• Title/Summary/Keyword: Security laws

Search Result 354, Processing Time 0.041 seconds

Survey for Renewable Energy Policy of Japan and China (일본과 중국의 신재생에너지정책 조사 연구)

  • Jang, Woon-Jeong;Jeon, Mi-Hwa;Kim, Yoon-Kyung
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.289-292
    • /
    • 2009
  • This paper reviewed laws and policies of renewable energy in Japan and China. Japan has enacted laws and implemented policies of renewable energy since 1980 for their energy security and environmental problem, and nowadays renewable energy is one of solutions for UNFCCC and Kyoto Protocol. Japan plays a leading role in photovoltaic power generation. As second largest energy consumer, China generates a lot of pollution from their energy use. However Chinese government attempts to sustainable development among economy, society and environment, suggests to use renewable energy in the way to reduce pollution and improve living standards. Korea focused on renewable energy as one of motive power in Green Growth. Review for renewable energy policy of two countries gives Korean policy implication and helps "Green Growth", national theme of Korea.

  • PDF

Technology Of Application Of Multifrequency Signals To Create An Electromagnetic Field

  • Strembitska, Oksana;Tymoshenko, Roman;Mozhaiev, Mykhailo;Buslov, Pavlo;Kashyna, Ganna;Baranenko, Roman V.;Makiievskyi, Oleksii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.40-43
    • /
    • 2021
  • In the article of instability on the peak power level, duration and repetition period of a multifrequency space-time signal, we calculated the maximum values of the errors of the parameters of the laws of spatial-phase-frequency control. Requirements for the accuracy of the location of the phase centers of the emitters in a cylindrical phased array antenna with pyramidal horns; it is advisable to calculate the radiation field using single-stage and multi-stage distribution laws. The phase centers of individual radiation sources of a cylindrical phased array antenna have been studied; they have almost no effect on the duration and period of recurrence.

The Protection of Criminal Victims and the Improvement of Relevant Laws (범죄피해자 보호와 관련한 법률의 개선방안)

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.235-258
    • /
    • 2007
  • Every crime involves a victim and an offender. The offender, from the start of the criminal investigation, is considered as a suspect. After prosecution, he/she becomes the accused, and under consitutional law and criminal procedural law, has the right to enforce the contests of the acts. On the other hand, the victim or his/her family, despite being the person harmed, has very few and comparatively weak rights. To overcome this problem, the Korean criminal justice has recently recognised 'the protection and support of the victim' as a major proposition, and the police as well as the prosecutor's office have been releasing improvement plans for the protection of victims. Setting the above as the background, this thesis deals with the current victim protection acts and discusses the methods to improve them. This study will investigate a more reasonable and effective method of victim support and protection. Currently korea's laws regarding victim protection are not satisfactory, however it is fitting to say that it is certainly an external outline of what it should be. This has been due to the enforcement and creation of 'criminal victim protection' and has acted as a key to more improvements ever since. Despite this, the lack of commitment in human and financial resources to enforce these laws has now produced a possibility of the laws proving to be nothing but an unopened letter. To prevent this from happening, the victim nothing but an unopened letter. To prevent this from happening, the victim protection related laws need to be revised to be more practical and secure. Despite this, the lack of commitment in human resources and financial resources to enforce these laws has now produced a possibility of the laws proving to be nothing but an unopened letter. To prevent this from happening, the victim nothing but an unopened letter. To prevent this from happening, the victim protection related laws need to be revised to be more practical and secure.

  • PDF

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF

A study of the major countries cyber terrorism Response System and Implications - Focusing on Analyzing the U.S., U.K. and Germany Cases - (주요국의 사이버테러 대응체계와 시사점 분석 - 미국·영국·독일 사례의 비교를 중심으로 -)

  • Kwon, Oh-Kook;Seok, Jae-Wang
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.187-214
    • /
    • 2016
  • In the mordern society, the reliance on the cyber domain and the cyber connectivity has been increasingly strengthened. Due to this phenomenon, the cyberterror against critical infrastructures and state organs might lead to fatal consequences. Lately, North Korea's cyberattacks against South Korea's national organizations and financial computer networks are becoming more and more intelligent and sophisticated. The cyberattacks against such critical infrastructures have caused enormous economic loss and social disorder. This paper is designed to examine comparatively the cyberterror related laws and organizations of the advanced countries such as U.S. and U.K. and to draw implications. Although those countries are under different institutional and cultural backgrounds with varying security envrionments, they are identically pursuing measures by establishing government-wide counterterror system for coordination and cooperation. They are also commonly focusing upon creating new organizations equipped with new system and upon enhancing intelligence performance and devising punishment regulations. Korea is lack of framework laws regulating cyber security, having only scattered individual laws. Since such legal base is far from efficient counterterror activities, it is necessary that the legal and policy response of the advanced countries should be closely studied for selective introduction. That will eventually lead to legislation of cyber security law. With such legislation on hand, it is subsequently required to strengthen crisis management for prevention of cyberterror and to create joint response team, cooperating with private organizations.

  • PDF

A Study on the Integrated Management of National Critical Infrastructures (국가기반체계의 통합적 관리 연구)

  • Ryu, Ji-Hyeob;Lim, Ik-Hyun;Hwang, Eui Jin
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.67-72
    • /
    • 2009
  • The occurrence of disaster lately is coming with the more complex form and increasing the necessity of National Infrastructures Protection Plan(NIPP). International and domestic laws and systems related to critical infrastructures were investigated. The program in which the classification of national critical infrastructures was expanded eight fields to thirteen fields including emergency services, large gathering sites, defense industrial base, and national monuments was presented in this study. The plan for integrating national critical infrastructures, national important infrastructures and national security infrastructures and a NIPP framework were proposed.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.