• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.027초

트위터 상의 악의적 이용 자동분류 (Automatic Classification of Malicious Usage on Twitter)

  • 김민철;심규승;한남기;김예은;송민
    • 한국문헌정보학회지
    • /
    • 제47권1호
    • /
    • pp.269-286
    • /
    • 2013
  • 웹 2.0과 소셜미디어의 출현은 빅 데이터의 생성을 주도하고 있다. 하지만 이와 정비례하여 권리침해 및 사회질서위반 등의 역기능도 가파르게 증가하고 있는 실정이다. 이에 본 연구에서는 소셜미디어를 통해 생산되는 방대한 양의 데이터 중에서 악의적 이용을 필터링하여 건전한 사이버 생태계 구현에 기여할 수 있는 자동화 기법을 고안하고자 하였다. 실험 결과, 악의적 이용의 효과적 분류를 위해 사전을 이용한 규칙기반 자동분류에서 통계적으로 유의미한 성능 향상률을 보였다. 이러한 연구결과를 바탕으로 효과적인 악의적 이용 자동분류를 위한 방법을 제시하였다.

안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜 (Group Key Management Protocol for Secure Social Network Service)

  • 서승현;조태남
    • 전자공학회논문지CI
    • /
    • 제48권3호
    • /
    • pp.18-26
    • /
    • 2011
  • 최근 급성장하고 있는 소셜 네트워크 서비스는 인적 네트워크를 반영한 온라인 서비스로서 선거 유세, 기업 홍보 마케팅, 교육적 정보 공유, 의학적 지식 및 의견 교환 등 다양한 목적으로 사용되고 있다. 이 서비스는 공동의 관심사를 가진 사람들이 모여 자유롭게 정보와 의견을 교환하면서 친분관계를 형성하도록 하고, 자신의 프로파일과 친분관계에 있는 사람들을 공개함으로써 다른 사람의 인맥을 활용하여 자신의 관계를 확장시켜 나갈 수 있도록 한다. 그러나 정보의 개방과 공유를 기반으로 하는 소셜 네트워크 서비스는 프라이버시 침해나 피싱과 같은 많은 보안상의 문제를 야기 시킨다. 본 논문에서는 키링을 이용하여 소셜 네트워크에서 소규모 그룹의 통신을 보호하기 위한 키 관리 기법 및 프로토콜을 제시하였다.

운전자 특성에 따른 안전 의식 수준과 재해예방 대책에 대한 연구 (A Study on Level of Safety Awareness and Disaster Prevention Measures According to Driver's Characteristic)

  • 이만수
    • 대한안전경영과학회지
    • /
    • 제15권4호
    • /
    • pp.131-136
    • /
    • 2013
  • Automobile was first introduced in 1903 in South Korea, the masses of the car was carried out rapidly compared to other countries. However, many people were killed in a traffic accidents and economic loss was occurred due to the spread of the automobile. In South Korea, 2012, traffic accident occurred 223,656 times, 5,392 fatality, 344,565 injured people. In the last five years, about 224,000 accidents per year were occurring. In other words, 610 traffic accidents occur and about 15 people pass away in one day. In addition, the proportion of traffic accidents is first place in the OECD countries and it is very high in the world. Understand occurrence tendency of traffic accident, accident frequency rate of the driver who drives more than 10 years was higher than the novice driver. In addition, as a result of examining the cause of the traffic accident, breach of safe driving obligation appears highest case (125,391 times), and followed by signal violation, break safety distance. Therefore, the majority of traffic accidents occurred by the lack of safety awareness of the driver. In this study, prevent the loss of human life and property in traffic disaster, by establish disaster prevention measures that investigated by questionnaire survey and statistical data of the state of consciousness and driving posture in response to the driving history of the driver.

Performance Evaluation of Service-Aware Optical Transport System

  • Youn, Ji-Wook;Yu, Jea-Hoon;Yoo, Tae-Whan
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.241-247
    • /
    • 2010
  • We propose and experimentally demonstrate a service-aware optical transport system. The proposed service-aware optical transport system makes a flow based on service type and priority of traffic. The generated flow is mapped to a corresponding sub-${\lambda}$ for transport over an optical network. Using sub-${\lambda}$ provided by the centralized control plane, we could effectively provide quality-of-service guaranteed Ethernet service and best-effort service simultaneously in a single link. The committed information rate (CIR) traffic and best-effort traffic are assigned to different sub-${\lambda}s$. The bandwidth of the CIR traffic is guaranteed without being affected by violation traffic because the bandwidth is managed per each sub-${\lambda}$. The failure detection time and restoration time from a link failure is measured to be about 60 ${\mu}s$ and 22 ms, respectively, in the ring network. The measured restoration time is much smaller than the 50 ms industry requirement for real-time services. The fast restoration time allows the proposed service-aware optical transport system to offer high availability and reliability which is a requirement for transport networks.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

변경을 가한 승낙에 관한 CIETAC 사례 연구 - CISG를 중심으로 - (A Study on CIETAC Case about Acceptance with Different Terms - Focus on CISG -)

  • 강호경
    • 한국중재학회지:중재연구
    • /
    • 제24권4호
    • /
    • pp.127-145
    • /
    • 2014
  • The wording of Article 18 shows that a statement made by or other conduct of the offeree indicating assent to an offer is an acceptance. Meanwhile, Article 19 states that this reply with different terms is a rejection of the offer and constitutes a counteroffer. For example, additional or different terms relating, among other things, to the price, payment, quality and quantity of the goods, place and time of delivery, extent of one party's liability to the other, or the settlement of disputes are considered to alter the terms of the offer materially. However, this reply with different terms which do not materially alter the terms of the offer constitutes an acceptance unless the offer or, without undue delay, objects orally to the discrepancy or dispatches a notice to that effect. As a result, the acceptance depends on whether different terms are material or not. CIETEC holds that the deletion of contract violation liability clause is not equal to an alteration to the extent of one party's liability to the other as stipulated in Article 19(3) of the CISG. In addition, CIETAC recognizes that one party had orally accepted the modifications made to the sales confirmation, with even China declaring against an oral contract. Lastly, CIETAC holds that the sales confirmation has been established when both parties signed on the sales confirmation instead of the acceptance being effective. Korean companies should, thus, note these issues when they solve disputes at CIETAC.

  • PDF

영유아교사의 영유아 권리 인식의 실행 노력에 대한 연구 (Study on Early Childhood Teachers' Attempts to Implement Perception on Rights of Young Children)

  • 김호현
    • 한국보육지원학회지
    • /
    • 제13권6호
    • /
    • pp.127-141
    • /
    • 2017
  • Objective: The purpose of this study was to figure out early childhood teachers' perception on rights of young children and what they do to implement the perceived rights of young children in early childhood settings. Methods: Two individual and two group interviews were conducted. First, individual interviews were held with one childcare center teacher, and then interviews were held with one kindergarten teacher. Both group interviews were conducted with three different kindergarten teachers. All interviews were held two times. Recorded and transcribed interview data were analyzed. Results: The results are as follows. First, participants perceived rights as natural, protective, expressive, equally respectful, and joyful but understood differently from that of adults due to developmental status of young children, which included rights to life, equality, participation, protection, and happiness. Second, teachers remarked that they used strategies to project young children's emotions to implement perception on rights to life and happiness, discern deprivation from violation for rights to protection and equality, and set rules and have double standards utilizing resources around, for rights to participation. Conclusion/Implications: These results have implication for organizing contents for rights education for early childhood teachers.

론스타의 투자조약중재 제기 쟁점과 한국 정부의 전략적 대응방안 (The Key Issues of Lone Star Investment Treaty Arbitration and the Korean Government Strategy)

  • 오현석;김성룡
    • 한국중재학회지:중재연구
    • /
    • 제27권4호
    • /
    • pp.133-156
    • /
    • 2017
  • The purpose of this paper is to take a countermeasure of the investment treaty arbitration that Lone Star claimed to the Korean government. In particular, this study suggests procedural measures to be prepared by the Korean government after the arbitration award. The actual remedy in ICSID arbitration is the annulment procedure of arbitration award. Therefore, this study analyzed the measures that the Korean government can prepare based on the annulment grounds: the inadequacy of the constitution of the arbitral tribunal, the excessive power of the arbitrator, the corruption of the arbitrator, and the serious violation of the rules. First, the Korean government should decide whether to proceed with the annulment procedure after the arbitration award. Second, if they decide to do it, they should review the grounds of annulment. For example, it is possible to analyze whether the relationship between the arbitrator and Lone Star can be properly in the constitution of the arbitral tribunal, whether Lone Star is eligible to apply for ICSID arbitration, or whether arbitration tribunal ignores the crucial evidence that can affect the arbitration award. Independently, the Korean government needs to discuss the investment arbitration appeal system in a long-term perspective.

신용장 거래에 있어서 FOB, CIF조건의 적용상 문제점에 관한 연구 - Incoterms® 2010을 중심으로 - (The Study on the Practical Problems of FOB and CIF terms under L/C transaction - with Special Emphasis on Incoterms® 2010 -)

  • 이대우;양의동
    • 한국중재학회지:중재연구
    • /
    • 제21권3호
    • /
    • pp.189-211
    • /
    • 2011
  • This article aims at analysing the practical problems of FOB and CIF terms relating to Incoterms$^{(R)}$2010 in case of L/C transactions and presenting the defending measures against them. According to Incoterms$^{(R)}$2010, FOB and CIF terms are to be used only for sea or inland waterway transport and require the seller deliver the goods on board the vessel nominated by the buyer at named port of shipment. So if FOB and CIF terms will be used in sea transport under L/C transaction, the seller should ship the goods on the nominated vessel and present the shipping document indicating "on board vessel" to the issuing bank but the parties agree to present the received bill of lading according to special condition on L/C which is" received bill of lading are acceptable". In practical transaction, FOB and CIF terms are usually used in aircraft cargo, container cargo or multimodal transport. these facts are a violation of Incoterms. Incoterms$^{(R)}$2010 which regulated that FOB and CIF terms may not be appropriate where goods are handed over the carrier before they are on board the vessel for example goods in container. These transactions are a temporary expedient and breach of Incoterms in the international trade which must be corrected as soon as possible.

  • PDF

RFID와 프라이버시 보호 (Privacy Protection and RFID(Radio Frequency IDentification))

  • 이철호
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2006년도 추계 종합학술대회 논문집
    • /
    • pp.443-446
    • /
    • 2006
  • RFID는 유비쿼터스 환경 구현의 핵심으로서 향후 관련 산업의 활성화와 고용 창출 등을 통한 경제적 효과 제고 및 국민 생활의 패러다임 변화를 통한 사회적 투명성 향상 등으로 이어질 것으로 기대되기도 하지만, 점검되지 않은 RFID의 사용으로 전례 없이 방대한 정보를 소매업자에게 수집케 하고 그것을 고객정보데이터베이스에 링크시킴으로써 개인(소비자)의 프라이버시를 짓밟는 결과를 낳을 것이라는 우려의 목소리도 만만치 않은 상황이다. RFID시스템이 사회적으로 확산되고 있음에도 프라이버시 침해의 위협으로부터 개인을 보호해 줄 수 있는 법적 제도의 정비는 이루어지지 않고 있다. 본 논문에서는 RFID와 관련하여 발생할 수 있는 사례를 중심으로 개인의 프라이버시 침해 문제를 법적 관점에서 고찰해보고자 한다.

  • PDF