• Title/Summary/Keyword: Personal information Protection

Search Result 763, Processing Time 0.032 seconds

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Exposure Assessment of PCDD/Fs and Monitoring of Health Effects on Workers and Resident near the Waste Incinerators in Korea (국내 일부 소각장 근로자와 주변지역주민들의 PCDDs/Fs 노출과 건강 영향 평가)

  • Hong, Yun-Chul;Lee, Kwan-Hee;Kwon, Ho-Jang;Jang, Jae-Yeon;Leem, Jong-Han
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.4
    • /
    • pp.314-322
    • /
    • 2003
  • Objectives : In this study, the exposure status of the hazardous substances from incinerators, such as polychlorinated dibenzo-p-dioxins (PCDDs) and polychlorinated dibenzofurans (PCDFs), were studied , and the relationship between the exposure of these hazardous substances and their heath effects on the workers and residents near municipal solid waste (MSW) incinerators and an industrial incinerator investigated. Methods : Between July 2001 and Jure 2002, 13 workers at two MSW incinerators, 16 residents from the area around the two MSW incinerators, 6 residents from the control area, and further 10 residents near an industrial incinerator, estimated to emit higher levels of hazardous substances, were interviewed. Information, including sociodemographic information, personal habits, and work history, detailed gynecologic and other medical history were collected through interviews. Blood samples were also collected from 45 subjects, and analyzed for PCDD/DFs, by high resolution gas chromatography -high resolution mass spectrometry, using the US EPA 1613 method. In addition to the questionnaire survey, urinary concentrations of 8-hydroxydeoxyguanosine (8-OH-dG) and malondialdehyde (MDA) were measured as oxidative injury biomarkers. The urinary concentrations of 8-OH-dG were determined by in vitro ELISA, and the MDA by HPLC, using u adduct with thiobarbituric acid. Results : The PCDD/DFs concentrations in the residents near the industrial incinerator were higher than those in the controls, workers and residents near the MSW incinerators. The average TEQ (Toxic Equivalencies) concentrations of the PCDD/DFs in residents near the industrial incinerator were 53.4pg I-TEQs/g lipid. The estimated daily intakes were within the tolerable daily intake range (1-4 pg I-TEQ/Kg bw/day) suggested by WHO (1997) in only 30% to the people near the industrial incinerator. Animal studies have already shown that even a low body border of PCDD/DFs, such as 10 ng TEQ/kg bw, can cause oxidative damage in laboratory animals. Our study also showed that the same body burden of PCDD/DFs can cause oxidative damage to humans. Conclusions : The exposures to PCDD/DFs and the oxidative stress of residents near the industrial incinerator, were higher than those in the controls, workers and residents near the MSW incinerators. Proper protection strategies against these hazardous chemicals are needed. Because a lower body burden of PCDD/Fs, such as 10ng TEQ/kg bw, can cause oxidative damage, the tolerable daily intake range should be restrictedly limited to 1pg I-TEQ/kg bw/day.

Phenomenological Study about Bodyguards' Ethical Dilemmas (신변보호요원의 윤리적 딜레마에 대한 현상학적 연구)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.31-62
    • /
    • 2016
  • This study is about the phenomenological study of bodyguards' ethical dilemmas. Through this study, the meaning and essence of bodyguards' ethical dilemmas will be analyzed based on empirical facts. The purpose of this study is to provide basic information of the prevention and solutions for their ethical dilemmas and to understand and research the process and the essentials of them. To achieve this goal of the study, seven bodyguards who experienced ethical dilemmas working more than five years are selected as objects of the study. Colaizzi's six stage method are applied into this study so information gathered through interviews and questionnaire from 0ctober 1st, 2015 to November 20th, 2015 is analyzed. From the process of this research, these following conclusions are drawn considering validity of this study and ethical things. As a result, bodyguards' ethical dilemmas are divided into six centric meanings and 20 thematic statement. First, the centric meaning is conflict factors and the themes are discordance of pre-practice, regulatory or procedure problems, communication about sturcture and job and service disagreement. Second, the centric meaning is limited professional roles and the themes are institutional custom, decision making, priorities. Third, the centric meaning is difficulties of circumstantial judgement at work places and the themes are ambiguity of decision, conflict of knowledge, experience and opinion. Forth, the centric meaning is reasonable self-defense and the themes are lack of responsibility, rationalization, intentional negligence and sense of shame. Fifth, the centric meaning is difficulties of social network and the themes are the relationships between subordinates and superiors, the role of a moderator, uncooperative work and unpleasant sayings and doings. Sixth, the centric meaning is keeping secrets and the themes are burried for and illegal practice.

  • PDF

Analysis of related words for each private security service through collection of unstructured data

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is mainly to provide theoretical basis of private security industry by analyzing the perception and flow of private security from the press-released materials according to periodic classification and duties through 'Big Kinds', a website of analyzing news big data. The research method has been changed to structured data to allow an analysis of various scattered unstructured data, and the keywords trend and related words by duties of private security were analyzed in growth period of private security. The perception of private security based on the results of the study was exposed a lot by the media through various crimes, accidents and incidents, and the issues related permanent position. Also, it tended to be perceived as a simple security guard, not recognized as the area of private security, and judging from the high correlation between private security and police, it was recognized not only as a role to assist the police force, but also as a common agent in charge of the public peace. Therefore, it should objectively judge the perception of private security, and through this, it is believed that it should be a foundation for recognizing private security as a main agent responsible for the safety of the nation and maintaining social orders.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

The Present Status of and Development Plans for Legal Technology in the Fourth Industrial Revolution (4차 산업혁명시대 법정보기술의 현황과 발전방안)

  • Lee, Sung-Jin;Lee, Yeon-Ju;Son, Hyoung-Kun;Kim, Gi-Bum
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.3-21
    • /
    • 2021
  • Klaus Schwab's discussion on the Fourth Industrial Revolution provides a framework for predicting the direction of legal technology development. Technological convergence, which has emerged as the core concept of the Fourth Industrial Revolution has a significant effect on legal technology. In particular, various new technologies, such as legal chatbots and platforms, are being introduced to enhance efficiency and accessibility in the legal field. However, legal technology is still in its early stage, with institutional improvement needed to vitalize the industry. In this paper, we first specify the concept and classification of legal technology in Chapter 2, followed by trends and limitations in Chapter 3 and ways of vitalizing legal technology in the future in Chapter 4. To invigorate legal technology development, it is necessary to put in place legal regulatory measures that stipulate the active disclosure of legal data, such as precedents, and make free use of such measures. In the law, many issues, such as the safety of artificial intelligence, personal information protection, and ethical standards, will be discussed in the future. Therefore, via this paper, we hope to promote the formation of social consensus and prepare countermeasures, such as legislative measures.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Study on Utilization Drones in Domestic Logistics Service in Korea (한국내 물류서비스에 드론 활용을 위한 연구)

  • Kang, Ki-Seog;Jeon, In-Oh
    • Journal of Distribution Science
    • /
    • v.14 no.5
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - In the year of 2015 and 2016, one of the items that got attention in CES was a drone. It has been 100 years since a drone emerged, but most were used for military purposes. As its use became diverse as of 2010, it got attention of the general public. In Korea, it was in 2011 that a drone was known to the public through an aerial video shooting for television program. This study tried to come up with suggestions by comparing domestic with overseas cases, and tried to consider the related technologies and systems with applying the role of drones in logistics service. Research design, data, and methodology - The overseas cases were regarded as drone's logistical purpose. The Prime Air service by US Amazon is still not commercialized and under pre-testing due to Federal Aviation Regulations, although it started in 2013. In Germany, DHL succeeded in delivering service testing which is called Parcelcopter, but it is not commercialized yet. Other than these, there are more attempts to prepare logistics service in China with Taobao, in France with Geopost's test, and in Africa. In Korea, CJ Korea Express tested delivery with a self-developed drone Results - In order to study for utilizing drones for logistics as the prerequisites, some overseas and domestic cases, which are currently considered, were reviewed. Also, the technologies and institutional requirements to commercialize drones for logistical purpose were reviewed. The reasons for using drones in logistics is to ensure the price competitiveness by reducing cost. The empirical test also will be needed because drone pilot areas are designated by ministry of land, infrastructure and transport. Conclusions - In order to utilize drones in logistics and foster the industry, this study would like to suggest the followings. First of all, size of drones for logistics needs to be fixed and their operating system should be standardized. Centralized investment resources are needed through standardization to ensure the market occupancy. Secondly, it is necessary to get the converged businesses that do research, develop and commercialize drones with the investment of private sector. Example can be found in Korea aerospace Industries. We can respond to the rapid growth of the market with intensive investing by integrating the private sector investment. Thirdly, institutional arrangements are needed to be established quickly. In the case of high-technologies like drones, institutional support often does not follow the rapid development of the technology. The problems can be found in securing drones-only airspace, creating drone-specialized pilot's license, matters related to remote controller and complementary regulations for drones in Aviation Act. If these regulations are not prepared or complemented at the right timing, technologies cannot be commercialized even though the development is completed. Fourthly, there is a need to secure the transparency regarding possible privacy and personal information protection problem while operating drones. Finally, in order to foster this new industry, government should focus on supporting R&D more in the long term than short term outcomes.

Limitations and Challenges of Game Regulatory Law and Policy in Korea (현행 게임규제정책의 한계와 과제 : 합리적인 규제를 위한 고려사항)

  • Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.149-164
    • /
    • 2014
  • The laws and policies governing Korea's game regulations are becoming more and more topics for debate as we enter the Age of Internet. The nature of the basis for Internet regulations and policies are not rooted in freedom of speech or fundamental values of democracy, but rather focused on solving real-world problems such as protection of the youth. Furthermore, the reality is that regulatory devices for keeping the social order such as regulating gambling are being applied directly to games without consideration on the characteristics of Internet gaming, raising concerns that the expansion of constitutional values and innovative empowerment inherent to the Internet are being weakened. The Geun-Hye Park Administration which succeeded Myung-Bak Lee's Administration, even went so far as to implement the so-called "Shutdown Policy", which prohibits access to Internet games during pre-defined time zones and also instigated a time zone selection rule. In order to curb the gambling nature of Internet games, government-led policies such as the mandatory personal identification and prohibition of player selection or in other words mandatory random player selection are being implemented. These institutions can inhibit freedom of speech, which is the basis of democracy, violate the right of equality through unreasonable discrimination between domestic and foreign service providers, and infringe upon the principles of administrative law, such as laws, due process in policies, and balance in among policies and governmental bodies. Going forward, if Korea's Internet game regulations and polices is to develop in a rational manner, regulatory frameworks will need to be designed to protect the nature of the Internet and its innovative values that enable the realization of constitutional values; for example, the Internet acting as the "catalytic media for freedom of expression as a fundamental human right ", which has already been acknowledged by the Korea's Constitutional Court. At the same time, transparent procedures should be put into place that will allow diverse participation of stakeholders including game service providers, game users, the youth and parents in the legislation and enforcement process of regulatory institutions; policies will also need to be transformed to enable not only regulatory laws but also self-regulation system to be established. And in this process, scientific and empirical analysis on the expected effects before introducing regulations and the results of enforcing regulations after being introduced will need to be strengthened.

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.