• Title/Summary/Keyword: Research Security Compliance

Search Result 105, Processing Time 0.024 seconds

A Study on the Stay of Enforcement of ICSID Arbitral Awards (ICSID 중재판정의 '집행정지'에 관한 고찰)

  • KIM, Yong-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.65-87
    • /
    • 2015
  • This article examines the Stay of Enforcement of ICSID Arbitration Award. The effect of the stay is that the award is not subject to enforcement proceedings under Article 54 of the ICSID Convention pending the outcome of the annulment application. The annulment committee must decide the stay, unless the applicant sought the stay with the request for annulment, in which case the ICSID Secretary -General must grant it automatically. This automatic stay -which can only relate to the entire award-remains in force until the committee is constituted and issues a decision on the request for stay. ICSID committees have taken different positions on whether a stay of enforcement is exceptional or not. Some committees have held that because the ICSID Convention explicitly recognizes that the rights of the award creditor could be subject to a stay, stays are not exceptional. ICSID practice shows that most committees have rejected the proposition that the merits and prospects of the application for annulment should influence the committee's decision whether to grant a stay. In addition, ICSID practice regarding the specific circumstances that will justify a stay of enforcement is unclear, and committees have focused on different factors to decide whether to grant a stay such as prospect of prompt compliance with the ward, hardship to one of the parties, risk of non-recovery and irreparable harm to the award debtor. Also, ICSID practice shows that even though the Convention is silent on this issue, committees have generally held that they are empowered to condition the stay of enforcement on the granting of security by the requesting party.

  • PDF

Researched and Analyzed Variables for Pollution Waters around the "Kosova B" Thermal Power Plant

  • Musliu, Adem;Musliu, Arber;Baftiu, Naim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.109-116
    • /
    • 2022
  • The energy corporation of Kosovo continuously monitors and analyzes the impact of its own activities on the environment. Regarding the environmental situation, energy corporation of Kosovo- ECK regularly informs and reports objectively to the competent state institutions, local municipal institutions and interested parties. ECK, through numerous contacts with the competent authorities, firstly with different ministers, harmonizes the positions regarding environmental issues in the direction of achieving certain environmental standards or legal requirements in order to gradually be in accordance with them, based on the real possibilities, especially the financial ones. From this point of view, the environmental issue is very sensitive, quite complex and represents one of the biggest challenges of society currently and in the future. The researched variables show a continuous increase in the need for electricity production in Kosovo and this increase in production conditions a wide range of environmental impacts both at the local, regional and global levels. The aim of the work is to reduce the emission of pollutants through the main variables without inhibiting the economic development of the country, i.e. to bring the pollution as a result of the activities of the ECK operation into compliance with the permitted environmental norms. As a result of ECK's operational activities, the following follows: Air pollution mainly as a result of emissions from TCs in the air, transport, etc. Water pollution - as a result of technological water discharges, Land degradation - as a result of surface mining activities of the entire mining area. The purpose of the paper is to research and analyze the main water variables in the area of the Kosova B power plant, which is to determine the degree of their pollution from the activities of the power plants, as well as to assess the real state of surface water quality and control the degree of pollution of these waters. Methodology of the work: The analyzes of the water samples were done in the company Institute "INKOS" JSC by simultaneous methods using different reagents.

Design of Irrigation Pumping System Controller for Operational Instrument of Articulation (관절경 수술을 위한 관주(灌注)시스 (Irrigation Pumping System) 제어기의 개발)

  • 김민수;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1294-1297
    • /
    • 2003
  • With the development of medical field, many kinds of operations have been performed on human articulation. Arthroscopic surgery, which has Irrigation Pumping System for security of operator vision and washing spaces of operation, has been used for more merits than others. In this paper, it is presented that the research on a reliable control algorithm of the pumping system instrument for arthroscopic surgery. Before clinical operation, the flexible artificial articulation model is used for realizing the model the most same as human's and the algorithm has been exploited for it. This system is considered of the following; limited sensing point, dynamic effect by compliance, time delay by fluid flow and so on. The system is composed with a pressure controller, a regulator for keeping air pressure, an airtight tank that can have distilled water packs, artificial articulation and a measuring system, and has controlled by the feedback of pressure sensor on the artificial articulation. Also the system has applied to Smith Predictor for time delay and the parameter estimation method for the most suitable system with both the experiment data and modeling. In this paper, the pressure error that is between an air pressure tank and an artificial articulation was measured so that the system could be presumed and then the controller had developed for performing State-Feedback. Finally, the controller with a real microprocessor has realized. The confidence of system can be proved by applying this control algorithm to an artificial articulation experiment material.

  • PDF

Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators (인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

Development of a Collision Risk Assessment System for Optimum Safe Route (최적안전항로를 위한 충돌위험도 평가시스템의 개발)

  • Jeon, Ho-Kun;Jung, Yun-Chul
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.670-678
    • /
    • 2018
  • In coastal waters where the traffic volume of the ship is high, there is a high possibility of a collision accident because complicated encounter situations frequently occurs between ships. To reduce the collision accidents at sea, a quantitative collision risk assessment is required in addition to the navigator's compliance with COLREG. In this study, a new collision risk assessment system was developed to evaluate the collision risk on ship's planned sailing routes. The appropriate collision risk assessment method was proposed on the basis of reviewing existing collision risk assessment models. The system was developed using MATLAB and it consists of three parts: Map, Bumper and Assessment. The developed system was applied to the test sea area with simple computational conditions for testing and to actual sea areas with real computational conditions for validation. The results show the length of own ship, ship's sailing time and sailing routes affect collision risks. The developed system is expected to be helpful for navigators to choose the optimum safe route before sailing.

A Study on Improvement for Service Proliferation Based on Blockchain (블록체인 기반 서비스 확산을 위한 개선 방안 연구)

  • Yoo, Soonduck;Kim, Kiheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.185-194
    • /
    • 2018
  • This study investigates the limitations of blockchain technology and the ways to improve it by using Delphi technique. Limit factors and improvement measures are classified into technology, service, and legal system. First, from a technical point of view, lack of standardization of the technology, insufficiency of integration, lack of scalability, unclear cancellation or correction policy, excessive cost of transaction verification, insufficient personal information protection and not enough to respond to hacking defense were the limiting factors. In order to improve these, the followings; ensuring standardization, securing integration and scalability, establishing cancellation of each applicable data, establishment of correction policy, efficiency of verification cost, the protection of personal information and countermeasure against hacking are provided. The related technology development and countermeasures must be established to effectively introduce the blockchain technology to the market. Second, in the early stage of blockchain service, it showed lack of utilization of the blockchain, security threat, shortage of skilled workers, and lack of legal liability. As a solution to these problems, it is necessary to suggest various applications, against security threat, training professional manpower, and securing legal responsibility. It should also provide a foundation for providing institutionally stable services. Third, from as legal system point of view, inadequate legal compliance, lack of relevant regulation, and uncertainty in the regulation were the limiting factors. Therefore establishing a legal system, which is the most important area for activating the service, should be accompanied by the provision of legal countermeasures, clearness of regulations and measures to be taken by relevant governmental authorities. This study will contribute as a reference for a research, related to the blockchain.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Suitability Evaluation Method for Both Control Data and Operator Regarding Remote Control of Maritime Autonomous Surface Ships (자율운항선박 원격제어 관련 제어 데이터와 운용자의 적합성 평가 방법)

  • Hwa-Sop Roh;Hong-Jin Kim;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.214-220
    • /
    • 2024
  • Remote control is used for operating maritime autonomous surface ships. The operator controls the ship using control data generated by the remote control system. To ensure successful remote control, three principles must be followed: safety, reliability, and availability. To achieve this, the suitability of both the control data and operators for remote control must be established. Currently, there are no international regulations in place for evaluating remote control suitability through experiments on actual ships. Conducting such experiments is dangerous, costly, and time-consuming. The goal of this study is to develop a suitability evaluation method using the output values of control devices used in actual ship operation. The proposed method involves evaluating the suitability of data by analyzing the output values and evaluating the suitability of operators by examining their tracking of these output values. The experiment was conducted using a shore-based remote control system to operate the training ship 'Hannara' of Korea National Maritime and Ocean University. The experiment involved an iterative process of obtaining the operator's tracking value for the output value of the ship's control devices and transmitting and receiving tracking data between the ship and the shore. The evaluation results showed that the transmission and reception performance of control data was suitable for remote operation. However, the operator's tracking performance revealed a need for further education and training. Therefore, the proposed evaluation method can be applied to assess the suitability and analyze both the control data and the operator's compliance with the three principles of remote control.