• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.025 seconds

Automatic Classification of Malicious Usage on Twitter (트위터 상의 악의적 이용 자동분류)

  • Kim, Meen Chul;Shim, Kyu Seung;Han, Nam Gi;Kim, Ye Eun;Song, Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.1
    • /
    • pp.269-286
    • /
    • 2013
  • The advent of Web 2.0 and social media is taking a leading role of emerging big data. At the same time, however, informational dysfunction such as infringement of one's rights and violation of social order has been increasing sharply. This study, therefore, aims at defining malicious usage, identifying malicious feature, and devising an automated method for classifying them. In particular, the rule-based experiment reveals statistically significant performance enhancement.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

A Study on Level of Safety Awareness and Disaster Prevention Measures According to Driver's Characteristic (운전자 특성에 따른 안전 의식 수준과 재해예방 대책에 대한 연구)

  • Lee, Man-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.131-136
    • /
    • 2013
  • Automobile was first introduced in 1903 in South Korea, the masses of the car was carried out rapidly compared to other countries. However, many people were killed in a traffic accidents and economic loss was occurred due to the spread of the automobile. In South Korea, 2012, traffic accident occurred 223,656 times, 5,392 fatality, 344,565 injured people. In the last five years, about 224,000 accidents per year were occurring. In other words, 610 traffic accidents occur and about 15 people pass away in one day. In addition, the proportion of traffic accidents is first place in the OECD countries and it is very high in the world. Understand occurrence tendency of traffic accident, accident frequency rate of the driver who drives more than 10 years was higher than the novice driver. In addition, as a result of examining the cause of the traffic accident, breach of safe driving obligation appears highest case (125,391 times), and followed by signal violation, break safety distance. Therefore, the majority of traffic accidents occurred by the lack of safety awareness of the driver. In this study, prevent the loss of human life and property in traffic disaster, by establish disaster prevention measures that investigated by questionnaire survey and statistical data of the state of consciousness and driving posture in response to the driving history of the driver.

Performance Evaluation of Service-Aware Optical Transport System

  • Youn, Ji-Wook;Yu, Jea-Hoon;Yoo, Tae-Whan
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.241-247
    • /
    • 2010
  • We propose and experimentally demonstrate a service-aware optical transport system. The proposed service-aware optical transport system makes a flow based on service type and priority of traffic. The generated flow is mapped to a corresponding sub-${\lambda}$ for transport over an optical network. Using sub-${\lambda}$ provided by the centralized control plane, we could effectively provide quality-of-service guaranteed Ethernet service and best-effort service simultaneously in a single link. The committed information rate (CIR) traffic and best-effort traffic are assigned to different sub-${\lambda}s$. The bandwidth of the CIR traffic is guaranteed without being affected by violation traffic because the bandwidth is managed per each sub-${\lambda}$. The failure detection time and restoration time from a link failure is measured to be about 60 ${\mu}s$ and 22 ms, respectively, in the ring network. The measured restoration time is much smaller than the 50 ms industry requirement for real-time services. The fast restoration time allows the proposed service-aware optical transport system to offer high availability and reliability which is a requirement for transport networks.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

A Study on CIETAC Case about Acceptance with Different Terms - Focus on CISG - (변경을 가한 승낙에 관한 CIETAC 사례 연구 - CISG를 중심으로 -)

  • Kang, Ho-Kyung
    • Journal of Arbitration Studies
    • /
    • v.24 no.4
    • /
    • pp.127-145
    • /
    • 2014
  • The wording of Article 18 shows that a statement made by or other conduct of the offeree indicating assent to an offer is an acceptance. Meanwhile, Article 19 states that this reply with different terms is a rejection of the offer and constitutes a counteroffer. For example, additional or different terms relating, among other things, to the price, payment, quality and quantity of the goods, place and time of delivery, extent of one party's liability to the other, or the settlement of disputes are considered to alter the terms of the offer materially. However, this reply with different terms which do not materially alter the terms of the offer constitutes an acceptance unless the offer or, without undue delay, objects orally to the discrepancy or dispatches a notice to that effect. As a result, the acceptance depends on whether different terms are material or not. CIETEC holds that the deletion of contract violation liability clause is not equal to an alteration to the extent of one party's liability to the other as stipulated in Article 19(3) of the CISG. In addition, CIETAC recognizes that one party had orally accepted the modifications made to the sales confirmation, with even China declaring against an oral contract. Lastly, CIETAC holds that the sales confirmation has been established when both parties signed on the sales confirmation instead of the acceptance being effective. Korean companies should, thus, note these issues when they solve disputes at CIETAC.

  • PDF

Study on Early Childhood Teachers' Attempts to Implement Perception on Rights of Young Children (영유아교사의 영유아 권리 인식의 실행 노력에 대한 연구)

  • Kim, Ho Hyun
    • Korean Journal of Childcare and Education
    • /
    • v.13 no.6
    • /
    • pp.127-141
    • /
    • 2017
  • Objective: The purpose of this study was to figure out early childhood teachers' perception on rights of young children and what they do to implement the perceived rights of young children in early childhood settings. Methods: Two individual and two group interviews were conducted. First, individual interviews were held with one childcare center teacher, and then interviews were held with one kindergarten teacher. Both group interviews were conducted with three different kindergarten teachers. All interviews were held two times. Recorded and transcribed interview data were analyzed. Results: The results are as follows. First, participants perceived rights as natural, protective, expressive, equally respectful, and joyful but understood differently from that of adults due to developmental status of young children, which included rights to life, equality, participation, protection, and happiness. Second, teachers remarked that they used strategies to project young children's emotions to implement perception on rights to life and happiness, discern deprivation from violation for rights to protection and equality, and set rules and have double standards utilizing resources around, for rights to participation. Conclusion/Implications: These results have implication for organizing contents for rights education for early childhood teachers.

The Key Issues of Lone Star Investment Treaty Arbitration and the Korean Government Strategy (론스타의 투자조약중재 제기 쟁점과 한국 정부의 전략적 대응방안)

  • Oh, Hyun-Suk;Kim, Sung-Ryong
    • Journal of Arbitration Studies
    • /
    • v.27 no.4
    • /
    • pp.133-156
    • /
    • 2017
  • The purpose of this paper is to take a countermeasure of the investment treaty arbitration that Lone Star claimed to the Korean government. In particular, this study suggests procedural measures to be prepared by the Korean government after the arbitration award. The actual remedy in ICSID arbitration is the annulment procedure of arbitration award. Therefore, this study analyzed the measures that the Korean government can prepare based on the annulment grounds: the inadequacy of the constitution of the arbitral tribunal, the excessive power of the arbitrator, the corruption of the arbitrator, and the serious violation of the rules. First, the Korean government should decide whether to proceed with the annulment procedure after the arbitration award. Second, if they decide to do it, they should review the grounds of annulment. For example, it is possible to analyze whether the relationship between the arbitrator and Lone Star can be properly in the constitution of the arbitral tribunal, whether Lone Star is eligible to apply for ICSID arbitration, or whether arbitration tribunal ignores the crucial evidence that can affect the arbitration award. Independently, the Korean government needs to discuss the investment arbitration appeal system in a long-term perspective.

The Study on the Practical Problems of FOB and CIF terms under L/C transaction - with Special Emphasis on Incoterms® 2010 - (신용장 거래에 있어서 FOB, CIF조건의 적용상 문제점에 관한 연구 - Incoterms® 2010을 중심으로 -)

  • Lee, Dae-Woo;Yang, Ui-dong
    • Journal of Arbitration Studies
    • /
    • v.21 no.3
    • /
    • pp.189-211
    • /
    • 2011
  • This article aims at analysing the practical problems of FOB and CIF terms relating to Incoterms$^{(R)}$2010 in case of L/C transactions and presenting the defending measures against them. According to Incoterms$^{(R)}$2010, FOB and CIF terms are to be used only for sea or inland waterway transport and require the seller deliver the goods on board the vessel nominated by the buyer at named port of shipment. So if FOB and CIF terms will be used in sea transport under L/C transaction, the seller should ship the goods on the nominated vessel and present the shipping document indicating "on board vessel" to the issuing bank but the parties agree to present the received bill of lading according to special condition on L/C which is" received bill of lading are acceptable". In practical transaction, FOB and CIF terms are usually used in aircraft cargo, container cargo or multimodal transport. these facts are a violation of Incoterms. Incoterms$^{(R)}$2010 which regulated that FOB and CIF terms may not be appropriate where goods are handed over the carrier before they are on board the vessel for example goods in container. These transactions are a temporary expedient and breach of Incoterms in the international trade which must be corrected as soon as possible.

  • PDF

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF