• Title/Summary/Keyword: Information protection activities

Search Result 194, Processing Time 0.026 seconds

Protection of Diversity through the Control of the Delimitation of the Audience Share in German Television (독일에서의 시청점유율제한을 통한 다양성 보호 연구)

  • Shim, Young-Sub
    • Korean journal of communication and information
    • /
    • v.51
    • /
    • pp.117-135
    • /
    • 2010
  • The regulation of media concentration which is provided in the German Interstate Treaty on Broadcasting (RStV) is part of the rules forming the "positive broadcasting order" required by German Constitutional Law. This control ensures that the diversity of viewpoints can be articulated to the public. Broadcasting must operate independently from the state and from particular social groups if it is to be a genuine service to the public. One risk of economic competition in the media is a tendency towards the concentration of business enterprises. Moreover, economic competition is no guarantee for journalistic diversity. The aim of balanced diversity in the broadcasting sector can only be pursued by creating conditions under which different voices obtain the chance to be heard in an equitable manner. Within the framework of the meaning of section 26, it shall be assumed that there is a predominant impact on public opinion if the programs attributable to one company reach an annual audience share of 30 percent. The same shall apply if the company reaches an audience share of 25 percent and holds a dominant position in a related media-market or an overall assessment of its activities in television. The restriction of audience shares has limits such as that the audience shares of news programs and education and entertainment programs are pooled. Therefore, there is a vagueness about the productivity of different program branches.

  • PDF

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

Korea Barcode of Life Database System (KBOL)

  • Kim, Sung-Min;Kim, Chang-Bae;Min, Gi-Sik;Suh, Young-Bae;Bhak, Jong;Woo, Tae-Ha;Koo, Hye-Young;Choi, Jun-Kil;Shin, Mann-Kyoon;Jung, Jong-Woo;Song, Kyo-Hong;Ree, Han-Il;Hwang, Ui-Wook;Park, Yung-Chul;Eo, Hae-Seok;Kim, Joo-Pil;Yoon, Seong-Myeong;Rho, Hyun-Soo;Kim, Sa-Heung;Lee, Hang;Min, Mi-Sook
    • Animal cells and systems
    • /
    • v.16 no.1
    • /
    • pp.11-19
    • /
    • 2012
  • A major concern regarding the collection and storage of biodiversity information is the inefficiency of conventional taxonomic approaches in dealing with a large number of species. This inefficiency has increased the demand for automated, rapid, and reliable molecular identification systems and large-scale biological databases. DNA-based taxonomic approaches are now arguably a necessity in biodiversity studies. In particular, DNA barcoding using short DNA sequences provides an effective molecular tool for species identification. We constructed a large-scale database system that holds a collection of 5531 barcode sequences from 2429 Korean species. The Korea Barcode of Life database (KBOL, http://koreabarcode.org) is a web-based database system that is used for compiling a high volume of DNA barcode data and identifying unknown biological specimens. With the KBOL system, users can not only link DNA barcodes and biological information but can also undertake conservation activities, including environmental management, monitoring, and detecting significant organisms.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

A Data-Driven Approach and Network Analysis of Technological Innovation Resources in SMEs (데이터 기반 접근법을 활용한 중소기업 기술혁신자원의 네트워크 분석)

  • Kyung Min An;Young-Chan Lee
    • Knowledge Management Research
    • /
    • v.24 no.4
    • /
    • pp.103-129
    • /
    • 2023
  • This study aims to analyze the network structure of technological innovation resources in SMEs, especially manufacturing firms, and reveal the differences between innovative and non-innovative firms. The study first analyzes connection centrality, flow-mediated centrality, and power centrality for all firms, and derives structural equivalence through CONCOR analysis. Then, the network structure of innovative and non-innovative firms was compared and analyzed according to innovation performance and creation. The results show that entrepreneurship and corporate innovation strategy have a significant impact on the analysis of technological innovation resources of all firms. According to the CONCOR analysis, the innovation resources of SMEs are organized into seven clusters, which can be defined as intrinsic product innovation resources, competitive advantage promotion resources, cooperative activities resources, information system resources, and innovation protection resources. The network analysis of innovative and non-innovative firms showed that innovative firms focused on enhancing competitiveness and improving quality, while non-innovative firms tended to focus more on existing products and customers. In addition, innovative firms had eight clusters, while non-innovative firms had six clusters, suggesting that innovative firms utilize resources diversely to pursue structural change and new value creation, while non-innovative firms operate technological innovation resources in a more stable form. This study emphasizes the importance of entrepreneurship and corporate innovation strategy in SMEs' technological innovation, and suggests that strong internal efforts are needed to increase innovativeness. These findings have important implications for strategy formulation and policy development for technological innovation in SMEs.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.

The Reserch on Actual Condition of Crime of Arson Which Occurs in Korea and Its Countermeasures (방화범죄의 실태와 그 대책 - 관심도와 동기의 다양화에 대한 대응 -)

  • Choi, Jong-Tae
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.371-408
    • /
    • 1997
  • This article is the reserch on actual condition of crime of arson which occurs in Korea and its countermeasures. The the presented problem in this article are that (1) we have generally very low rate concern about the crime of arson contrary to realistic problems of rapid increase of crime of arson (2) as such criminal motives became so diverse as to the economic or criminal purpose unlike characteristic and mental deficiency of old days, and to countermeasure these problems effectively it presentation the necessity of systemantic research. Based on analysis of reality of arson, the tendency of this arson in Korea in the ratio of increase is said to be higher than those in violence crime or general fire rate. and further its rate is far more greater than those of the U.S.A. and Japan. Arson is considered to be a method of using fire as crime and in case of presently residence to be the abject, it is a public offense crime which aqccompany fatality in human life. This is the well It now fact to all of us. And further in order to presentation to the crime of arson, strictness of criminal law (criminal law No, 164 and 169, and fire protection law No. 110 and 111) and classification of arsonist as felony are institutionary reinforced to punish with certainty of possibility, Therefore, as tendency of arson has been increased compared to other nations, it is necessary to supplement strategical policy to bring out overall concerns of the seriousness of risk and damage of arson, which have been resulted from the lack of understanding. In characteristics analysis of crime of arson, (1) It is now reveald that, in the past such crime rate appeared far more within the boundary of town or city areas in the past, presently increased rate of arsons in rural areas are far more than in the town or small city areas, thereby showing characteristics of crime of arson extending nation wide. (2) general timetable of arson shows that night more than day time rate, and reveald that is trait behavior in secrecy.(3) arsonists are usually arrested at site or by victim or report of third person(82,9%).Investigation activities or self surrenders rate only 11.2%. The time span of arrest is normally the same day of arson and at times it takes more than one year to arrest. This reveals its necessity to prepare for long period of time for arrest, (4) age rate of arson is in their thirties mostly as compared to homicide, robbery and adultery, and considerable numbers of arsons are in old age of over fifties. It reveals age rate is increased (5) Over half of the arsonists are below the junior high school (6) the rate of convicts by thier records is based on first offenders primarily and secondly more than 4 time convicts. This apparently shows necessity of effective correctional education policy for their social assimilation together with re-investigation of human education at the primary and secondary education system in thier life. The examples of motivation for arosnits, such as personal animosity, fury, monetary swindle, luscious purpose and other aims of destroying of proof, and other social resistance, violence including ways of threatening, beside the motives of individual defects, are diverse and arsonic suicide and specifically suicidal accompany together keenly manifested. When we take this fact with the criminal theory, it really reveals arsons of crime are increasing and its casualities are serious and a point as a way of suicide is the anomie theory of Durkheim and comensurate with the theory of that of Merton, Specifically in the arson of industrial complex, it is revealed that one with revolutionary motive or revolting motive would do the arsonic act. For the policy of prevention of arsons, professional research work in organizational cooperation for preventive activities is conducted in municipal or city wise functions in the name of Parson Taskforces and beside a variety of research institutes in federal government have been operating effectively to countermeasure in many fields of research. Franch and Sweden beside the U.S. set up a overall operation of fire prevention research funtions and have obtained very successful result. Japan also put their research likewise for countermeasure. In this research as a way of preventive fire policy, first, it is necessary to accomodate the legal preventitive activities for fire prevention in judicial side and as an administrative side, (1) precise statistic management of crime of arson (2) establishment of professional research functions or a corporate (3) improvement of system for cooperative structural team for investigation of fires and menpower organization of professional members. Secondly, social mentality in individual prospect, recognition of fires by arson and youth education of such effect, educational program for development and practical promotion. Thirdly, in view of environmental side, the ways of actual performance by programming with the establishment of cooperative advancement in local social function elements with administrative office, habitants, school facilities and newspapers measures (2) establishment of personal protection where weak menpowers are displayed in special fire prevention measures. These measures are presented for prevention of crime of arson. The control of crime and prevention shall be prepared as a means of self defence by the principle of self responsibility Specifically arsonists usually aims at the comparatively weak control of fire prevention is prevalent and it is therefore necessary to prepare individual facilities with their spontaneous management of fire prevention instead of public municipal funtures of local geverment. As Clifford L. Karchmer asserted instead of concerns about who would commit arson, what portion of area would be the target of the arson. It is effective to minister spontaveously the fire prevention measure in his facility with the consideration of characteristics of arson. On the other hand, it is necessary for the concerned personnel of local goverment and groups to distribute to the local society in timely manner for new information about the fire prevention, thus contribute to effective result of fire prevention result. In consideration of these factors, it is inevitable to never let coincide with the phemonemon of arsons in similar or mimic features as recognized that these could prevail just an epedemic as a strong imitational attitude. In processing of policy to encounter these problems, it is necessary to place priority of city policy to enhancement of overall concerns toward the definitive essense of crime of arson.

  • PDF

Color Marketing Strategy of Milk Packaging (우유 Packaging 색채 마케팅전략)

  • Kim, Kyung-Hwa;Na, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.197-210
    • /
    • 2012
  • In this research, we executed a questionnaire survey targeting men and women in 20' or more who reside in the metropolitan area and have experienced purchasing the vehicles in order to study how Promotion Mix Activity affects Brand assets, and ultimately what kind of relation it has with Purchase intention. In the statistical process of collected data, we analyzed the data by using SPSS 12.0 for Windows statistical package and AMOS 7.0 program. As the result of analysis, first, when we analyzed the relation of the Promotion Mix Activity and Brand Assets of the companies, the more affirmative the assessment on the advertising activities of the companies was, the higher the brand popularity, royalty and image increased, And it appeared that as the assessment on PR activities of the companies got more affirmative, the brand popularity, image and royalty increased. Second, as the result of the analysis of the relation between salespersons' Promotion Activities and Brand assets, it appeared that salespersons' social capacity improved Brand awareness and royalty and their strategic capacity improved Brand awareness, royalty and image. Third, seeing the result of the analysis on the relation between Brand assets and Purchase intention, it was shown that Brand popularity had a meaningful positive(+) effect upon satisfaction and repurchase(oral) intention, and Brand royalty had a meaningful positive(+) effect upon satisfaction and repurchase(oral) intention. In addition, it appeared that Brand image had a meaningful positive(+) effect upon satisfaction and repurchase(oral) intention, and finally it could be known that Brand assets had a close correlation with Purchase intention. Therefore, this research established the color marketing strategy as follows. First, we shall build up the functional role such as aesthetic favor, information communication, protection of ecosystem, publicity reinforcement etc. so as to emphasize the properties of the package design; second, we have to construct the color marketing strategy to convey the images of the commodity besides the psychological and physiological utility which colors grants, the utility used in visual conveyance as communication media; third, we should build the color marketing strategy for the integration of company image; finally we have to compose the colors fitted for the company and product style and introduce design marketing using company colors.

Biological activities of isolated phenolic compounds from Trachelospermum asiaticum var. intermedium nakai (마삭줄(Trachelospermum asiaticum var. intermedium nakai)로부터 추출한 pheonolic compounds의 생리활성)

  • Yun, Ui-Tea;Cho, Ju-Young;Jeong, Eun-Young;Jo, Jae-Bum;Lee, Eun-Ho;Kim, Byung-Oh;Cho, Young-Je
    • Food Science and Preservation
    • /
    • v.24 no.2
    • /
    • pp.282-288
    • /
    • 2017
  • This study provided the evidence activity for biological of phenolic compounds from Trachelospermum asiaticum var. intermedium nakaier as a beauty food. The contents of phenolic compounds in water and 70% ethanol extracts were 16.8 mg/g and 38.1 mg/g, respectively. DPPH free radical scavenging activities of water and ethanol extracts at $100{\mu}g/mL$ of phenolic concentration were 80.9% and 83.1%, respectively. ABTS radical decolorization activity was 95.0% in water extracts and 95.8% in ethanol extracts at $200{\mu}g/mL$ phenolic concentration. Antioxidant protection factor (PF) was determined to 2.43 and 2.45 PF in water extracts and ethanol extracts at $100{\mu}g/mL$ phenolic concentration. TBARs of water and ethanol extracts were 89.9% and 89.3% each at $200{\mu}g/mL$ phenolic concentration. The inhibitory effect of ethanol extracts at $200{\mu}g/mL$ phenolic concentration on xanthine oxidase was 50.5%. The inhibitory activity of a-glucosidase was 92.6% in ethanol extracts at $200{\mu}g/mL$ phenolic concentration. As a result, this study will provide valuable information as a functional material with antioxidant activity, inhibitory activities of xanthin oxidase and ${\alpha}-glucosidase$.

A Study on the Role of United Nations Regional Group System for the London Protocol (런던의정서에서 유엔 지역그룹체제의 역할에 관한 연구)

  • Moon, Byung-Ho;Hong, Gi-Hoon
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.13 no.3
    • /
    • pp.135-150
    • /
    • 2010
  • At the Intergovernmental Meeting held in 1972, the London Convention was adopted to prevent marine pollution from dumping of wastes and other matter. After that, at the special meeting held at the Headquarters of the International Maritime Organization in 1996, the London Convention was revised to consider advances in technology of treatment and disposal of wastes and to reflect changes in understanding of marine environment and then the London Protocol was concluded. The London Protocol states more concrete management system for ocean dumping than the London Convention and also provides that the Meeting of Contracting Parties shall establish those procedures and mechanisms necessary to assess and promote compliance with the Protocol. With the London Protocol in force since 24 March 2006, the Meeting of Contracting Parties adopted the 'Compliance Procedures and Mechanisms (CPM) pursuant to Article 11 of the 1996 Protocol to the London Convention 1972' and established the Compliance Group in 2007. According to the CPM, members of the Compliance Group shall be nominated by Contracting Parties, based on equitable and balanced geographic representation of the five Regional Groups of the United Nations, and elected by the Meeting of Contracting Parties. In 2009, the Republic of Korea nominated a member of the Compliance Group to be subsequently elected by the Meeting of Contracting Parties with the approval of other states in Asia Group. Through the United Nations Regional Group System based on geographical identity or political affinity, Contracting Parties to the London Protocol are expected to form a voting bloc or to exchange information in meetings on the London Protocol. In this sense, it is noteworthy that the London Protocol introduced marine environmental management system for comprehensive prohibition of ocean dumping with exception of the so-called 'reverse-list' which had been earlier adopted by the 'Convention for the Protection of the Marine Environment of the North-East Atlantic, 1992 (OSPAR)' whose contracting parties belonged to Western European and Other States Group. In recent years, the jurisdiction of London Protocol has been extended to protect and preserve the marine environment from all sources of pollution. This will make the United Nations Regional Group System play more important roles in the activities associated with the London Protocol. For this reason, this article has considered characteristics of the United Nations Regional Group System and has analyzed influences of this Regional Group System in meetings on the London Protocol. This could provide preliminary information for the Republic of Korea to give due consideration to the United Nations Regional Group System on the activities associated with the London Protocol.