• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.022 seconds

A Exploratory Study on The Determinants of Youth Facilities Visits (청소년시설이용에 영향을 미치는 요인에 대한 탐색적 연구)

  • Kim, Sin-Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.129-134
    • /
    • 2023
  • This study purports to investigate potential factors in various levels that affect respondents' use of youth facilities. Those levels include individual, family, and school. The data from 「2021 Youth Survey on Human Right Conditions」 will be analyzed. Hierarchical multiple regression analysis shows several results. First of all, respondents' age and level of human rights related information strongly influence respondents' use of youth facilities. Secondly, the analysis also shows that subjective well -being, abusive language and physical punishment from school faculty, and experience of human rights violation in schools affect the level of respondents' use of youth facilities. The order of effect sizes among significant variables are as follows; respondents' age, level of human rights related information, subjective well -being, abusive language and physical punishment from school faculty, and experience of human rights violation in schools. The independent variables in the model explain roughly 20 percent of whole variation of dependents variable.

Judgement of Violation of the Protection Duty of Internet Service Provider (인터넷 서비스 제공자의 보호조치 의무 위반의 판단)

  • Kang, Juyoung;Kim, Hyunji;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.17-26
    • /
    • 2016
  • Information spill was occurred several times in the country due to the negligence of the large internet service providers including SK Communications, Auction, KT. In order to judge the Internet Service Provider(ISP)'s liability in individual data spill caused by hacking, the violation of existing legislation or general principle of law's good faith principle has to be examined. However, based on current ISP's good faith principle, there is no objective standard for judging liability. Such uncertain range of protection action duty based on good faith principle generates complaint toward companies, therefore presentation of objective judgement range index on how to determine this range is needed. However due to the legal characteristic of above-mentioned law, it is not possible to fix the range of protection action duty and regulate it on law. In order to resolve this, rather than concerning simply on legal system level, fusion approach method is needed. Thus, this research will discuss the measure for objective standard for predicting ISP's range of protection action duty through fusion view dividing in technical, legal and administrative aspects.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.

A Study on the Enforcement of Violation of Traffic Laws by Delivery Motorcycle Riders (배달 이륜차 라이더 교통 법규 위반 단속 연구)

  • Cho, Yong Bin;Kim, Jin-Tae;Lim, Joon Bum;Oh, Sang Tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.182-192
    • /
    • 2022
  • Motorcycle accidents are increasing at an average annual rate of 10.01%, and fatalities are also increasing by 2.64%. Enforcement cameras are installed to enforce safe driving of more-than or equal-to four-wheeled vehicles on the road. Even though the main purpose of this enforcement camera is to disencourage the speed violation of all types of vehicle, one cannot expect complete enforcement by these cameras. In particular, enforcement of the motorcycle should rely on on-site activities through the input of on-site personnel. Recently, to discourage the illegal acts of motorcycling, the National Police Agency introduced the 'National Police Agency SMART National Report'. However, it is necessary to prepare an appropriate practical plan to maximize the effect of enforcement requiring continuous manpower management. This study proposed four types of rider certification IDs for delivery motorcycles. These IDs are institutional devices to manage delivery motorcycle riders. In addition, a experiment on enforcement was conducted using those license ID systems for delivery motorcycles. This experiment confirmed through the image-processing program (D-MESO) if one of the systems was possible to implement for enforcement on the delivery motorcycle rider's license.

The Effects of Hasteful Behavior on Aberrant Driving Behavior (서두름 행동이 운전일탈행동에 미치는 영향)

  • Dong Woo Kim ;Sun Jin Park ;Soon Chul Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.15 no.4
    • /
    • pp.487-505
    • /
    • 2009
  • We focused on the missing confirmation domain of the hasteful behavior. We tried to identify the variety of hasteful behavior and the effects of missing confirmation behavior domain of the hasteful behavior on driving behaviors. 388 drivers responded to Hasteful Behavior Questionnaire, Driver Behavior Questionnaire(DBQ), and Driving Experience Questions. Data which have missing values among them were removed, 374 data were analyzed. As a result of factor analysis, hasteful behavior consist of time pressure, uncomfortableness, isolation, boring condition, and expecting rewards, and the DBQ consist of violation, error, and lapse. The components of hasteful behavior was divided into the missing confirmation behavior and the need for achievement domain by the second factor analysis and difference verification of coefficient of correlation. The missing confirmation behavior domain of hasteful behavior had significant influence on error and lapse. The isolation of the missing confirmation behavior domain had a negative effect, and the uncomfortableness of the missing confirmation domain had a positive effect on violation. The time pressure had a negative effect, and the isolation and the uncomfortableness had a positive effect on error and lapse.

  • PDF

The relationship between driving confidence and driving behaviour in elderly and young drivers (고령운전자와 청소년운전자의 운전확신차이와 운전행동과의 관계)

  • Soonchul Lee;Juseok Oh;Sunjin Park;Soonyeol Lee;Inseok Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.1
    • /
    • pp.81-102
    • /
    • 2006
  • This study focused on driver's carefulness and researched the relationship between driving confidence and driving behaviour in elderly and young drivers. In order to evaluate the driving confidence level, 'Driving Confidence Scale' was developed. 175 of young drivers(younger than 25) and 150 of elderly drivers(older than 65) conducted Driving Confidence Scale. They answered their driving patterns; driving history, annual mileage, the frequency of committing traffic violation, and experience of accident within 5 years. Elderly driver's data was collected by face to face interview. The factors of driving confidence were analyzed and the driving confidence level of young and elderly drivers was compared. Driving Confidence was consisted of 4 factors; environment of traffic condition, safe driving, driving ability, attention. Elderly driver's confidence was lower than young driver's. Elderly drivers in high driving confidence group, showed longer driving history and they were tend to commit violations more frequently than elerly drivers in low driving confidence group. Young drivers, whose driving confidence level was high answered more driving history, annual mileage, the frequency of committing traffic violation and experience of accident within 5 years.

Design and Implementation of a new aging sensing circuit based on Flip-Flops (플립플롭 기반의 새로운 노화 센싱 회로의 설계 및 구현)

  • Lee, Jin-Kyung;Kim, Kyung Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.4
    • /
    • pp.33-39
    • /
    • 2014
  • In this paper, a new on-chip aging sensing circuit based on flip-flops is proposed to detect a circuit failure of MOSFET digital circuits casued by aging phenomenon such as HCI and BTI. The proposed circuit uses timing windows to warn against a guardband violation of sequential circuits, and generates three warning bits right before circuit failures occur. The generated bits can apply to an adaptive self-tuning method for reliable system design as control signals. The aging sensor circuit has been implemented using 0.11um CMOS technology and evaluated by $4{\times}4$ multiplier with power gating structure.

The 'Kirogi` Fathers' Changes of Lives and Adaptation Problems (기러기아빠의 생활 변화와 적응 문제)

  • Kim Sung-Sook
    • Journal of Families and Better Life
    • /
    • v.24 no.1 s.79
    • /
    • pp.141-158
    • /
    • 2006
  • The purpose of this study was to investigate the changes of lives and problems of 'Kirogi'(or Wild Goose) fathers, who were called fathers in the 'Kirogi' families, South Korean families separated by an ocean. They almost sent too much money that were $50-100\%$ of their family income to the families abroad, and got economic pressures so severely. More or less, they sold their own real estates, moved to much smaller sized house. and often expended the saving money. Also, they had difficulties of taking care of their children and felt lonely very much. By the hand, they might experience the adaptation process through 3 stages-troubles, acception(or wandering or enjoy), adjust (or violation). They had three types of problems, that is, family relationship problem(the isolation), psychological problem(loneliness and self-control), economic problem (financial pressure and drop of economic status). They found the strategies to overcome these problems for themselves. Firstly, they took lots of methods like email, internet chatting, phone, etc. to communicate with their family everyday and made many events to strengthen the ties among families. Secondly, they got rid of stresses mainly by joining with their colleagues at work. Finally, they decided to lower the standard of living of their family in foreign country or tried to find their wives' jobs to prevent the financial hardship.

The Protecton of Privacy on Secondary Use of Personal Health Imformation (의료기관 개인건강정보의 이차적 이용)

  • Kim, Jang-Han
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.