of a committee of expert advisors in each area has been indicated. For the guideline of assistant management, operation of preparation class for accreditation, security of assistant committee members, provision of systematic training and assistant manual, development of supervision program and financial support have been suggested. This assistant manual will contribute to systematic and efficient conduct of assistance program of child care accreditation.

  • PDF

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Security Credential Management & Pilot Policy of U.S. Government in Intelligent Transport Environment (지능형 교통 환경에서 미국정부의 보안인증관리 & Pilot 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.13-19
    • /
    • 2019
  • This paper analyzed the SCMS and pilot policy, which is pursued by the U.S. government in connected vehicles. SCMS ensures authentication, integrity, privacy and interoperability. The SCMS Support Committee of U.S. government has established the National Unit SCMS and is responsible for system-wide control. Of course, it introduces security policy, procedures and training programs making. In this paper, the need for SCMS to be applied to C-ITS was discussed. The structure of the SCMS was analyzed and the U.S. government's filot policy for connected vehicles was discussed. The discussion of the need for SCMS highlighted the importance of the role and responsibilities of SCMS between vehicles and vehicles. The security certificate management system looked at the structure and analyzed the type of certificate used in the vehicle or road side unit (RSU). The functions and characteristics of the certificates were reviewed. In addition, the functions of basic safety messages were analyzed with consideration of the detection and warning functions of abnormal behavior in SCMS. Finally, the status of the pilot project for connected vehicles currently being pursued by the U.S. government was analyzed. In addition to the environment used for the test, the relevant messages were also discussed. We also looked at some of the issues that arise in the course of the pilot project.