• Title/Summary/Keyword: Non-disclosure of information

Search Result 64, Processing Time 0.022 seconds

Privilege and Immunity of Information and Data from Aviation Safety Program in Unites States (미국 항공안전데이터 프로그램의 비공개 특권과 제재 면제에 관한 연구)

  • Moon, Joon-Jo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.2
    • /
    • pp.137-172
    • /
    • 2008
  • The earliest safety data programs, the FDR and CVR, were electronic reporting systems that generate data "automatically." The FDR program, originally instituted in 1958, had no publicly available restrictions for protections against sanctions by the FAA or an airline, although there are agreements and union contracts forbidding the use of FDR data for FAA enforcement actions. This FDR program still has the least formalized protections. With the advent of the CVR program in 1966, the precursor to the current FAR 91.25 was already in place, having been promulgated in 1964. It stated that the FAA would not use CVR data for enforcement actions. In 1982, Congress began restricting the disclosure of the CVR tape and transcripts. Congress added further clarification of the availability of discovery in civil litigation in 1994. Thus, the CVR data have more definitive protections in place than do FDR data. The ASRS was the first non-automatic reporting system; and built into its original design in 1975 was a promise of limited protection from enforcement sanctions. That promise was further codified in an FAR in 1979. As with the CVR, from its inception, the ASRS had some protections built in for the person who might have had a safety problem. However, the program did not (and to this day does not) explicitly deal with issues of use by airlines, litigants, or the public media, although it appears that airlines will either take a non-punitive stance if an ASRS report is filed, or the airline may ignore the fact that it has been filed at all. The FAA worked with several U.S. airlines in the early 1990s on developing ASAP programs, and the FAA issued an Advisory Circular about the program in 1997. From its inception, the ASAP program contained some FAA enforcement protections and company discipline protections, although some protection against litigation disclosure and public disclosure was not added until 2003, when FAA Order 8000.82 was promulgated, placing the program under the protections of FAR 193, which had been added in 2001. The FOQA program, when it was first instituted through a demonstration program in 1995, did not contain protections against sanctions. Now, however, the FAA cannot take enforcement action based on FOQA safety data, and an airline is limited to "corrective action" under the program. Union contracts can exclude FOQA from the realm of disciplinary action, although airline practice may be for airlines to require retraining if there is no contract in place forbidding it. The data is protected against disclosure for litigation and public media purposes by FAA Order 8000.81, issued in 2003, which placed FOQA under the protections of FAR 193. The figure on the next page shows when each program began, and when each statute, regulation, or order became effective for that program.

  • PDF

A Trajectory Substitution Privacy Protection Scheme in location-based services

  • Song, Cheng;Zhang, Yadong;Gu, Xinan;Wang, Lei;Liu, Zhizhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4771-4787
    • /
    • 2019
  • Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.

Data Mining Analysis of Educational and Research Achievements of Korean Universities Using Public Open Data Services (정보공시 자료를 이용한 교육/연구성과 영향요인 추출 및 대학의 군집 분석)

  • Shin, Sun Mi;Kim, Hyeon Cheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.1
    • /
    • pp.117-130
    • /
    • 2014
  • The purpose of this study is to provide useful knowledge for improving indicators that represent competitiveness and educational competency of the university by deriving a new pattern or the meaningful results from the data of information disclosure of universities using statistical analysis and data mining techniques. To achieve this, a model of decision tree was made and various factors that affect education/research performance such as employment rate, the number of technology transfer and papers per full-time faculty were explored. In addition to this, the cluster analysis of universities was conducted using attributes related to evaluation of university. According to the analysis, common factors affecting higher education/research performance are following indicators ; incoming student recruitment rate, enrollment rate, and the number of students per full-time faculty. In the cluster analysis, when performed by the entire university, the size, location of the university respectively, clusters are mainly formed by well-known universities, art physical non-science and engineering religious leaders training universities, and others. The main influencing factors of this cluster are higher education/research performance indicators such as employment rate and the number of technology transfer.

  • PDF

The Relation between Correction of Annual Reports and Earnings Management (사업보고서 정정보고와 이익조정의 관계)

  • Sin, Su-Jin;Jung, Kyoung-Chol;Bae, Seong-Ho
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.4
    • /
    • pp.271-289
    • /
    • 2020
  • Purpose - This paper examined the relation between Correction of Annual Reports and Earnings management. The annual reports are used as key reports for critical decision making by providing useful information to various stakeholders across the firm. Design/methodology/approach - The sequence of this study is analysed that each of the following two cases affects the earning management: 1. that corrections have been made; 2. Where financial information have been modified or non-financial information have been modified during the correction of the annual report. We draw an initial sample of firms listed on the Korea Stock Exchange from 2014 to 2017. Among these, we excluded firms that were not able to obtain the variables needed to measure the correction of Annual Reports and the earnings management. Finally, we use the 7,035 firm-year observations. Findings - Our empirical results of this study are as follows; First, it turned out that the earnings management of companies that report business reports on corrections is larger than those that do not. Second, among the types of annual report corrections, the correction of non-financial information is significantly larger on earnings management than the correction of financial information. Research implications or Originality - The correction disclosure of business reports is a very important issue in terms of accounting information accuracy and reliability. The results of this study will provide policy implications for correction disclosures and regulations due to an important issue as accounting information. An entity that initially prepares accounting information should advanced in such a way that it provides high quality accounting information and then complements and accepts it by various stakeholders.

Differential Privacy in Practice

  • Nguyen, Hiep H.;Kim, Jong;Kim, Yoonho
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.177-186
    • /
    • 2013
  • We briefly review the problem of statistical disclosure control under differential privacy model, which entails a formal and ad omnia privacy guarantee separating the utility of the database and the risk due to individual participation. It has born fruitful results over the past ten years, both in theoretical connections to other fields and in practical applications to real-life datasets. Promises of differential privacy help to relieve concerns of privacy loss, which hinder the release of community-valuable data. This paper covers main ideas behind differential privacy, its interactive versus non-interactive settings, perturbation mechanisms, and typical applications found in recent research.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

A Study of the Risk Communication on Management Policy of Asbestos Related Stakeholders (석면 이해집단의 위해도 의사소통 방법론에 관한 연구)

  • Son, Ji-Hwa;Lee, Chae-Kwan;Sim, Sang-Hyo
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.1
    • /
    • pp.79-90
    • /
    • 2014
  • Objectives: The aim of this study was to suggest preliminary data for the establishment of communication methodology of asbestos risk, fit for the features of each audiences, by grasping the features of risk communication by each element for each group survey. Methods: For this study, a questionnaire survey has been conducted from May to August 2012 and responses of 617 people including 214 school asbestos managers, 95 asbestos business managers, and 308 general public have been analyzed. Results: The feature by element of risk communication shows that to give information through non-governmental organizations with reliability such as colleges, research institutes, asbestos-related associations, etc among the entire investigated groups, is most effective. Lastly, for stakeholders related to asbestos, the public feedback for governmental asbestos management policy shows that it was considered that there is lack of reality due to comprehension deficit for situation, lack of a system of asbestos general management in the country and lack of policy connectivity among the branches of the government, and between the central government and the local government. However, the general public selected lack of various information disclosure, education, publicity for asbestos and lack of communication with citizens as the biggest problems.

The Impact of Ownership Structure on Listed Firms' Performance in Vietnam

  • VO, Dut Van;TRAN, Truc Viet Thanh;DANG, Nga Thi Phuong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.195-204
    • /
    • 2020
  • The aim of this study is to estimate the impact of ownership structure on the performance of listed firms in transition economy. Buiding upon agency theory, hypotheses on such relationship are proposed. A detailed panel data of 502 non-financial companies listed on Ho Chi Minh Stock Exchange and Hanoi Stock Exchange over the period from 2013 to 2018, and the system generalized method of moment estimation are employed to test the proposed hypotheses. To ensure the reliability of data, this study excludes companies that violate information disclosure regulations or that are subject to special supervision by the State Securities Commission of Vietnam. Some firms with inadequate information, firms that lack the financial data required for creating variable or firms that have inconsistent construction are also re-screened. We only collect the data of enterprises that have ownership structure of two or more components. Estimation results reveal that state ownership has an U-shaped relationship with the performance of Vietnamese listed firms, while foreign ownership and the degree of ownership concentration have an inverted U-shaped relationship with listed firms' performance. The article provides governance implications that Vietnamese listed firms should decrease state ownership and foreign ownership to improve firm performance in order to boost investors' confidence.

Exploratory Study on the Relationships among Social Use of the Internet, Personality, and Well-Being (인터넷의 사회적 사용, 성격 및 안녕감 관계에 대한 탐색적 접근)

  • Lee, Gyu-Dong;Kwon, Soon-Jae
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.87-103
    • /
    • 2009
  • Although the Internet has been a important communication tool in modem societies, researchers did not pay attention to its' positive impacts on individual's psychological process. The Internet provides users with a unique environment such as visual isolation, non face-to-face communication, and easiness to escape from social influences. This environment enables people to take free action according to their personality and disclose themselves. From the uses and gratification perspective, the current research reveals that individuals with high extraversion are inclined to maintain social networking sites and those with high openness participate in web communities. The findings indicate that individuals' social use of the internet may reflect their personality. This study, also, reveals that controlling the big five personality dimensions, the amount of self-disclosure through ones' social networking site is positively related with subjective happiness. This finding suggests that like confession behaviors in religious or curing facilities, people can use the Internet as a therapeutic or a preventative method for promoting their well-being. Theoretical contributions and practical implications are discussed.

A Study on the Evaluation and Generating Improvement Plan of the Government Information Locator Service(GILS) (행정정보소재안내서비스(GILS) 평가 및 개선방안에 관한 연구)

  • Lee Jee-Yeon;Park Sung-Jae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.281-297
    • /
    • 2006
  • Government Information Locator Service(GILS) allows the users to access and utilize government information by including the content description about the resource as well as the secondary information about the resources such as location and access method. The following problems have been identified, while analyzing the electronic government offered GILS to come up with the service improvement plan. Firstly, it was difficult to comprehend the record labels from the user interface point of view. There were errors in the retrieval result screens. Secondly, there were a number of missing items in the records. Thirdly, there was no explicit explanation on how to access the information. Lastly, there were no clearly explained reasons that certain information is non-disclosed or partially disclosed. Thus, it is necessary to deal with the identified problems by improving the information collection method; reorganizing the record items; heavily investing in the public relation activities; and improving the web-based access method if the revitalization of GILS is to be achieved.