• Title/Summary/Keyword: Security law

Search Result 895, Processing Time 0.023 seconds

A Study on the Civil Resource Utilization of Military Defense (국방 분야의 민간자원 활용에 관한 연구)

  • Park, Kyun Yong;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.3-10
    • /
    • 2016
  • This study is to actively respond to changes in terms of age, it was to find a possible way to realize the effective application of research to expand the civilian use of resources in the defense sector. Utilization of civil resources were first introduced by the previous government institutions to be applied to the military, our country, the use of private resources began with the 1948 case of a consignment of rubbish. In particular, in the process of overcoming the economic crisis IMF 1990s the government increased its advantage in the public service sector while introducing elements of civil to the public sector. Meanwhile, the Pentagon was promoting policies that foster and promote the civil sector in defense of "defense reform law" in terms of the advancement of military operations. The results of the work carried establish schemes for the civil use of resources, which can be protected by legal and institutional supplement, it is determined that you need a dedicated organization for the construction of projects.

The Guarantee of Criminal Victim's Information Rights (범죄피해자의 정보권보장을 위한 방안)

  • Yang, Kyung Kyoo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2013
  • The most important thing in the trial reveal the truth regardess of civil trial or criminal trial. The criminal procedure should be amended to guarantee victims the right to attend court hearings, to receive information about the progress of their case. But the new Criminal Procedure Law 2007 stipulated merely reading right of investigation records after prosecution while reading and printing rights prior to prosecution were not legislated. All sections of the criminal justice process must ensure that the process of dealing with the offender should not increase the distress or add to the problems of victims of crime in secondary victimisation. Reading and printing rights of prior to prosecution should be stipulated at earliest to protect the criminal victims and to prevent the secondary victimisation, The purpose of this study is to practically protect the right of the victims on the criminal procedures.

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

Construction of Financial Networks based on Virtual Private Networks (가상사설통신망 기반 금융전산망 구축 방안)

  • Seo, Moon-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.41-48
    • /
    • 2009
  • As enactment and enforcement of capital markets integration law, investment banks are going to be appeared in our financial market and be able to provide payment services. To provide these kinds of services, investment banks need to be participated in the financial network. As the financial network enormously affect the economy, the operation of the network will require a variety of risk managements. In this paper we define operational risk management criteria for the financial network such as security, in-time response, economical efficiency and stability to be required for the healthy economy and propose the configuration of the financial network system based on virtual private networks for investment banks to provide payment services. Finally we analyze that the proposed VPN configuration for financial networks has high security and in-time response with the cost and operation effective.

Introduction of the FSO Through the Examination of Russia's Federal Law (러시아 연방법령 고찰을 통한 경호총국 소개)

  • Kim, Chang-Ho;Oh, Jae-Hwan;Park, Jun-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.286-293
    • /
    • 2010
  • The organization and position of FSO was systematically established under the Presidential Decree No. 1013 on 7 August 2004. Furthermore, the FSO has established a signal department, an intelligence department and an academy to enhance intelligence an training capabilities. The FSO has been striving to unveil itself from a clandestine agency into a pivotal organization through the use of media and its website. It is in part that FSO has tried to deepen the understanding between PSS through personnel exchange in 2004~2005 Therefore, this study will examine the history, organization and legal position focusing on the related laws of FSO, an organization trying to adjust to the global change, and study whether this model may be applied for the development of public security in Korea.

The Genealogy of Rebellious Communication and Twitter A Discourse Analysis of the Park Jung-geun Case ('불온 통신'의 계보와 '트위터' 박정근 사건에 대한 담론 분석을 중심으로)

  • Hong, Namhee
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.329-362
    • /
    • 2017
  • This study starts from the awareness that 'rebellious communication' is still being regulated in various ways even though 'rebellious communication' was declared unconstitutional in a decision by the Constitutional Court in 2002. The meaning of 'rebellious' has been amplified and transformed at various points through the censorship systems established during the Japanese colonial era, the US military period, and the regime of Park Jung-hee. In particular, 'rebellious communication' is regulated to protect 'national security' and 'social customs' from the perspective of power. This study analyzed discourses containing judgement about the Park Jung-geun case and the violation of the National Security Law using retweet accounts or posts related to North Korea. This study explores the genealogy of 'rebellious communication' based on its relationship to the characteristics of Twitter and specific individuals.

  • PDF

A Study on The Measures of Monetary Rewards When Providing The Evidences (범죄증거자료 제보시 범죄신고보상금 지급방안에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.43-51
    • /
    • 2015
  • Many of crimes are solved by the report of people. Therefore, countries pay compensation to crime reporter. However, the current system of compensation is focused on the report of criminal fact and criminals arrest, so that there is no compensation on the providing evidence. On the other hand, since the current judicial system adopted the principle of trial by evidence, all the facts are made by the evidence. But it is impossible to obtain all the evidence only by law enforcement agencies. Therefore, it is necessary for people to report the evidence positively. So it is necessary to positively take advantages of smart phones, vehicle black boxes and cctvs. Various incentives such as compensation would be needed to require the evidence of smartphone or black box, cctv. In order to strengthen evidence report, it will be needed the legislation of crime report compensation, smartphone apps development including the provision of various incentives.

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

A Study on Regulations Status and Improving of Municipalities by Privacy Type (개인정보보호 유형에 따른 지자체 조례현황 및 개선방안 연구)

  • Yoo, Jung-Hoon;Han, Keunhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.331-342
    • /
    • 2015
  • In this paper, Seoul(25 regions), Jeonbuk(14 regions), Busan(16 regions) of 277 agencies for the based local governments were selected and reviewed an ordinance status and related laws. Based on information systems of self-regulation, the ordinance within the self-regulation for each region is being operated in the annexed form analyzed by the survey. A total of four categories(resident registration numbers, cell phone number, home number, income) by reference to the part that refused to disclose personal information, the survey analysis. Through this, The government manager who is frequently job rotation and consulting staff can understand and review the regulations by proposing the improving solution of the municipal rules. In addition, I suggested control item addition so that they can facilitate the municipal format revised review and verify the annexed form using Personal Information Management System.

A Study on the insurance crime using a false hospitalization (허위입원을 이용한 보험범죄에 대한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.79-87
    • /
    • 2015
  • In order to clearly recognize illegality of insurance crime, declaring the provisions on insurance crime is preferable. An insurance fraud differentiated from Configuration Requirements of general fraud should be established And differentiation in accordance with the act type of insurance crime the degree of organizational involvement is required. Also the introduction of civil sanctions and creation of additional punishment provision about Organized insurance fraud are required. To notice duplicate insurance when sign up life insurance, the revision of the provisions is required. To limit unnecessary long-term hospitalization, hospitalization standard is required. Introduction of private investigator is required as a method for endowing with investigation to the staff of insurance companies. By providing information sharing laws between relevant agencies including insurance companies and law enforcement agencies, the foundation of information database, and the introduction of SNA Techniques in the IFAS,, you can detect Organized collusion crime.