• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.023 seconds

An identification of optimized energy usage factors and monitoring System development for safety identification for elderly living (독거노인 안전확인을 위한 최적 에너지원 규명 및 모니터링 시스템 구현)

  • Kim, Hosik;Cha, Youna;Chin, Sangyoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.4
    • /
    • pp.39-48
    • /
    • 2014
  • The speed of aging society is increasingly getting faster in Korea. Currently, there are over one million elderly living alone, which represents more than 19% of the total elderly in Korea. Although various policies and research have been implemented for caring the elderly living alone, there have been obvious limitations in realization of the caring system due to inconvenience, privacy violation, difficult operation and maintenance. Therefore, the objective of this study is to develop a method and a prototype system to monitor safety of elderly living alone by using energy usage information of automatic meter reading device. The proposed system is expected to improve or resolve the existing limitations and to provide 24 hour monitoring and early detection of death for the elderly living alone without adding staffs for operation and maintenance in a more effective and economic way.

Open Social Network vs Closed Social Network: A Theoretical Approach to the Effect of the Exclusiveness of the Network (연결망 vs 연줄망: 네트워크의 폐쇄성과 그 효과에 대한 이론적 접근)

  • Lee, Sam-Ho
    • KDI Journal of Economic Policy
    • /
    • v.36 no.2
    • /
    • pp.175-196
    • /
    • 2014
  • This paper is a theoretical attempt to analyze and understand Yeonjulmang and Yeongyeolmang, which are terms for social networks with negative and positive connotation respectively in Korean Sociology. To do that, we analyze a social network where unilateral help are reciprocated. A social network in this context is a network where the past behaviors of its members are transmitted. With the information how the members behaved before, a social norm can emerge in the network, which facilitate the indirect reciprocation of unilateral help. In this norm, an agent's helping now will be rewarded by his being helped in the future. Since the reward happens in the future, this norm may not be sustained even if it is efficient. To sustain the reciprocation of the help, a norm can evolve to punish the violation of the norm more severely. If the punishment becomes too severe, the reciprocation of the help can be sustained even if it is not efficient any more in that the cost of help exceeds the benefit. If we allow the exit of the network, members have incentive to do it as belonging to the network is not beneficial any more. Then the social network may collapse. To avoid the collapse of the network, the exclusive norm, which exclude even mutually beneficial relationship with outsiders, may emerge. This can explain the emergence of Yeonjulmang, or a closed network, which is inefficient in double senses; 1) it may sustain inefficient reciprocation of help, and 2) the mutually beneficial relationship is excluded between an insider and an outsider of the network.

  • PDF

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

Treatment of crown-root fracture with a modified crown fragment reattachment technique (변형된 치관부 파절편 재부착술식을 이용한 치관치근파절의 치료)

  • Song, Chang-Won;Song, Min-Ju;Shin, Su-Jung;Park, Jeong-Won
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.5
    • /
    • pp.395-400
    • /
    • 2010
  • The development of adhesive dentistry has allowed that the crown fragment reattachment can be another option in the treatment of crown fracture. However, additional crown lengthening procedure or extrusion of the tooth may be necessary in the treatment of crown root fracture because subgingival fracture line in close proximity to the alveolar bone leads to challenges for restorative procedure and the violation of the biologic width. This case report presents a modified crown fragment reattachment technique of crown root fracture with pulp exposure, which was done without additional crown lengthening procedures. After the endodontic treatment, the patient was treated using a post insertion and the fragment reattachment technique, which made it possible to preserve the space for the biologic width and maintain a dry surgical field for adequate adhesion through the modification of the fractured coronal fragment. Since a coronal fracture was occurred and reattached afterward, it was observed that the coronal fragment was well maintained without the additional loss of periodontal attachment through 2-year follow up.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Safety Impacts of Red Light Enforcement on Signalized Intersections (교차로 신호위반 단속카메라 설치가 차량사고에 미치는 영향)

  • Lee, Sang Hyuk;Lee, Yong Doo;Do, Myung Sik
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.6
    • /
    • pp.93-102
    • /
    • 2012
  • The frequency and severity of traffic accidents related to signalized intersections in urban areas have been more serious than those in both arterial segments and crosswalks. Especially, traffic accidents involved with injuries and fatalities have caused by traffic signal violations within intersections. Therefore, many countries including Korea have installed the red light enforcement camera (RLE) to reduce traffic accidents associated with the traffic signal violation. Meanwhile, many methodologies have been studied in terms of safety impacts estimation of red light enforcement, which, however, cannot be easy to conduct. In this study, safety impacts was estimated for intersections of Chicago downtown area using SPF models and EB approach. As a result, for all crash types and target traffic accident types such as "angle", "rear end", "sideswipe in the same and other directions", "turn", and "head on", fatal crashes were reduced by 26% and 38%. However, RLE may increase property-demage-only-crashes by 3.23% and 1.16%, respectively.

A Criminal Legal Study in the Protecting the Right of Surgical Patients - Self-Determination of Patients - (수술환자의 권리보호에 대한 형사법적 쟁점 - 환자의 자기결정권을 중심으로 -)

  • Yoo, Jae Geun
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.3-26
    • /
    • 2015
  • Recently, Practicing of ghost surgery and duty of informed consent of doctors have become a big issue in the medical dispute and lawsuits. The ground of admitting the informed consent and the agreement(self-determination of patients) can be based on the dignity of man and the right to pursue his happiness guaranteed under Article 10 of the constitution in theory. However there are no explicit legal regulations on the duty of the informed consent and there is no substantive legal enactment on the informed consent, but there is a collision between self-determination of patients and the discretionary power of doctors. If the discretionary power on the duty of the informed consent was extended it may result in the infringement of the right of surgical patients, so called arbitrary medical treatment. Relating to this issue, New Jersey Supreme Court held that a patient has the right to determine not only whether surgery is to be performed on him, but also who shall perform it. Moreover it held that a surgeon who operates without the patient's consent engages in the unauthorized touching of another and, thus, commits a battery'. But there are no ghost surgery cases adopting battery theory in Korea, and professional negligence has been considered rather than the battery, regarding an absence of hostile intent to injure patient. Supreme Court of Korea held that a doctor who operates a medical procedure without the patient's valid prior consent based on wrong diagnosis commits professional negligence resulting in injury, and the patient's invalid consent do not preclude wrongfulness'. However, if a health care provider conducts a completely non-consensual treatment or substitute surgeon without consent, the action should be plead in battery, not negligence, but if a health care provider violate his duty of care in obtaining the consent of the patient by failing to disclosure all relevant information (risks) that a reasonable person would deem significant in making a decision to have the procedure, the action should be plead in negligence, not battery. Therefore, the scope of patients' self-determination can be protected by stating clearly the scope of the duty of the informed consent and the exemption of the informed consent legislatively, it is considered that it is valid to legislate the limitation of the discretionary power.

  • PDF

A Study on Continuous Monitoring Reinforcement for Sales Audit Using Process Mining Under Big Data Environment (빅데이터 환경에서 프로세스 마이닝을 이용한 영업감사 상시 모니터링 강화에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.123-131
    • /
    • 2016
  • Process mining in big data environment utilize a number of data were generated from the business process. It generates lots of knowledge and insights regarding implementation and improvement of the process through the event log of the company's enterprise resource planning (ERP) system. In recent years, various research activities engaged with the audit work of company organizations are trying actively by using the maximum strength of the mining process. However, domestic studies on applicable sales auditing system for the process mining are insufficient under big data environment. Therefore, we propose process-mining methods that can be optimally applied to online and traditional auditing system. In advance, we propose continuous monitoring information system that can early detect and prevent the risk under the big data environment by monitoring risk factors in the organizations of enterprise. The scope of the research of this paper is to design a pre-verification system for risk factor via practical examples in sales auditing. Furthermore, realizations of preventive audit, continuous monitoring for high risk, reduction of fraud, and timely action for violation of rules are enhanced by proposed sales auditing system. According to the simulation results, avoidance of financial risks, reduction of audit period, and improvement of audit quality are represented.

A Study on Lawsuit Cases and Measures of Emergency Medical Service (응급의료서비스 중 발생되는 소송사례와 대책 연구)

  • Kwon, Hay-Ran
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.77-90
    • /
    • 2009
  • Civil complaints and lawsuits filed in the process of providing emergency medical service include fall accident on the way of carrying the patient, transfer consent, refusal and rejection of rescue request, range and behavior restriction of emergency medical technicians, false registry of logbook, neglect of duty and emergency patient, and violation of traffic laws on the way of dispatch to the scene of accident. This study suggested the measures by cases as follows. 1. The accidents on the way of carrying a patient could be divided into fall of patient and fall by paramedic's mistake. In the former case, damages caused by the ambulance's shaking must be notified to the patient and guardian and recommended to fasten seat belt, in the latter case, the plan of patient's posture, route of transport, rescue and equipments should be comfirmed before fixing the patient. 2. Transfer consent must be made as implied when the patient is unconscious under delusion and was not able to consent physically, and paramedic must take an action by his judgment and record details of services on logbook. 3. When a patient refused to transfer, get 'confirmation of transfer refusal' and inform him of refusal. Paramedic should receive the signature. In addition, in case of refusal, transfer request should be made after hearing doctor's opinion and it should be notified to transfer request and superintendent of fire station after making 'confirmation of transfer refusal'. 4. Emergency medical technicians should perform their duties within the range of services prescribed by Article 41 of Law of Emergency Medical Service and Article 33 of Its Enforcement Regulations and shall not make announcement of death. In case of reporting the death to guardian, it is desirable to use record data like ECG results. 5. The best way to have protection from legal problems is making and keeping the exact records of accident and patient. Paramedic should not mention his subjective opinion about the accident-related matter. He must record correctly and keep the original medical records. 6. As emergency medical technicians are responsible for taking care of emergency patients, they must contact a briefing room when they meet a difficult situation suddenly due to vehicle stop or treatment of other patients and then must have support from neighboring hospital and other safety centers. 7. Since the ambulance operator is responsible for safety and careful driving of ambulance, he must be careful when he violates traffic regulations unavoidably. The operator should drive slowly below 10km/h at an intersection and pass it after getting way from general vehicles driving from all directions.

  • PDF

A Study on Ethical Problem of Insider Trading (내부자 거래의 윤리적 문제점에 대한 연구)

  • Yoon, Hye-jin
    • Journal of Korean Philosophical Society
    • /
    • v.126
    • /
    • pp.213-233
    • /
    • 2013
  • The aim of this paper is to reveal the ethical problem of insider trading. 'Insider trading' refer to obtaining information from non-public sources such as private acquaintances about trade secret, using it purposes of enhancing insider's financial advantages. And sometimes such a practice can be conducted fraudulently. Therefore, the focus of this paper will be on fairness or justice arguments against insider trading. And all kinds of discussion this paper are to focus the underlying consideration behind these arguments, that is, the underlying consideration about violation of ethical standards of fairness. First, one of these arguments argues that insider trading does necessarily involve defrauding general investors such as general employees, general stockholders. And economic power and unjust advantage of insider can be exercised to the detriment of this non-insider's interests. Second, another argument argues that insider trading undermines competition which is the principle of any free market. And insider trading is not only a complication in the free market mechanism, but also thwarts free competition which free markets depend. Third, the final argument argues that insider trading will be made something unfair about the concept of equal access to information. This argument argues, therefore, that to permit insider trading would be to set up stock market trading rules that are unfair to non-insiders.