• Title/Summary/Keyword: Security Regulation

Search Result 316, Processing Time 0.026 seconds

Information and Legal Support for the Implementation of a Gender Approach to Public Administration

  • Goshovska, Valentyna;Balasynovuch, Nataliia;Hryhorovych, Liliia;Goshovskyi, Volodymyr;Danylenko, Lydiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.150-158
    • /
    • 2021
  • The study identifies the importance of informational and legislative support in ensuring gender equality. It determines the relevance of gender inequality, the main problem, which is confirmed by research and statistical information. The study aims to determine the methods of collecting information and legal regulation of gender issues and the possibility of solving them by public authorities. The main methods of gathering information are census surveys, questionnaires, surveys on public service websites, work with local communities, surveys in nursing homes and orphanages, special survey programs, and election polls. The paper considers the legal regulation of gender inequalities at the international, state, local and organizational levels. According to the analysis of the problem of gender inequality, it is established that the problem is practically eliminated in many developed countries, while countries with low incomes face gender inequality constantly.

Effective measures for the regulation and supervision of encryption of unique identification information of financial companies (금융회사의 고유식별정보 암호화 규제·감독에 대한 실효성 확보 방안)

  • Lee, Seung Yun;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.3-9
    • /
    • 2018
  • The purpose of this study is to propose effective countermeasures against the regulation and supervision of unique identification information for financial institutions and present the present problems and future directions. In financial institutions, it is investigated that DB system of many personal information processing systems is in order to comply with the law, and additional measures such as encryption are required for data files containing unique identification information in many other application systems. In this paper, the conclusions of institutional, administrative, and technological feasibility are presented.

  • PDF

Models of State Clusterisation Management, Marketing and Labour Market Management in Conditions of Globalization, Risk of Bankruptcy and Services Market Development

  • Prokopenko, Oleksii;Martyn, Olga;Bilyk, Olha;Vivcharuk, Olga;Zos-Kior, Mykola;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.228-234
    • /
    • 2021
  • The article defines the problems of forming the models of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and services market development. The clustering models based on the optimal partner network cooperation were proposed in order to ensure the strategic development of territories, to attract budget leading enterprises and to support small businesses. A descriptive model of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and Covid-19 was determined.

A Study on Establishing Guidelines for Information Protection and Security for Educational Institutes (학내 정보보호지침 수립에 관한 연구)

  • Yu, Ki-Hun;Choi, Woong-Chul;Kim, Shin-Kon;Goo, Chun-Yul
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Because IT security guidelines for universities and colleges mostly focus on hardware aspects, the problems such as security incidents by a user's mistake and personal information leakage by hacking are serious in our higher educational institutes. In order to solve these information protection and security problems in the educational institutes, realizable and implementable information protection and security guidelines which will contribute to escalate information protection level should be established and at the same time, specific guidelines should be provided to make the guidelines efficient. In this paper, the information security problems and cases are categorized to develop information security guidelines for the higher educational institutes in terms of short, mid, and long term aspects and the solutions to the problems are sought. In addition, a serious of approaches to the information security are proposed such as the improvement measures for the employees of the institute to have desirable security-minded, security problem prevention and resolving methods, developing conflict coordination procedure and law and regulation system establishment for making the educational institutes be information-oriented.

Effective Countermeasures against Vulnerability Assessment for the Public Website of Financial Institution (금융기관 공개용 홈페이지 취약점 분석평가에 대한 효율적인 대처방안)

  • Park, Hyun-jin;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.885-895
    • /
    • 2017
  • Security issues arise due to various types of external intrusions as much as the rapidly changing IT environment. Attacks using vulnerabilities in web applications are increasing, and companies are trying to find the cause of the vulnerability, prevent external intrusion, and protect their systems and important information. Especially, according to the Supervision Regulation, each financial institution and electronic financial service provider shall perform vulnerability analysis evaluation for the website for disclosure once every six months and report the result to the Financial Services Commission. In this study, based on the Web vulnerability items defined in the Supervision Regulation, based on the inspection cases of actual financial institution, we analyze the most frequently occurring items and propose effective countermeasures against them and ways to prevent them from occurring in advance.

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

A Study on the Social Security for Seafarers of Maritime Labour Convention, 2006 (2006년 해사노동협약상 선원 사회보장에 관한 연구)

  • Ji, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.43-45
    • /
    • 2007
  • The International Labour Organization adopted the Maritime Labour Convention, 2006 on 23 February 2006. This convention contains the regulation about social security for seafarers in the Tittle 4. For the purpose of ratifying this Convention in our country, it is necessary to examine the domestic law and regulation concerned whether it fulfills or not the required conditions of the Convention Therefore, this paper aims to find the difference between the domestic law and the convention, also suggest the way to solve the problems.

  • PDF

Research on the construction concept and general framework of Smart Water Resource

  • Tian, Yu;Li, JianGuo;Jiang, Yun-zhong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.216-216
    • /
    • 2015
  • Frequent hydro-meteorological events caused by global climate change and human exacerbate activities, make the water resource problem more complicated. The increasing speed urbanization brings a significant impact on the city flood control and security, water supply safety, water ecological security, water environment safety and the water engineering security in China, and puts forward higher requirements to urban water integrated management, undoubtedly which become the biggest obstacle for water ecological civilization construction, thus urgent requiring an advanced methods to enhance the effectiveness of the water integrated management. The other fields of smart ideas point out a development path for water resource development. The construction demand of smart water resource is expounded in the paper, combining the philosophy of modern Internet of things with the application of cloud computing technology. The concept of smart water resource is analyzed, the connotation characteristics of smart water resource is extracted, and the general model of smart water resource is refined. Then, the frame structure of smart water resource is put forward. The connotation and the overall framework of the smart water resource represent a higher level of water resource informationization development and provide a comprehensive scientific and technological support to transform water resource management from an extensive, passive, static, branch and traditional management to a fine, active, dynamic, collaborative and modern management.

  • PDF

Legal Regulation Of Digital Rights In Ukraine

  • Bilenko, Marianna;Ilchenko, Hanna;Herych, Anatolii;Solodka, Olena;Podolyak, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.59-62
    • /
    • 2022
  • In the scientific research, the object of research is a complex of legal relations, which are formed by the use of modern digital technologies. The subject of this work is the novelties of Ukrainian and foreign legislation, norms of international law aimed at regulating social relations in the field of digital rights, as well as doctrinal provisions and materials of law enforcement practice. Within the framework of this work, two types of digital rights are distinguished, those that exist in the law of Ukraine, and the issues of law that apply to legal relations, regarding the turnover of each of them, are considered. Examples of law applied in foreign countries are given for comparison. On the basis of a comprehensive study of the legal framework and positions of scientists, the prospects for the development of legal regulation of digital rights were noted.

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.