• Title/Summary/Keyword: User Protection Regulations

Search Result 25, Processing Time 0.029 seconds

A Study on the Injection Characteristics of Fuel Supply System of Diesel Engine (디젤엔진 연료계통의 분사특성에 관한 연구)

  • 송치성
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.17 no.4
    • /
    • pp.49-62
    • /
    • 1993
  • It has been a principle research topic on the diesel engine development to increase the efficiency and the performance of engine to satisfy the user's needs for high reliability and durability. However, recently with the worldwide concerns at the global climate change and environmental protection, the main target in the diesel engine research has been changed to solve the exhaust emission problem in order to satisfy the strict emission regulations. To reduce the pollutant for the diesel engine, the researchs on the combustion chamber is the most important and has to be performed first of all. The diesel fuel injection system plays major role to air-fuel mixing process and influences engine output, themal efficiency, reliability, noise, and emissions. The experimental studies were conducted by varying the various parametric conditions and the results were campared with the computation and calculated results by using the fuel injection simulation program developed during previous research. From the experiments, the matching technique of a fuel injection pump and nozzle was conducted to understand under the various parametric conditions. Also, the relations between needle lift and wave propagation characteristics in high pressure pipe were examined. The basic design data from the experimentations and computation works would be applied to actual design works of diesel fuel injection system.

  • PDF

Research for the Wear Status and Encourage the Children to Wear Safety Helmets (어린이용 안전모의 착용실태와 착용성 증대 방안을 위한 연구)

  • Song, Rae Ho;Lee, Kang In
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.149-162
    • /
    • 2015
  • This study was conducted on young children safety helmet to prevent risk of head injuries from external shock. Young children helmet shall be easy to wear and use comfortably. But the young children helmet market in domestic has imported dependently and widely variations in quality because the euro product of high priced and the east asia product of low priced are selling at the same time. Therefore, this study surveyed children under 13 years of age and Married people and studies their actual state of wearing. Furthermore, this study is going to propese the improving wearing of helmet and the major points of quality of helmet and the problem by comparing and reviewing regulations of domestic and foreign.

The Relationship among Participation Motivation, Flow, and Problem Gambling in Bicycle Racing: Moderated Mediation Effect of Visit Frequency (경륜 장외발매소 이용자의 도박동기, 몰입, 문제도박과의 관계에서 이용빈도의 조절된 매개효과)

  • Lee, Soyoung;Choi, Hyejin;Yoon, Suin;Choi, Soonlye;Lee, Hongjik;Yun, Seungtae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.659-674
    • /
    • 2019
  • The purpose of this study is to verify the path of the motivation, the flow, and problem gambling and intervention points. To this end, we verified the mediation effect of the motivation of the users outside sales offices influences the problem gambling through a flow and the moderated mediation effect of the frequency of the use of a bicycle racing tracks in that process. A total of 411 cases were analyzed using surveys conducted for one day on a weekday and weekend (September 13th and 15th 2018) for adults using an outside sales office in Jangan. According to the analysis, the causality of gambling by gambling motivation(amusement, excitement, avoidance, society, money) showed its effect positively by mediating the flow. The adjusted effect of the frequency of the use on the intermediary effect of the motivation ${\rightarrow}$ flow ${\rightarrow}$ problem gambling behavior, which is the main concern of this study, was found to be statistically significant. More specifically, the effect of adjusting the frequency of the use was statistically significant in both paths: motivation/flow and flow/problem gambling. It was also shown that, in the model with excitement, avoidance and social motivation, the adjustment of the frequency was only significant in the causal relationship between the flow and problem gambling. Based on these findings, this study made clinical and policy suggestions for intervention for gamblers and user protection regulations.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Real Estate Industry in the Era of Technology 5.0

  • Sun Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.6
    • /
    • pp.9-22
    • /
    • 2023
  • Purpose: This paper aims to suggest ways to apply the leading technologies of Industry 5.0 to the housing welfare field, tasks for this, and policy implications. Research design, data, and methodology: The analysis method of this study is a literature study. The analysis steps are as follows. Technology trends and characteristics of Industry 5.0 were investigated and analyzed. The following is a method of applying technology 5.0 in the industrial field. Finally, the application areas of each technology and the challenges to be solved in the process were presented. Results: The results of the analysis are 1) the accessibility and diffusion of technology. This means that all citizens have equal access to and use of the latest technology. To this end, the appropriate use of technology and the development of a user-centered interface are needed. 2) Data protection and privacy. Residential welfare-related technologies may face risks such as personal information leakage and hacking in the process of collecting and analyzing residents' data. 3) Stability, economic feasibility, and sustainability of the technology. Conclusions: The policy implications include: 1) Enhancing technology education and promotion to improve tech accessibility for groups like the low-income, rural areas, and the elderly, 2) Strengthening security policies and regulations to safeguard resident data and mitigate hacking risks, 3) Standardization of technology, 4) Investment and support in R&D.

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

Privacy model for DTC genetic testing using fully homomorphic encryption (동형암호를 활용한 DTC유전자검사 프라이버시모델)

  • Hye-hyeon Jin;Chae-ry Kang;Seung-hyeon Lee;Gee-hee Yun;Kyoung-jin Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.133-140
    • /
    • 2024
  • The spread of Direct-to-Consumer (DTC) genetic testing, where users request tests directly, has been increasing. With growing demand, certification systems have been implemented to grant testing qualifications to non-medical institutions, and the scope of tests has been expanded. However, unlike cases in less regulated foreign countries, disease-related tests are still excluded from the domestic regulations. The existing de-identification method does not adequately ensure the uniqueness and familial sharing of genomic information, limiting its practical utility. Therefore, this study proposes the application of fully homomorphic encryption in the analysis process to guarantee the usefulness of genomic information while minimizing the risk of leakage. Additionally, to safeguard the individual's right to self-determination, a privacy preservation model based on Opt-out is suggested. This aims to balance genomic information protection with maintainability of usability, ensuring the availability of information in line with the user's preferences.

Concepts of Disaster Prevention Design for Safety in the Future Society

  • Noh, Hwang-Woo;Kitagawa, Keiko;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.10 no.1
    • /
    • pp.54-61
    • /
    • 2014
  • In this paper, we propose a pioneering concept of DPD(Disaster Prevention Design) to realize a securable society in the future. Features of danger in the future society are expected to be diverse, abrupt occurring, large scale, and complicated ways. Due to increment of dangers with their features of uncertainty, interactivity, complexity, and accumulation, human-oriented design concept naturally participates in activities to prevent our society against disasters effectively. We presented DPD is an essential design activity in order to cope with dangers expected in the future societies as well as realize securable environments. DPD is also an integrated design aids including preemptive protections, rapid preparing, recovery, and interactive cooperation. We also expect these activities of DPD is effective for generation of new values in the market, satisfaction of social needs, expansion of design industry, and a novel chance for development in the future society. Throughout this paper, we submit various aspects of DPD concepts including definition, classification, scope, necessity, strategy, influencing elements, process, and its principle. We expect these concepts will be the seed and/or basement of DPD research for the future works. For the direction of study for DPD in the future, we emphasize alarm system for preemptive protection rather than recovery strategy for the damage occurred. We also need to research about progressive prevention techniques and convergence with other areas of design. In order to transfer the concept of product design from facility-oriented mechanism to human-oriented one, we should develop new kinds of city basis facilities, public-sense design concepts referred to social weak-party, e-Learning content design preparing disasters, and virtual simulation design etc. On the other hand, we have to establish laws and regulations to force central and/or provincial governments to have these DPD strategies applying their regional properties. Modern design activities are expanding to UI(user interface) content design area overcoming the conventional design concept of product and/or service. In addition, designers are recognized as art directors or life stylists who will change the human life and create the social value. DPD can be divided into prevention design, preparedness design, response design, and recovery design. Five strategies for successful DPD are Precaution-oriented, Human-oriented, Sense-oriented, Legislation, and Environment Friendly Strategies.

The Actual Use of Non-regular Workers and the Strategies of Social Partners in Sweden: with a Special Reference to Temporary Workers (스웨덴 비정규직의 사용 실태와 행위주체들의 전략: 임시직 사용 방식을 중심으로)

  • Cho, Don-Moon
    • Korean Journal of Labor Studies
    • /
    • v.23 no.1
    • /
    • pp.47-83
    • /
    • 2017
  • The Swedish labor market secures flexibility in the use of labor force by means of non-regular workers such as temporary workers among others instead of regular workers' layoffs. Although the labor law reform in the late 2000s made it easier to use temporary workers and the outbreak of the economic crisis strengthened the power of user firms against labor unions, the size of temporary workers was scaled down. It is the aim of this study to analyze the change in the use of temporary workers, to examine the effect of the labor law reform and that of economic crisis in that regard, and to explain how, over the use of temporary workers, user firms' strategy to secure flexibility and labor unions' strategy to regulate flexibility interact with each other so as to establish a new equilibrium through conflicts and compromises. The labor law reform to enhance the flexibility in the use of temporary workers failed to entail amendments of collective contracts. Besides, out of the economic crisis, user firms adopted a new policy to use third party workers more, refraining from employing temporary workers. That's why the number of temporary workers has declined eventually. User firms prefer to use third party workers because they could avoid their own responsibility as an employer and they could rely on 'permanent temporary' workers without any time limit. Labor unions, however, responded with a strategy to lay more strict regulations on the use of third party workers, so that third party workers could be used only for limited cause for external numerical flexibility. As a result, the managed flexibility thesis comes to prevail to the usage of non-regular workers in general beyond the category of agency workers. Korea with severe abuse of third party workers should learn from Swedish labor unions' strategy to provide third party workers with stronger employment security and higher wages so as to prevent user firms from abusing third party workers.