• Title/Summary/Keyword: Internet Regulation

Search Result 209, Processing Time 0.024 seconds

Data Protection and Privacy over the Internet: Towards Development of an International Standard (온라인 정보보호 및 프라이버시에 관한 국제 표준 개발)

  • Zoo, Hanah;Lee, Heejin;Kwak, Jooyoung;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.57-69
    • /
    • 2013
  • Progresses in ICT make the processing and exchange of personal data across international borders often necessary and relatively easy. The challenge lies in protecting fundamental rights and freedoms of individuals, notably the right to privacy and the right to personal information, while encouraging the free and secure flow of information across borders for the continued expansion of online transactions. The key to establishing a functioning international solution for personal data protection is to strike a right balance between the two camps which currently dominate the debate - the advocates of individual privacy rights on one side exemplified by the EU, and the proponents of self-regulation and economic efficiency on the other, represented by the U.S. In the face of a growing tension between the two sides each equipped with their own ideals, a practical solution may lie in utilizing established institutions of standardization such as ISO and IEC as a ground upon which an agreement can take its root.

Towards a Global Understanding and Standardisation of Education and Training in Microsurgery

  • Leung, Clement Chi Ming;Ghanem, Ali M.;Tos, Pierluigi;Ionac, Mihai;Froschauer, Stefan;Myers, Simon R.
    • Archives of Plastic Surgery
    • /
    • v.40 no.4
    • /
    • pp.304-311
    • /
    • 2013
  • With an increasing emphasis on microsurgery skill acquisition through simulated training, the need has been identified for standardised training programmes in microsurgery. We have reviewed microsurgery training courses available across the six continents of the World. Data was collected of relevant published output from PubMed, MEDLINE (Ovid), and EMBASE (Ovid) searches, and from information available on the Internet of up to six established microsurgery course from each of the six continents of the World. Fellowships and courses that concentrate on flap harvesting rather than microsurgical techniques were excluded. We identified 27 centres offering 39 courses. Total course length ranged from 20 hours to 1,950 hours. Student-to-teacher ratios ranged from 2:1 to 8:1. Only two-thirds of courses offered in-vivo animal models. Instructions in microvascular end-to-end and end-to-side anastomoses were common, but peripheral nerve repair or free groin flap transfer were not consistently offered. Methods of assessment ranged from no formal assessment, where an instructor monitored and gave instant feedback, through immediate assessment of patency and critique on quality of repair, to delayed re-assessment of patency after a 12 to 24 hours period. Globally, training in microsurgery is heterogeneous, with variations primarily due to resource and regulation of animal experimentation. Despite some merit to diversity in curricula, there should be a global minimum standard for microsurgery training.

Expression Study of a Recombinant Plasmid containing Dipeptidyl Peptidase-4 Gene in E. coli: A Plausible Application for Celiac Disease Patients to Digest Gluten

  • Lee, Yeonjae;Kang, Ryan;Kwon, Jenna;Jo, Kyuhee;Im, Jungbin;Jung, Sangwook;Lee, DongHyun;Lee, Juhyeon;Lee, Jeong-Sang
    • International journal of advanced smart convergence
    • /
    • v.7 no.2
    • /
    • pp.101-111
    • /
    • 2018
  • Celiac disease (CD) is an immune-mediated enteropathy of small intestine diagnosed in both childhood and adulthood. CD is caused by gluten, which produces gliadorphin during its digestion. The enzyme dipeptidyl peptidase-4 (DPP4) breaks gliadorphin down nevertheless the last tripeptide remains and eventually inhibits DPP4, thus slowing down its process. Therefore, the idea is to produce an additional DPP4 enzyme which is crucial. Consequently, the functional DPP4 gene was cloned into pCDNA3 intermediate (FLAG+DPP4) vector and finally a recombinant plasmid pSB1C3 (Andersons promoters+FLAG+DPP4) was constructed using synthetic biology. Normally, a DPP4 inhibitor is used as a cure for diabetes. Another important concern was overexpression of DPP4, which might lead to diabetes, accordingly the work was also performed for the regulation of the DPP4 gene expression. In this regard, three types of Anderson promoters (strong, moderate and weak) were utilized to study the control overexpression. This is the first report of idealistic trial for control the exogenous DPP4 gene-expression by molecular biologic tools.

A Study on Policy Recommendations for Post-Monitoring System of the Energy Efficiency Labeling Program (에너지소비효율등급제 사후관리 개선방안 연구)

  • Lim, Ki Choo
    • Journal of Energy Engineering
    • /
    • v.24 no.2
    • /
    • pp.179-186
    • /
    • 2015
  • This study suggests a few solutions to improve the post-monitoring activities under the Energy Efficiency Labeling Program. First, samples should be selected from each category for the post-monitoring activities, taking account of the consumer's continuous buying behavior, while it is also important to form and operate a deliberation committee. Second, it is necessary to alleviate the checking process of the label content of 9 items which have never been violated the labeling regulation since 2005. This study suggests the detailed checking of label contents and the reinforcement of the measurement of 17 items which have violated labeling more than once over the past few years. Third, this study suggests that the entire post-monitoring process should be disclosed and be posted on the websites of related agencies and on the Internet in general.

How to Improve the Reliability of MSDS and Labels?(2): A Review on the EU CLP(REGULATION(EC) No 1272/2008) (물질안전보건자료 및 표시제도의 개선 방향 제안(2) - 유럽연합의 CLP 제도 고찰에 근거하여)

  • Kim, Shinbum;Lee, Yun Keun;Choi, Youngeun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.25 no.2
    • /
    • pp.115-125
    • /
    • 2015
  • Objectives: The major objectives of this study are to review the EU CLP Regulations to propose ways of improving the reliability of MSDS and labels. Methods: To review the EU CLP Regulations, we used EU documents including directives and regulations on chemical management. In addition, we used EU governmental agency reports to illuminate the history and background of the CLP. We found the EU CLP's instruments for reliable hazard communication and evaluated the operations of the instruments. Results: EU CLP Regulations have four instruments for the EU CLP Regulations to make hazard communication reliable. These instruments are GHS, the harmonized CMR and respiratory sensitive substances classification list, C&L inventory and restriction of trade secrets. These are highly useful for achieving the objectives of REACH and CLP(no data-no market and changing the burden of proof). Conclusions: Changing the burden of proof is a key principle for achieving a society safe from hazardous chemicals. Chemical manufacturers and importers alone should bear the responsibility for reliable MSDS. We recommend benchmarking the EU CLP Regulations in order to change efficiently the burden of proof. Trade secrets should be limited to low-hazard substances and be approved by the government before the chemical product is on the market. Like the C&L inventory, chemical product information including substances identification and hazard properties should be notified, aggregated and be opened to public on the Internet. Finally, we recommend a MSDS registration system once again.

A Study upon the Formation of Techno-surplus Society and Its Specificities (국내 기술잉여사회의 형성과 특수성 연구)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.66
    • /
    • pp.184-210
    • /
    • 2014
  • There have been technologically distorted naturalization and overzealous digital culture in the formation and development of digital society in Korea. While the suppressive aspects of the 'neo-'authoritarian control and regulation have been excessively centered on the Internet, the autonomous actions of online users from below, with regards to their roles in agenda-setting function, have been evolved as the political. This paper aims to investigate the specificities in the developmental mode of digital technology in Korean society since the mid-90s. In this paper, 'techno-surplus' depicts the state that the abnormal is embedded within a technological artifact beyond its receptive ability. 'Techno-surplus society' designates such an extreme case of specifying technological surplus. In fact, the term of 'techno-surplus society' can be used for a metaphor symbolizing our society, in which social distortion and abnormality caused by 'techno-surplus' have been quite frequently happening, in its comparison to a degree of normality in the institutional politics. This paper explores the local specificities of 'techno-surplus society', in which the regressive aspects have stand out as being more different from the technological developments in China, Japan and the U.S.

  • PDF

A Regulatory Analysis on the Reverse Discrimination against Korean Domestic Businesses in relation to the Data Protection and Regulatory Improvement Orientation (개인정보 관련 국내기업의 역차별 상황에 관한 규제 분석과 개선방안에 관한 연구)

  • Lee, Inho;Kim, Seo-An
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.1-14
    • /
    • 2020
  • IT businesses in Korea have relatively strong regulations. While providing the same service, domestic businesses are in a situation of 'reverse discrimination of regulations' as they are less competitive than global IT companies in accordance with the application of the personal information protection legislation in Korea. In this paper, Personal Information Protection legislation was classified and laws of major countries were analyzed in comparative ways. It also compared and analyzed the "private policy" presented by representative Internet sites (Naver, Daum, Google, Facebook) that provide services to users in Korea. We also proposed three aspects of legislation improvement to address reverse discrimination.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

A Development of AIS Vessel Monitoring System on online map using HTML5 (HTML5를 활용한 온라인 지도 기반 AIS선박 모니터링 시스템 구현)

  • Lee, Seo-Jeong;Lee, Jae-Wook
    • Journal of Navigation and Port Research
    • /
    • v.35 no.6
    • /
    • pp.463-467
    • /
    • 2011
  • As the increasing of requirement for safety navigation, IMO has enforced the mandatory installation of vessel AIS equipment by SOLAS regulation. The AIS transceiver broadcasts various vessel information which can be gathered by the receivers on-board or on-shore. And, recently, as web-based application developments on various devices have been increased, there are more and more requirements of AIS information presentation on internet. To meet these web-based application requirements, this paper shows the practical implementation of the AIS display system, which is on the Google maps as online commercial map and adopts the HTML5 as a web standard.

Design and Implementation of the Conversion Rule between XML and MTF Messages (MTF 메시지와 XML간 상호변환 규칙 설계 및 구현)

  • Park, In-Soo;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.781-788
    • /
    • 2005
  • MTF message is the normalized and standardized format which is used in the time when it tries to transmit data to other systems or exchanges needed information in defense message systems. XML can support variety of search functionality and is estimated to be the best way from the view of efficient presentation and exchange in internet based environment, based on advantage which is independent of hardware and software. US army brought in XML-MTF combining with XML based technology, but we do not contain such a MTF system, and necessity of MTF is increasing for combined operation between ROK and US as a lot of C4I system were transferred to Web based systems. In this paper, we make analysis of fundamental structure, organization of paragraph, witting regulation of MTF message. We present the rule of naming element and fundamental mapping rule for transformation of its XML based on it. Also, we prove that MTF message can be transformed to XML document by trying to transforming sample documents to XML document applying presented mapping rule, creating MTF message based on it and implement program which can automatically transform them to XML-MTF.