• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.025 seconds

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

Implementation of Network Traffic and QoS Monitoring System based on User Agent (사용자 에이전트 기반의 네트워크 트래픽 및 QoS 모니터링 시스템 구현)

  • Lee, Do-Hyeon;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.41-50
    • /
    • 2008
  • Recently amount of traffic into the network rapidly increase since multimedia streaming services is generally adopted for application. In addition, various network management systems have been suggested for providing a stable service and QoS guarantee. It is necessary for such systems to have QoS monitoring module in order to evaluate acceptance or violation of QoS requirements by analogizing a state information of each node within network. In this paper, we suggest a network management system to evaluate QoS level between end-to-end agents and analysis traffics transmitted between them. The proposed system is implemented for the purpose of collecting network traffic information and monitoring of the view. The proposed system makes user easily understand information of QoS parameters such as throughput, delay and jitter by adopting a method of visual and numerical representation. To achieve this, we purportedly generate test packet into network for confirming acceptance or violation of QoS requirements from point of view of multimedia application service.

  • PDF

Surveying Visitors′ Behavior in Tokyusan National Park (덕유산 국립공원의 이용자 행태조사)

  • 김용근;최성식
    • Korean Journal of Environment and Ecology
    • /
    • v.7 no.2
    • /
    • pp.221-230
    • /
    • 1994
  • Visitors to Tokyusan National Park were surveyed from August 9 to 12 During this time, 443 vistors were contacted. Of those individuals, 68.7% were males. 27.5% of respondents reported that they had gone beyond high shcool, and over one-half (64.9%) had gone as far as college. 54.7% were 20 years of age. 42.9% of the survey respondents were making their frist trip to Kuch'ontong and 67.9% to Muju Resort. The largest percentage of respondents were reported that they visited Tokyusan National Park for rippling. In group type, majority were traveling with their friends or family. In activity characteristics, 83.4% were staying over nights visitors, and over 50% mentioned staying at private houses or hotels. In six types of normative violations, major reasons of littering behavior were unintentional violation and releaser-cue violation. Most respondents who witness other visitors' littering were not likely to intervene to stop their visitors' depreciative behavior(Bystander intervention Behavior). Most of visitors want to get more information from national park office.

  • PDF

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Recognition or Enforcement of Arbitral Awards under the German Civil Procedure Act (독일민사소송법상 외국중재판정의 승인 및 집행 - 「독일민사소송법」 제1061조를 중심으로 -)

  • Sung, Joon-Ho
    • Journal of Arbitration Studies
    • /
    • v.29 no.2
    • /
    • pp.107-132
    • /
    • 2019
  • The arbitration procedure, which is a private trial, does not have a separate enforcement agency. Therefore, unless a party consents to the arbitration award and voluntarily fulfills the award, its execution is accomplished through the implementation of the national court. In particular, the decision in the foreign arbitration procedure will be refused or rejected for the arbitration award in case the proceedings of the law and procedure on which the judgment is based are caused by inconsistency with the domestic law or procedural defect. However, all foreign arbitration awards generally do not have to go through the approval process, and it will come into force with the arbitration award. In the case of Germany in the revision of the German Civil Procedure Act of 1996, the main provisions of the New York Convention concerning the ratification and enforcement of arbitration proceedings are reflected. Germany provides for the arbitration procedures in the arbitration proceedings of Book 10 of the Civil Procedure Act. Particularly, with Article 1061 in Book 10 Section 8 below, the approval and enforcement of foreign arbitrators shall be governed. Article 1061 has been referred to as "The New York Convention on the Recognition and Enforcement of Foreign Jurisdictions," Article 5 (1). The main reasons for approval and enforcement rejection are: (1) Reason for the acceptance or refusal of enforcement by request of the parties: Reason for failure of subjective arbitration ability, invalidation of arbitration agreement, collapse of attack or defense method, dispute not included in arbitration agreement, (2) Reasons for the approval and enforcement of arbitration considered by the competent authority of the arbitrator: violation of objective arbitration ability, violation of public order, but not based on the default of German statute.

Analysis of Non-compliance of Food Utensils, Containers, and Packages in Foreign Countries During 2011-2019 (2011-2019년 식품용 기구 및 용기·포장의 제외국 부적합 정보 분석)

  • Cho, Seung Yong;Lee, Ye Yeon;Cho, Sanggoo
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.27 no.3
    • /
    • pp.141-147
    • /
    • 2021
  • The foreign trends of noncompliance occurring frequently in food contact materials during the period of 2011-2019 was investigated by analyzing the food safety risk information DB in the National Food Safety Information Service (NFSI). A total of 2,042 cases of noncompliance of food utensils, containers, and packages were classified into 5 violation categories; administrative procedures, manufacturing and processing standards, residues and migration standards, labeling and advertising, and quality standards. This was again subcategorized according to non-compliance causative factors. The non-compliances in residues and migration standards comprised the largest proportion (76.4%) of the violative categories. The number of noncompliance information collected in 2011 was 88 cases and increased to 373 cases in 2019. A 72.8% of the non-compliance case was identified to be products of 4 countries (China 64.2%, Germany 4.0%, Japan 3.2%, and Taiwan 3.1%), those produce large quantities of containers and packaging products. During the period of 2011-2019, the number of illegal use of hazardous materials and illegal recycling of waste synthetic resins has decreased to less than one a year since 2014. On the other hand, after 2016, inconsistency of heat-resisting temperature labeling (Taiwan), non-compliance in paper container's strength standards, violation of printing standards, and the risk of consumer injury while using the products were newly reported due to the strengthening of consumer safety protection regulations. Migration of hazardous substances in synthetic polymer products such as heavy metals, melamine and formaldehyde in melamine tableware, primary aromatic amines which are colorant components in kitchenware such as ladles and spatulas, and phthalate plasticizers have been continuously reported with high frequency.

A Study on the Influence of Construction Safety Education on Unstable Behavior (건설안전교육이 불안전한 행동에 미치는 영향에 관한 연구)

  • Kim, Young Kweon;Park, Jong Young;Kim, Sung Eun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.154-164
    • /
    • 2021
  • Purpose: Ten years after basic safety and health education in the construction industry has been implemented, no more maintenance education has been provided, and those who have completed basic safety and health education are exempt from new employee education. As soon as possible, we will seek strategic measures to prevent unstable behavior and prevent safety accidents by legislating conservative education and new recruitment education. Method: In this study, basic safety and health education, which is construction safety education, and human error, which is unstable behavior of new employees, and structural relationship between violation behavior were conducted through survey. Result: The survey analyzed that basic safety and health education in the construction industry and new recruitment education had a significant impact on the human factors of the disaster, Human Error, and the reduction of violations, and confirmed that continuous safety education could increase safety awareness. Conclusion: The insolvency of safety education shall be prevented by the revision of the Act on the remuneration of basic safety and health education and the education of new employees.

A Study on Developing the Adolescent Anger Provocation Scale(AAPS) for Korean Adolescents (한국 청소년 분노유발요인 척도개발연구)

  • Lee, Jee-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.261-272
    • /
    • 2022
  • The aim of the study is to develop the Adolescent Anger Provocation Scale(AAPS) for Korean adolescents. In order to develop the scale, two research processes were conducted. First, a total of 130 items were derived from various related research. After analyzing 130 items by a research team(2 related field professors and 2 Ph.D. students), a total of 54 items reconstructed based on redundancy, cultural relevancy, and appropriateness. Second, a survey was administered among 252 Korean adolescents. After analyzing an exploratory factor analysis, 12 items of poor factor loading were deleted. Thus, seven factors and 42 items were extracted. Seven factors were as follows: (1) threat to self-esteem, (2) uncontrollable situations, (3) violation of personal property, (4) incidents associated with rejection, (5) violation of regulation or rules, (6) disrespectful treatment, (7) unfair treatment due to age. The internal consistency and convergence validity of the scale were supported. The results of confirmatory factor analysis were also reported. In addition, study limitations and recommendations of future research were discussed.