• Title/Summary/Keyword: Security Control

Search Result 3,102, Processing Time 0.047 seconds

Korean Style System Model of Financial ADR (한국형 금융ADR의 제도모델)

  • Seo, Hee-Sok
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.343-386
    • /
    • 2013
  • "Financial ADR" system in South Korea can be represented by so-called "Financial Dispute Resolution System", in which Financial Supervisory Service (FSS) and Financial Dispute Resolution Committee are the principal actors in operation of the system, and this is discussed as an "Administrative Financial ADR System". The system has over 10-year history since it was introduced in around 1999. Nonetheless, it was not until when financial consumer protection began to be highlighted after the 2008 financial crisis that Financial ADR system actually started to draw attention in Korea. This was because interest has been rising in "Alternative Dispute Resolution (ADR)" as an institutional measure to protect financial consumers damaged via financial transactions. However, the current discussion on the domestic Financial ADR system shows an aspect that it is confined to who is to be a principal actor for the operation of Financial ADR institution with main regards to reorganization of supervisory system. This article aims to embody these facts in an institutional model by recognizing them as a problem and analyzing the features of the Financial ADR system, thereby clarifying problems of the system and presenting the direction of improvement. The Korean Financial ADR system can be judged as "administrative model integrated model consensual model quasi-judicial model non-prepositive Internal Dispute Resolution (IDR) model". However, at the same time, it is confronted with a task to overcome the two problems; the system is not equipped with institutional basis for securing its validity in spite of the adopted quasi-judicial effect model; and a burden of operating an integrated ADR system is considerable. From this perspective, the article suggests improvement plans for security of validity in the current system and for expansion of industry-control ADR system, in particular, a system of prepositive IDR model. Amongst them, it suggests further plans for securing the validity of the system as follows; promotion to expand the number of internal persons and to differentiate mediation procedures and effect; a plan to keep a financial institution from filing a lawsuit before an agreement recommendation or a mediation proposal is advised; and a plan to grant suspension of extinctive prescription as well as that of procedures of the lawsuit.

Estimation of Food Commodity Intakes from the Korea National Health and Nutrition Examination Survey Databases: With Priority Given to Intake of Perilla Leaf (국민건강영양조사 자료를 이용한 식품 섭취량 산출 방법 개발: 들깻잎 섭취량을 중심으로)

  • Kim, Seung Won;Jung, Junho;Lee, Joong-Keun;Woo, Hee Dong;Im, Moo-Hyeog;Park, Young Sig;Ko, Sanghoon
    • Food Engineering Progress
    • /
    • v.14 no.4
    • /
    • pp.307-315
    • /
    • 2010
  • The safety and security of food supply should be one of the primary responsibilities of any government. Estimation of nation's food commodity intakes is important to control the potential risks in food systems since food hazards are often associated with quality and safety of food commodities. The food intake databases provided by Korea National Health and Nutrition Examination Survey (KNHANES) are good resources to estimate the demographic data of intakes of various food commodities. A limitation of the KNHANES databases, however, is that the food intakes surveyed are not based on commodities but ingredients and their mixtures. In this study, reasonable calculation strategies were applied to convert the food intakes of the ingredients mixtures from the KNHANES into food commodity intakes. For example, Perilla leaf consumed with meat, raw fish, and etc. in Korean diets was used to estimate its Korean intakes and develop algorithms for demographic analysis. Koreans have consumed raw, blanched, steamed, and canned perilla leaf products. The average daily intakes of the perilla leaf were analyzed demographically, for examples, the intakes by gender, age, and etc. The average daily intakes of total perilla leaf were 2.03${\pm}$0.27 g in 1998, 2.11${\pm}$0.26 g in 2001, 2.29${\pm}$0.27 g in 2005, 2.75${\pm}$0.35 g in 2007, and 2.27${\pm}$0.20 g in 2008. Generally, people equal to or over 20 years of age have shown higher perilla leaf intakes than people below 20. This study would be contributed to the estimation of intakes of possible chemical contaminants such as residual pesticides and subsequent analysis for their potential risk.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

African Swine Fever Outbreak in North Korea and Cooperation between South and North Korea (북한지역에서 ASF발병 현황 및 남북수의협력에 관한 연구)

  • Cho, Chung Hui
    • Journal of Appropriate Technology
    • /
    • v.6 no.1
    • /
    • pp.21-27
    • /
    • 2020
  • The ASF, which originated in Africa and threatens the world, landed in Asia in 2018 in China, and became a stern threat to the security of the Korean Peninsula when North Korea officially reported the ASF to the OIE in May 2019. In 1921, Montgomery, a British veterinary pathologist, made headlines by naming the African swine fever "African Swine Fever," or ASF, a disease caused by a high fatality virus that existed in East Africa. The ASF, which was a pandemic of endemic diseases in Africa, landed in Portgal around 1957 and swept through farms in Lisbon, Portugal. The ASF continued to settle in Spain and Portugal, causing 40 years of damage until the end of the 1990s, and is now in progress after landing on the Italian island of Sardinia in 1978. The virus, which landed in Portiport of Georgia on the Black Sea coast of the Black Sea in 2007, spread to Russia and caused massive damage to China in 2018, then rapidly spread to Vietnam, Laos and Myanmar in May 2019 and spread across the country, causing massive damage to the pork industry and is now in progress. Just three months after confirming the outbreak in North Korea, the outbreak at farms in Paju and Yeoncheon was confirmed on Sept. 16, 2019, leaving South Korea with the stigma of ASF-causing countries, and although the ASF's nationwide expansion has been blocked, it is currently underway in wild boars. If the ongoing ASF in the two Koreas becomes indigenous, it would be a major disaster not only for the pork industry but also for the Korean Peninsula economy. Under the current circumstances, it is impossible to focus only on veterinary areas limited to South Korea, ruling out risk factors from the ASF outbreak. Currently, it is difficult to prevent damage to the pork industry due to the ASF outbreak due to the poor water defense reality in North Korea, and as it is adjacent to China, which has a high risk of developing various epidemic diseases, there is a need for the two Koreas to jointly conduct quarantine and quarantine on the border areas. First of all, I think rapid exchange of information and education on ASF and other diseases is necessary before establishing a joint defense system on the Korean Peninsula. It is important to conduct thorough quarantine and disinfection of ASF-generated areas in North Korea, and areas bordering China and Russia, and jointly conduct thorough quarantine and control of livestock and livestock products in circulation. Cooperation by the South and North Korean water defense industries to prevent the protracted ASF on the Korean Peninsula by all means and methods is essential.

A Study on Verifying the Morality behind 'Mutual Beneficence': A Phenomenological Investigation on the 'Propensity towards Sympathy' (상생적 관계형성을 위한 도덕성 확인에 관한 연구 - '공감적 성향'에 대한 현상학적 고찰 -)

  • Chung, Byung-hwa
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.28
    • /
    • pp.103-131
    • /
    • 2017
  • As the establishment of self-identity is based on 'Relationships of Mutual Beneficence,' the formation of 'Relationships of Mutual Beneficence' is the only road to the security and confirmation of self-existence. But given that our ordinary life almost entirely consists of actions objectifying others, the formation of 'Relationships of Mutual Beneficence' is by no means easy. The formation of 'Relationships of Mutual Beneficence' should be based on morality, controlling self-desire, and not objectifying others. Philosophy based on a priori reasoning describes self-control over selfdesire as the domination of the body through a priori reasoning. But this practical philosophy cannot present a self-evidential internal motivation behind moral actions. Due to this, the application of moral order given by a priori reasoning in response to reality is likely to be reinterpreted on basis of self-interest. With regards to this, the 'propensity towards sympathy' is given as new moral norm. The 'propensity towards sympathy' as emotion is direct and consistent given that feeling occurs prior to thinking. The 'propensity towards sympathy' is intuitive in the sense that it is an instinctual response preceeding a reasoned judgment. The 'propensity towards sympathy,' as a natural moral emotion, is self-validating given that all human beings know it and practice it. But previous studies on the 'propensity towards sympathy' have an obvious limitation because they adopt phenomenological approaches to the 'propensity towards sympathy' which eschew the investigation of morality. Though they present the 'propensity towards sympathy' as a natural emotion based on body rather than reason, they do not philosophically explain the 'propensity towards sympathy.' Thus the 'propensity towards sympathy' as a natural moral emotion is likely to be interpreted as a subjective and relative moral norm. This paper philosophically explains that the 'propensity towards sympathy' is a universal moral norm on the basis of Merleau-Ponty's 'flesh.' 'Flesh' is formed as the entanglement between oneself and others and presents the 'propensity towards sympathy' as its philosophical basis. In other words, 'flesh' formed as the mixture or entanglement between oneself and others is the material foundation upon which one can activate the 'propensity towards sympathy.' This paper's approach to the 'propensity of sympathy' can be desribed as a phenomenological approach to the 'propensity towards sympathy' as a universal moral norm.

KANO-TOPSIS Model for AI Based New Product Development: Focusing on the Case of Developing Voice Assistant System for Vehicles (KANO-TOPSIS 모델을 이용한 지능형 신제품 개발: 차량용 음성비서 시스템 개발 사례)

  • Yang, Sungmin;Tak, Junhyuk;Kwon, Donghwan;Chung, Doohee
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.287-310
    • /
    • 2022
  • Companies' interest in developing AI-based intelligent new products is increasing. Recently, the main concern of companies is to innovate customer experience and create new values by developing new products through the effective use of Artificial intelligence technology. However, due to the nature of products based on radical technologies such as artificial intelligence, intelligent products differ from existing products and development methods, so it is clear that there is a limitation to applying the existing development methodology as it is. This study proposes a new research method based on KANO-TOPSIS for the successful development of AI-based intelligent new products by using car voice assistants as an example. Using the KANO model, select and evaluate functions that customers think are necessary for new products, and use the TOPSIS method to derives priorities by finding the importance of functions that customers need. For the analysis, major categories such as vehicle condition check and function control elements, driving-related elements, characteristics of voice assistant itself, infotainment elements, and daily life support elements were selected and customer demand attributes were subdivided. As a result of the analysis, high recognition accuracy should be considered as a top priority in the development of car voice assistants. Infotainment elements that provide customized content based on driver's biometric information and usage habits showed lower priorities than expected, while functions related to driver safety such as vehicle condition notification, driving assistance, and security, also showed as the functions that should be developed preferentially. This study is meaningful in that it presented a new product development methodology suitable for the characteristics of AI-based intelligent new products with innovative characteristics through an excellent model combining KANO and TOPSIS.

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF

Actual Conditions and Perception of Safety Accidents by School Foodservice Employees in Chungbuk (충북지역 학교급식 조리종사원의 안전사고 실태 및 인식)

  • Cho, Hyun A;Lee, Young Eun;Park, Eun Hye
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.10
    • /
    • pp.1594-1606
    • /
    • 2014
  • The purpose of this study was to examine safety accidents related to school foodservice, working and operating environments of school foodservice, status and awareness of safety education, educational needs, and information on qualitative improvement of school foodservice. The subjects in this study were 234 cooks in charge of cooking at elementary and secondary schools in Chungbuk. A survey was conducted from July 30 to August 8, 2012, and among 202 questionnaires gathered, 194 completed questionnaires were analyzed. Statistical analyses were performed on data utilizing the SPSS version 19.0. The main results of this study were as follows: 44.3% of workers experienced safety accidents. The most frequent safety accident was 'once' (60.5%), and most safety accidents took place between June and August (31.4%). The time at which most safety accidents happened was between 8 and 11 am. Most safety accidents happened during cooking (52.3%) and while using a soup pot or frying pot (52.4%). The most common accidents were 'burns', 'wrist and arm pain', and 'slips and falls'. Respondents who experienced safety accidents replied that 57.6% of employees dealt with injuries at their own expense, and only 35.3% utilized industrial accident insurance. In terms of the operating environment, the score for 'offering information and application' was highest (3.76 points), whereas that for 'security of budget' was lowest (1.77 points). As for accident education, employees received safety education approximately 3.45 times and 5.10 hours per year. Improving the working environment of school foodservice cooks requires administrative and financial support. Furthermore, educational materials and guidelines based on the working environment and safety accident status of school foodservice cooks are required in order to minimize potential risk factors and control safety accidents in school foodservice.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.