• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.023 seconds

Design of Security Primitive based on Hardware Architecture For RFID Tag (RFID 태그를 위한 하드웨어 구조에 기반한 보안 프리미티브 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.817-819
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its read. Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach consideration of security analysis with cryptographic primitive based on hardware basis.

  • PDF

A Study about Establishment of Discrimination Model of Impact Factors of Big Traffic Accident -With Laws Violation Type- (대형교통사고 영향요인의 판별모델 구축에 관한 연구 -법규위반 유형을 중심으로-)

  • 오윤표;고상선
    • Journal of Korean Society of Transportation
    • /
    • v.10 no.3
    • /
    • pp.59-74
    • /
    • 1992
  • The change of industrial structure, the expansion of economic scale, the elevation of national life level and rapid motorization bring about social problems that are traffic accident, traffic congestion, etc. Especially, big traffic accidents bring about the great number of dead and wounded person with damage of property. But there are no study results available mainly focused on the big traffic accident analysis. Accordingly, this study is essentially for the factor analysis of big accident types including laws violation and the assaulting driver's death using Quantification ll method.

  • PDF

A Legal Analysis of the Precedents of Medical Disputes in the Cosmetic Surgery Field

  • Park, Bo Young;Kim, Min Ji;Kang, So Ra;Hong, Seung Eun
    • Archives of Plastic Surgery
    • /
    • v.43 no.3
    • /
    • pp.278-283
    • /
    • 2016
  • Background Disputes regarding medical malpractice occur between practitioners and patients. As patients have become increasingly aware regarding medical care, an increase in the unexpected side effects of procedures has been observed, thereby leading to an increase in disputes regarding medical malpractice. In this study, we reviewed trends in precedents involving cosmetic surgery-related medical disputes, with the goal of helping to prevent unnecessary disputes in the future. Methods We conducted a search of the judgments made in South Korean courts between 2000 and 2013 that were related to the field of plastic surgery. A total of 54 judgments were analyzed, and the selected precedents were reviewed and classified according to the kind of negligence involved. Results The claim amounts ranged from under 8 million KRW (6,991 USD) to 750 million KRW (629,995 USD). The most common ratio of the judgment amount to the claim amount was 20%-30%. The judgments were classified according to the following categories: violation of the duty of explanation in 17 cases (29%), violation of the duty of care in 10 cases (17%), violation of both duties in 20 cases (35%), and no violation of duty in six cases (10%). Conclusions Cosmetic surgery-related suits require different approaches than general malpractice suits. The Supreme Court requires plastic surgeons to determine the type, timing, methods, and scope of their treatments when considering possible results. Therefore, practitioners should be educated on their rights and responsibilities to enable them to cope with any possible medical dispute that may arise.

Surveying Visitors′ Behavior in Chuwangsan National Park (주왕산국립공원의 이용자 행태조사)

  • 김용근;최성식
    • Korean Journal of Environment and Ecology
    • /
    • v.8 no.2
    • /
    • pp.160-166
    • /
    • 1995
  • Visitors to Chuwangsan National Park were survayed from August 3 to 5 n 1994. During this time, 346 visitors were contacted. Of those individuals, 65% were males. 63% of respondents reported that they had gone as far as college. 48% were 20 years of age. 97% of the survey respondents had experience to visit other national parks. The largest percentage of respondents were reported that they visited Chuwangsan Nat'1 Park for enjoying natural landscape. In group type, 50% were traveling with their family and 36% with their friends. In activity characteristics, 51% were day-time visitors, and 18% mentioned carrying in their on food. Generally most respondents were very interested in the environmental problem in national parks. The majority of visitors perceived that the environment of Chuwangsan Nat'1 Park were good enough. In six types of normative violations, the major reasons of littering were unintentional violation and releaser-cue violation. Most respondents were not likely to intervene to stop other visitors' depreciative behavior (Bystander intervention behavior). In two dilemmas, the more likely the intention to obey a regulation the less likely the intention to disobey a regulation, and vice-versa.

  • PDF

A Statistical Approach about Documents of Women's recognition on the Date Rape (데이트 강간의 여성 인식에 관한 문헌통계학적 접근)

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.287-294
    • /
    • 2008
  • As shown in many precedent studies of sex violation, many rapes are done by acquaintances rather than strangers. Among them specially many are the cases carried out by date partners and so it is necessary to study on the date rape systematically and academically which is the most common sex violation. A recent study on the date rape executed in the country shows the seriousness of the problem clearly. The survey reported that 20.5 percentages of women had experienced the harmfulness of date rape. However compared with the general injured women, the injured ones of date rape rarely report it to related organs. The reason is that in the case of date rape both the injured ones and offenders just think of the injured things or offending works as a little excessive sexual relation or sexual contact, but not recognize it as sex violation. Therefore this study will introduce the results of precedent studies on the date rape based on the contents of Michael Shively, Perceived Risks of Date Rape, Judith M. Sgarzi, Victimology, and also introduce the prevention of the injury its countermeasures.

  • PDF

A Tool for On-the-fly Repairing of Atomicity Violation in GPU Program Execution

  • Lee, Keonpyo;Lee, Seongjin;Jun, Yong-Kee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.1-12
    • /
    • 2021
  • In this paper, we propose a tool called ARCAV (Atomatic Recovery of CUDA Atomicity violation) to automatically repair atomicity violations in GPU (Graphics Processing Unit) program. ARCAV monitors information of every barrier and memory to make actual memory writes occur at the end of the barrier region or to make the program execute barrier region again. Existing methods do not repair atomicity violations but only detect the atomicity violations in GPU programs because GPU programs generally do not support lock and sleep instructions which are necessary for repairing the atomicity violations. Proposed ARCAV is designed for GPU execution model. ARCAV detects and repairs four patterns of atomicity violations which represent real-world cases. Moreover, ARCAV is independent of memory hierarchy and thread configuration. Our experiments show that the performance of ARCAV is stable regardless of the number of threads or blocks. The overhead of ARCAV is evaluated using four real-world kernels, and its slowdown is 2.1x, in average, of native execution time.

Analysis of the Leading Cases of Nurses charged with Involuntary Manslaughter (간호사 업무상과실치사상죄 판례분석)

  • Song, Sung Sook;Kim, Eun Joo
    • Journal of muscle and joint health
    • /
    • v.28 no.1
    • /
    • pp.30-40
    • /
    • 2021
  • Purpose: This study aims to present nurses' legal conflicts and legal basis through the precedent analysis of a crime of professional negligence resulting in death and injury for the past 20 years and provide vital references to cultivate the correct and high-level legal consciousness of nurses. Methods: This study was conducted in five stages of the systematic content analysis method. It amalyses the precedents of a crime of nurses' professional negligence resulting in death and injury from 2000 to 2020. The application system for the provision of the written judgment was used to collect precedents. A total of 67 cases were analyzed in this study, and they were classified according to the type of nursing error, and the contents were systematically analyzed. Results: A total of 52 cases (77.5%) of nursing errors were caused by independent nursing practices. They were classified as 38 cases (A1) in the violation of patient supervision obligations, 12 cases in the violation of progress observation obligations (A2), one case in the violation of medical equipment inspection obligations (A3), and one case in the violation of explanation and verification obligations. Among the non-independent nursing practices (code B), B1 was 10 cases related to administrative acts, one blood transfusion accident (B2), and one anesthesia accident (B3). Conclusion: To prevent nurses from being involved in legal confits, the advocation of systematic training such as nurses' legal obligations and judgment grounds through case-based learning from the recent precedent analysis and promote nurses' legal perspective, and preventive activities are essential.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

Analysis of Intersection Signal Violation Accident Using Simulation (시뮬레이션을 이용한 교차로 신호위반 사고 해석)

  • Han, Chang-Pyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.424-430
    • /
    • 2021
  • Determining the cause of a traffic signal violation is difficult if the drivers' claims are contradictory. In this study, the process of identifying signal violations using a simulation was presented based on cases. First, statements from the driver or witness whose cause of the signal violation is unclear were excluded. Second, the final position, final location, damaged area, steering status, braking status, and road surface traces of the vehicle were collected. The impact point was investigated from the stop line. Third, simulation data were modified and entered until the collision situation of the accident vehicle and the final stop position were met. Fourth, if the simulation results were consistent with the crash situation, the facts were verified by cross-validation to conform to the driver's statement. The results of the simulation showed that the Lexus entered the left turn signal in the intersection at approximately 55 km/h. In comparison, the Sonata driver saw the vehicle straight ahead at the intersection, entered the 72 km/h intersection, and collided with the Lexus. Therefore, the Sonata was identified as a signal violation, and the claims of the Sonata driver, witnesses, and police were contradictory.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.