• Title/Summary/Keyword: Protection of Research Information

Search Result 1,326, Processing Time 0.033 seconds

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

Effects of Experimental Attitude and Perceived Privacy Protection on the Satisfaction and Loyalty: A Case of Unmanned Convenience Store (무인편의점 이용객의 실험태도와 개인정보보호가 만족도 및 충성도에 미치는 영향에 관한 연구)

  • Sai Wang;Tae-Woo Roh;Jin-Ho Noh
    • Korea Trade Review
    • /
    • v.46 no.4
    • /
    • pp.17-37
    • /
    • 2021
  • This study aims to examine the effects of experimental attitudes and perceived personal information protection on satisfaction and loyalty for Chinese consumers who use unmanned convenience stores. The important results of this study are as follows. First, consumers' perception of the experimental servicescape of unmanned convenience stores in China has an effect on the consumer's experimental attitude. Consumers' perception of experimental diversity in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Second, consumers' perception of the information quality of unmanned convenience stores in China has an impact on the consumer's personal information protection. Consumers' perception of the service quality of unmanned convenience stores in China has an impact on consumer's personal information protection. Third, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Fourth, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on consumer satisfaction with experiments. Consumers' perception of the experiment attitude of unmanned convenience stores in China has an effect on the consumer's satisfaction with the experiment.

Radiation protection in dental clinic (치과에서의 방사선안전관리)

  • Lee, Sam-Sun
    • Imaging Science in Dentistry
    • /
    • v.37 no.3
    • /
    • pp.117-126
    • /
    • 2007
  • Although the diagnostic information provided by radiographs may be of definite benefit to the patients, the radiographic examination does carry the potential for harm from exposure to ionizing radiation. Therefore we should try to expose radiation as low as reasonably achievable and to give diagnostic information to patients as much as possible. All of dentists should have competence in radiation protection. I wish to deal with what we should do for the optimization of radiation protection in dental clinic.

  • PDF

Protection of Personal Information on Cloud Service Models (클라우드 서비스 유형별 개인정보보호 방안)

  • Lee, Bosung;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1245-1255
    • /
    • 2015
  • As cloud computing services become popular, the concern on the data security of cloud services increases and the efforts for the data security become essential. In this paper, we describe the pros and cons of cloud computing including the definition of cloud. Then, we discuss the regulations about the protection of user data defined in cloud promotion act. Previous studies related to the privacy protection and the entrustment of personal information in cloud computing are reviewed. We examine how to store the personal information depending on the cloud service model. As a result, we argue that the entrustment of personal information should vary according to the cloud service model and we propose how to protect the personal information on IaaS and SaaS cloud service models.

Analysis of regulatory action for environmental protection in International Commerce (국제교역에 있어 환경보호를 위한 규제조치의 내용 분석)

  • Lee, Jae-Young
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.379-403
    • /
    • 2009
  • The Purpose of this study is to research the problems of trade restriction for an environment protection. Environmental regulation relate to trade are Convention on International Trade in Endangered Species of Wild Fauna & Flora, Montreal Protocol on Substances that Deplete the Ozone Layer, Kyoto Protocol to the UN Framework Convention on Climate Change, Basel Convention on the Control of Transboundary Movements of Hazardous Wastes & Their Disposal, Cartagena Protocol on Biosafty and WTO Agreement. Regulatory action for environmental protection has economics instrument, command & control, liablity, damage compensation, voluntary agreement. In the case of our country, impact of regulatory action for environmental protection is low. Because is recognized position of developing country yet. For in the balance rules of trade and enviroment, First must satisfy WTO's basic principles and principle of quantitative restrictions prohibition, Second, operation of protection action must reasonable and objective standards Third, must satisfy GATT article 20 (b) clause and (g) protestation each essential factor To grow for environment advanced country, we should do i) using of FTA ii) international cooperation strengthening for developing country position iii) construction of environment information network

  • PDF

An Study on Privacy Policy Research Trend: Focused on KCI Published (개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로)

  • Bok, Jun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.81-89
    • /
    • 2020
  • Since the Korean privacy policy was legalized in 2011, the related academical researches have been lasted in various fields. Upcoming so-called 3 data laws would be implemented, it is meaningful to review privacy policy studies for exploring future research direction. For this purpose, the total of 146 journals from 2011 to 2019 were reviewed by the content analysis following as research subjects, methodologies and constructions of studies. As results, the numbers of the researches have been conducted on protection policies themselves for improvement, comparing with other countries' policies and also digital finance information protection were deeply discussed. Some of technology based protection applications were experimented and suggested. The major research characteristics was mainly focused on case analysis and criminal laws and policies were developed as protection contingencies. However, most research objects were focused on the protection regulations, not deregulation, therefore, researchers in future study need to explore more digital industry-centric tasks which are practically applied in safer ways. Further, social agreement in using private information will be an essential to prevent indiscriminate use.

Literature Review and Current Trends of Automated Design for Fire Protection Facilities (화재방호 설비 설계 자동화를 위한 선행연구 및 기술 분석)

  • Hong, Sung-Hyup;Choi, Doo Chan;Lee, Kwang Ho
    • Land and Housing Review
    • /
    • v.11 no.4
    • /
    • pp.99-104
    • /
    • 2020
  • This paper presents the recent research developments identified through a review of literature on the application of artificial intelligence in developing automated designs of fire protection facilities. The literature review covered research related to image recognition and applicable neural networks. Firstly, it was found that convolutional neural network (CNN) may be applied to the development of automating the design of fire protection facilities. It requires a high level of object detection accuracy necessitating the classification of each object making up the image. Secondly, to ensure accurate object detection and building information, the data need to be pulled from architectural drawings. Thirdly, by applying image recognition and classification, this can be done by extracting wall and surface information using dimension lines and pixels. All combined, the current review of literature strongly indicates that it is possible to develop automated designs for fire protection utilizing artificial intelligence.

Vulnerability Countermeasures for Information Security in Smart Work Services (스마트워크 서비스에서 정보보호를 위한 취약성 대응 방안)

  • Kim, Ji Seog;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.69-81
    • /
    • 2017
  • Smart work refers to enhancing the efficiency of work by utilizing smart devices. Smart work improves business productivity by improving business productivity of companies, reducing costs, but there is a threat to various information protection. To operate telecommuting, mobile office, and smart work center, hardware and software are needed to support various network resources, servers, and platforms. As a result, there are many vulnerabilities to security and information protection that protect information resources. In this paper, we analyze the smart work environment for smart work service and analyze vulnerability for smart work information protection through analysis of IOS27001 and KISA-ISMS. We have developed requirements for information protection requirements for users and service providers. We have developed a solution for information security protection for smart work environments such as common parts, mobile office, telecommuting, and smart work center for security threats and weaknesses per smart work type.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

Current Status of the Ecosystem at the Nakdong River Estuary and Management Plan (낙동강하구의 생태계 현황과 관리방안)

  • Sangwook Han;Kwangjin Cho;Pyoungbeom Kim;Haeseon Shin
    • Journal of Environmental Science International
    • /
    • v.32 no.12
    • /
    • pp.943-953
    • /
    • 2023
  • This study analyzed the ecological characteristics of the wetland protection area at tthe Nakdong River through vegetation and biota surveys, which showed that brackish water meets fresh water, a unique ecological environment has been created, biodiversity is high, and diverse habitats are distributed. Eleven plant communities, including four woody communities and seven grass communities, are distributed along the coast, and a total of 514 species, including 11 endangered wildlife species, were identified in terms of species diversity. Among them, the species diversity of the Eulsuk-do area was found to be relatively higher than that of other Barreir Islands areas. The presence of a population of Sterna albifrons on Sinja-do and a population of Eremias argus on Jinwo-do, an area outside the boundaries of the wetland protection area, confirmed the conservation value of the wetlands and the need to expand the boundaries of the wetland protection area. It is judged that this information can be used as basic information for a systematic conservation and management plan for the wetland protection area at the Nakdong River Estuary and as basic data to support the establishment of a policy.