• Title/Summary/Keyword: Secret

Search Result 1,205, Processing Time 0.02 seconds

Developing a Customized Sexually Transmitted Infections (STIs) Smartphone Application for Adolescents: An Application of the Instructional System Design Model (청소년 성매개 감염병 교육을 위한 스마트폰 어플리케이션 개발과정)

  • Jeong, Soo-Kyung;Cha, Chi-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.651-659
    • /
    • 2017
  • Although the need for education on sexually-transmitted-infections (STIs) for adolescents has been increasing, a limited number of adolescents receive STI education. Importantly, the exposure of youth to an STI during their adolescence period can seriously affect their genital health. Smartphones are an innovative medium that can be used to change individual behaviors, especially useful when used to educate adolescents. Therefore, we developed a customized smartphone application for Korean adolescents. The application was based on Dick and Carey's instructional system design model. In this paper, we describe the process for development of the smartphone application, and the strategies we applied to attract adolescents to use the smartphone application. Six experts verified the educational content of the application. The application's easygoing words were chosen to help adolescents understand the topic. Strategies such as cartoon clips, secret chat rooms, buttons changing color from blue to grey, questions and answers, and a repeated-learning function were used to attract Korean adolescents to the application. The smartphone application developed in this study could be used in schools, youth centers, and hospital centers to improve STI knowledge, STI prevention, and STI coping skills.

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.

Analysis report for readiness posture against north korea nuclear threat - Focused mainly in non-military area of government readiness posture - (북한의 핵위협 대비태세 분석 - 정부의 비군사분야 대비태세를 중심으로 -)

  • Kim, In-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.205-227
    • /
    • 2015
  • The Korean Peninsula is put in a position to carry out a highly strategic game vis-a-vis nK, which is asserting itself as a nuclear power amongst Northeast Asia's complex dynamics. While the international community recognizes nK's possession of nuclear weapons as released secret based on nK's three nuclear tests, shrewd strategic thinking is needed by ROK to secure itself as a non-nuclear nation in order to assume a responsible role to the international community, while simultaneously being ready to respond at all times for nK's military provocations. ROK must continue with its twofold strategy, by firm response to military confrontation with nK and maintaining flexible policy of tolerance in the areas of economy and ethnicity. Various strategic options to overcome nK's nuclear threats have been presented to ROK, whose possession of nuclear weapons have been difficult, and nK's nuclear capability is a real threat to ROK's national security. We must be able to respond to nK's nuclear threats strictly from ROK's national security perspective. This thesis aims to propose a response policy for nK's nuclear capability and nK's nuclear attack based on analysis of such nuclear damage, ROK Government's response posture against nK's nuclear threats, centered around ROK Government's non-military response posture.

  • PDF

Review of the Revised 2019 Trade Secret Protection Act and Industrial Technology Protection Act : Focusing on Civil and Criminal Remedies (2019년 개정 영업비밀보호법 및 산업기술보호법에 대한 검토: 민·형사적 구제를 중심으로)

  • Cho, Yongsun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.333-352
    • /
    • 2019
  • In January and August 2019, there were amendments to the Unfair Competition and Trade Secrets Protection Act (UCPA) and the Industrial Technology Protection Act(ITPA). These amendments will contribute to technology protection. But these amendments need to be supplemented further. In the area of civil remedies, despite the introduction of treble damages in the case of the UCPA and ITPA, the provisions related to the submission of supporting data have not been maintained. Therefore, it is necessary to recognize the claim of the other party as true if it is maintained at the level of the revised Patent Act and the scope of submission of supporting data. And the enforcement of the case of compulsory submission for the calculation of damages, and the order of filing documents are not followed. ITPA, on the other hand, has introduced the compensation for damages, but there is no provision for estimating the amount of damages. Therefore, it is necessary to estimate the amount of lost profits, profits, and royalties. In the area of criminal remedies, both the UCPA and ITPA have raised the penalty, but the sentencing regulations are not maintained. In addition, although the recent outflow of technology has expanded beyond organizational deviations to organizational outflows, amendments need to be made in relation to the serious consequence for the punishment of related juristic persons, such as companies involved in it. It should be noted that Japan and the United States have corporate regulations and regulations. In addition, in relation to the confiscation system, Act on Regulation and Punishment of criminal proceeds concealment require that domestic defenses be confiscated by defense industry technology, while trade secrets and industrial technologies are confiscated only by "foreign" outflows, and an amendment is necessary.

Effect of M11C (Non-lectin Components) Obtained from Korean Mistletoe on the $IL-1\beta$ Secretion from Mouse Splenocytes (쥐의 비장세포로부터 $IL-1\beta$ 분비에 있어서 한국산 겨우살이 추출물 M11C (비렉틴 구성물질)의 효과)

  • Jun, Myung-Ha;Kang, Tae-Bong;Chang, Sung-Ho;Choi, Wahn-Soo;Seong, Nak-Sul;Her, Erk
    • Korean Journal of Medicinal Crop Science
    • /
    • v.15 no.1
    • /
    • pp.38-45
    • /
    • 2007
  • Korean mistletoe (Viscum album L) extract has been found to posses immunoregulating activity. In this study, Korean mistletoe extract, M11C (non-lectin components), was used to know whether this extract activates splenocytes to secret interleukin $1\beta(IL-1\beta)$. The splenocytes were treated with M11C, and then collected the supernatant and cell lysate that were prepared to analyze the level of $IL-1\beta$, using ELISA, immunoblotting, and RT-PCR. Maximum effective dose and time of M11C on $IL-1\beta$ secretion from splenocytes were $200{\mu}g/m\ell$ and 8 hours, respectively. Treatment dose and time for the maximum expression of $IL-1\beta$ mRNA were $200{\mu}g/m\ell$ and 4 hours, respectively. Saccharide degradation enzyme Viscozyme L completely blocked the effect of M11C on $IL-1\beta$ secretion from splenocytes. As the result, among non-lectin components saccharide could be regarded as a main component for $IL-1\beta$ expression from splenocytes.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

A Study on Ethical Problem of Insider Trading (내부자 거래의 윤리적 문제점에 대한 연구)

  • Yoon, Hye-jin
    • Journal of Korean Philosophical Society
    • /
    • v.126
    • /
    • pp.213-233
    • /
    • 2013
  • The aim of this paper is to reveal the ethical problem of insider trading. 'Insider trading' refer to obtaining information from non-public sources such as private acquaintances about trade secret, using it purposes of enhancing insider's financial advantages. And sometimes such a practice can be conducted fraudulently. Therefore, the focus of this paper will be on fairness or justice arguments against insider trading. And all kinds of discussion this paper are to focus the underlying consideration behind these arguments, that is, the underlying consideration about violation of ethical standards of fairness. First, one of these arguments argues that insider trading does necessarily involve defrauding general investors such as general employees, general stockholders. And economic power and unjust advantage of insider can be exercised to the detriment of this non-insider's interests. Second, another argument argues that insider trading undermines competition which is the principle of any free market. And insider trading is not only a complication in the free market mechanism, but also thwarts free competition which free markets depend. Third, the final argument argues that insider trading will be made something unfair about the concept of equal access to information. This argument argues, therefore, that to permit insider trading would be to set up stock market trading rules that are unfair to non-insiders.

A Study on the Judgment Criteria for the Trademark Dilution of Famous Marks

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.225-232
    • /
    • 2019
  • The trademark dilution of famous marks as a kind of unfair competition practice is defined and regulated in Article 2 (1) (c) of the Unfair Competition Prevention and Trade Secret Protection Act (hereinafter referred to as the Unfair Competition Prevention Act), which was newly established according to the amendment of the Act on February 3, 2001. Famous trademarks are universally protected in all around the world, which are likewise protected in the Republic of Korea by the Unfair Competition Prevention Actin line with such international trends. In order to establish the trademark dilution of famous marks, it is necessary to have the following characteristics: (1) high reputation of the original mark, (2) use of identical or similar markscompared to the original mark, (3) occurrence of blurring of discrimination or tarnishment of reputation; in particular, with respect to the degree of proof of 'blurring of discrimination or tarnishment of reputation', which is a constituent requirement of the trademark dilution of famous marks, it is reasonable to interpret the trademark dilution as concrete endangerment offense, neither harm-based offense nor abstract endangerment offense, and thus it should be considered that the crime is established if a specific realistic risk of blurring of discrimination or tarnishment of reputation occurs. Furthermore, in relation to the specific criteria of 'blurring of discrimination or tarnishment of reputation', it is necessary to comprehensively judge the degree of individual behavior in specific matters as a normative factor as well as the psychosocial viewpoint of the general public.

A Study on the Feasibility of the Espionage Charges for the Industrial Technology Divulgence (산업기술의 해외유출행위에 대한 간첩죄 처벌 타당성 연구)

  • Kim, Hang-Gon;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.253-275
    • /
    • 2018
  • Economic security emerged as a strong element of national security. Nations around the world are exerting their efforts to collect economic intelligence to serve their national interest while making added efforts to uncover industrial espionage and arrest industrial spies in defensive aspect. Cases in point are the enactment of "Economic Espionage Act(1996)" of the U.S. and the "Act on Prevention of Divulgence and Protection of Industrial Technology(2006)"of Korea. Korea is trying to punish industrial spying on the same level as espionage that poses national security threat by revising Criminal Code. It is necessary to review whether the move to toughen the punishment of industrial spying from "up to 15 years in prison and/or up to 1.5 billion won in fine" to "minimum seven years of imprisonment, life imprisonment or death penalty" is appropriate. Advanced nations regulate industrial spying with a special act on economy although they have applied espionage act not to "enemy states" but to "foreign countries" in the first place. Likewise, preventing industrial spying by applying espionage act through the revision of criminal code poses a risk of undermining the autonomy of industry sector by excessive influence of state power. Furthermore, the penalty of minimum imprisonment of seven years, life imprisonment or death penalty with the application of espionage act under the criminal code is an legal application by stretching of the law, posing a risk of dampening healthy economic activities. Therefore, revising and applying relevant economic laws such as aforementioned 'Act on Prevention of Divulgence and Protection of Industrial Technology(2006)' is thought to be desirable to achieve the goal of protecting industrial technologies.

A Study on Yi Sang Representation in Media -Focusing on the cinema and the drama (영상매체에 형상화 된 시인 '이상' 표상 연구 -영화 <건축무한육면각체의 비밀>, 드라마 <이상 그 이상>을 중심으로)

  • Son, Mi-young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.29-36
    • /
    • 2019
  • Lee Sang's poems and his portraits are being used in various video media. Depending on the characteristics of the medium and genre, the representation of the poet or higher and his poems are selected and variations in different ways. In a modern era where literature communicates with various media, reviewing how a poet's portrait is shaped is also the process of reading what text wants to convey to the public through a single person. This study examined aspects in which representations of poets or higher were utilized in various image media, and compared and analyzed how poet aberrations are represented in each text. In particular, the discussion centered on the movie and the drama . In the movie , the above poem is used as a hidden puzzle. The film uses the popularly known 'genius' representation to track down Yi Sang's secret. Because of this, the film represents its ideal in a way that is faithful to the genre's custom of Thriller In comparison, the drama was about to re-emerge as a young man with a passion for the inner workings. The cynical attitude shown in the above text is also a reflection of the love for the nation and the times. These different typographical methods are worth noting in terms of the literary man's public perception of "Yi-sang" and the strategy of the new portrait attempt.