• Title/Summary/Keyword: Reputation system

Search Result 198, Processing Time 0.028 seconds

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

A Study on Symbolism of Dongjo in Royal Palaces of Choseon Dynasty and Its Way of Operation - Focusing on Donggwol in 17th-18th century - (조선 궁궐, 동조(東朝)의 상징성과 $17{\sim}18$세기 대비전 조영에 관한 연구)

  • Cho, Ok-Yon
    • Journal of architectural history
    • /
    • v.16 no.6
    • /
    • pp.67-86
    • /
    • 2007
  • Choseon Dynasty, from many aspects, saw the institutional establishment of its royal palaces in the 17th and 18th century, with 'donggwol (east palace)' as the most representative form in the era. In that period, palaces were managed in the best way that fits the royal etiquette and order to maintain the Confucian framework of the times. While the royal palace was the place for the king to conduct state affairs, it was also a compound for the royal family to lead a life in. Since the royal family was also based on the Confucian system, women in the royal palace seldom revealed their existence to outside world. Yet daebi,(a Queen Mother) who was often called 'dongjo,' enjoyed the highest level of honor not only as a member of the royal family but in the hierarchical order of the dynasty. As they often engaged themselves in political affairs, daebi raised their reputation through rites and rituals. So, in the 16th century, they largely used Changgyeong-gung palace in the eastern part of the royal compound since they sometimes had to go out of the royal residence. While it was called 'dongjo' because it was seated in the eastern part, it was also used as a word symbolizing daebi. And, therefore, it has become a general principle of royal palaces to build the palace for daebi in the eastern wing of the compound. However, the residence for daebi was not always built in the eastern part in the 17th and 18th century and, instead, edifices for daebi were sometimes erected in several points within the royal compound. Beside, daebi's residence in this period had additional spaces for ceremonies since they had a number of official events there. Construction of daebi's residences in this era was not confined to the symbolic institutions and they became the peculiar palaces with specific characteristics for official ceremonies of the queen mothers. Consequently, it could be said that the architectural style of dongjo, which was the place of the supreme female in the hierarchical order, stemmed from donggwol where daebi spent the longest time of the royal life.

  • PDF

The Truth about October Buma Uprising and Historical Reflection: Comparative Analysis of the Busan Uprising and Masan Uprising (10월 부마항쟁의 진실과 역사적 성찰: 10·16 부산항쟁과 10·18 마산항쟁의 비교분석)

  • Chung, Joo-Shin
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.5-44
    • /
    • 2018
  • The Buma Uprising, which took place in Busan and Masan from 16 to 20 October 1979, was a challenge against the contradictions of the Yushin Regime. Only after 6 days from the insurrection, the 10 26 Accident transpired, in which the then president Park Chung-hee was assassinated, and the Buma Uprising, which acted as the fuse to the shooting, remained as an 'incomplete uprising'. To commensurate with the subject of the paper 'The Truth about Buma Uprising and Historical Reflection', the purpose of this study is to explore how the uprising began, unfolded, and oppressed by comparing it with Busan Uprising and Masan Uprising. It also focuses to discuss, in detail, the effect of the demonstration by college students and the general public and suppression by the forces of the police and military on President Park and his government. This year, we celebrate the 39th anniversary of Buma Uprising, and with all the issues of discovering the truth, restoration of reputation and more, there are decisions and resolves to make including amendment of the legal system. However, there are certain groups of people who act as they led the uprising and mislead and exploit the facts of the events through illegitimate records and testimony, making it impossible to determine the truth. Discovering the truth will require acquisition of objective materials, testimony of those involved in the event and field research as well as imposition of legal and social punishment on those who distorted the truth about the event.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Study on the Concept and Protection System for the Geographical Indication (지리적 표시제도의 의의 및 보호체제 연구)

  • Go, Yong-Bu
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.3
    • /
    • pp.165-184
    • /
    • 2007
  • This study reviews the concept and protection system for the geographical Indication(GI) to support the Korea-EU FTA. A geographical indication(GI) is a name or sign used on certain products or which corresponds to a specific geographical indication or origin (eg. a town, region, or country). The use of a GI may act as a certification that the product possesses certain qualities, or enjoys a certain reputation, due to its geographical origin. In the WTO Agreement on Trade-Related Aspects of Intellectual property Rights("TRIPS"). There are, in effect, two basic obligations from Article 22 to article 23 on WTO member governments relating to GIs in the TRIPS agreement. Geographical Indications have long been associated with Europe as an entity, where there is a tradition of associating certain food products with particular regions, Under European Union Law, the protected designation of origin system which came into effect in 1992 and 2003 regulates the following geographical indications: Protected designation of origin(PDO) and protected geographical indication(PGI) and Traditional Specialty Guaranteed(TSG). They have 5,000 articles for GI. We have the GI system and 40 articles rotating to registration by the law for quality management of production in agriculture. Cinclusinally, geographical indications could potentially serve as tools to helf holders of trade benefit more equitable through the mutual Acceptance for Korea-EU FTA.

  • PDF

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.

Study on economic effects of outsourcing of food materials on the hotel kitchen - Focus on cooking Western food in the first class hotel - (식재료 아웃소싱이 경제적 주방에 미치는 영향에 관한 연구 - 특1급호텔 양식조리를 중심으로 -)

  • 성태종
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.13 no.2
    • /
    • pp.45-69
    • /
    • 2002
  • This study is designed to examine feasibility and limitation of outsourcing in cooking Western food in a hotel, to interpret importance of outsourcing(eg. outside order, outside procurement, outside supply) in a broad sense in order to reinforce the core capacity in the cooking department, and to know whether the cooking human power is efficiently used and how much the chefs recognize outsourcing of food materials. As many companies conduct restructuring to cut down its size, the reduction of human power led the Western food cooking in the hotel to lower core capacities, lower quality, and lower efficiency. In addition, the sagging morale of chefs undermined creativity. To change from the traditional kitchen to an economic kitchen needs to look into importance of outsourcing, cognitive attitude of chefs, relation with outside suppliers. Here suggests performance of positive changes in the structure The study examined feasibility and limitation of outsourcing in the hotel kitchen as well as chefs' cognitive attitude toward outsourcing of food materials to reinforce core capabilities of the hotel kitchen. 1. Companies of outsourcing are selected according to variability of price conditions, flexibility of contract conditions, popularity of the outsourcing company, and reputation of the outsourcing company. 2. The importance of outsourcing in the Western food cooking is divided into 4 factors such as standard of selecting outsourcing companies, policies of cooking manu, quality of cooking, and quantity of cooking. 3. The most feasible section in outsourcing of food materials is a process of kneading flour for bread, which shows that many Western-food chefs expect to put higher possibility of outsourcing on the kneading. In other words, when it comes to confectionery and bakery, there are many outside expert processing companies supplying high quality products. In the order of outsourcing feasibility, sauce is followed by processed vegetable, garnish of main dish, and soup. The least feasible section in outsourcing of food materials is appetize. Appetize includes a concept of a improvised dish and needs speed. Due to its color, freshness, and sensibility of taste, the appetize plays a key role in the Western food cooking. 4. When outsourcing is taken in place, the highest risk is to lower the inner cooking skills. Therefore chefs in charge of the Western food sequently recognize both internal problems including storage of cooking skills, unstability of layoffs, and loss of cooperation between departments, and external problems including inferior goods, difficulty of differentiating manu, delay of delivery, and expiration date. It shows that most of the Western food chefs consider risks of the internal problems at first. 5. A effective outsourcing needs appropriate selection of outsourcing companies, maintenance of credibility, active communication, check and management of hygiene. However regardless of their position or career, chefs in charge of the Western food have the same cognitive attitude toward selecting successful outsourcing companies after the outsourcing system is enforced. The core of cooking, or a final stage in the full process of so-called artistic cooking, should be treated with insourcing. Reduction of several cooking processes resulted in shortened cooking time, increased efficiency, faster cooking, cutting the waiting-lines, and finally more room for customers. The outsourcing system can reduce or eliminate the following processes in cooking: buying various food materials, checking, storing, preparing, and processing. Especially in the Western food cooking department of a hotel, the outsourcing system should be enforced to make an economic kitchen and to efficiently manage it. Wow it's time to change from the traditional kitchen to an economic kitchen in the hotel cooking department. For that, the cooking department should become a small but strong organization by outsourcing except its core work.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Analysis to the Essential Factors of Humor Emerging in Chinese Cartoon Around Year of 2000 (2000년을 전후로 하여 중국 애니메이션에 나타난 유머요인 분석)

  • Dong, Peng;Oh, Jin-Hee
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.189-215
    • /
    • 2014
  • Since the launching of in 1963, a large amount of outstanding cartoons had been produced in China by the year 1980. During this period of time, international reputation was achieved with the extremely full expression and characteristic stories originated from Chinese culture. Decades of cartoons were produced ever year benefiting from support of the government in the last years. However, the quality and in fluence power dropped down comparing with the increasing productivity. The outward followed by examples of successful international box office most of the animation made in China. These cartoons did not obtain admitting internationally, or disclose any traditional speciality of China, although the domestic box office is considered to be fairly successful. The key factors to the successful cases should be analysed and researched rather than simply estimating, in order to achieve both artistic and commercial success. Factor of humor, as a key element of a successful cartoon is proposed in this thesis. Prior to the discussion, a general definition of humor factor is described through Henri Bergson's comedy concept, based on which the key factors of humor will be analysed. A classification system would be derived and introduced as a tool for the analysis of humor factors. According to Henri Bergson, Humor is determined by circumstance, language and character factors. Humor factors are divided into visual, scene and acoustic factors in this research taking the Speciality of cartoon media into consideration. It is the speciality that, in addition to the visual and language factors, multiple acoustic elements are also introduced in such a presentation pattern. This classification system would be considerably applicable to the analysis of humor factors in Chinese cartoons. In this study, around the year 2000 to share the Chinese animation masterpiece were analyzed by selecting and , and . This discussion about key factors of humor is likely to be beneficial to the development of Chinese Cartoons in the future.