• Title/Summary/Keyword: Violation

Search Result 860, Processing Time 0.021 seconds

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

Jefferson Society as Panopticon Mechanism: Focused on Light in August (판옵티콘 메커니즘으로 살펴 본 제퍼슨 사회: 『팔월의 빛』을 중심으로)

  • Jeong, Hyunsook
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.180-188
    • /
    • 2019
  • The purpose of this study is to rethink the common theme that penetrates Faulkner's authorship. That is to say, does his authorship come from "being white"? To answer this question, I try to look into "otherness"/violence against others through re-reading Light in August. By borrowing the idea of "panopticon' mechanism in Michel Foucault's Surveiller et Punir, I will examine the process of justifying the violence against others, especially blacks. Through this process, I try to research the one side of Faulkner's Southern myth which was riddled with the history of pillage and violation of black people's rights. In Light in August, I will compare Jefferson society which encircles Joe Christmas to panopticon mechanism derived from Michel Foucault's Surveiller et Punir. Jefferson society as a designer of surveillance system and an executor as well ceaselessly surveils Joe Christmas's otherness/difference or blackness and tries to punish him whenever they can. With this mechanism, I try to explain that writer's repetitive narration of collective amoral behavior such as lynch comes from his anxiety and conscience about his dark side Southern history.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Plant Back Interval of Fluopyram Based on Primary Crop-derived Soil and Bare Soil Residues for Rotational Cultivation of Radish (Fluopyram의 전작물 유래 및 나지조건 토양잔류성에 기초한 알타리무의 식물식재후방기간)

  • Kim, Young Eun;Yoon, Ji Hyun;Lim, Da Jung;Kim, Seon Wook;Cho, Hyunjeong;Shin, Byeung Gon;Kim, Hyo Young;Kim, In Seon
    • Korean Journal of Environmental Agriculture
    • /
    • v.40 no.2
    • /
    • pp.99-107
    • /
    • 2021
  • BACKGROUND: Pesticide uptake by a rotational crop after being used for the primary crop is a potential cause of violation against the pesticide law if the pesticide is not registered in the secondary crop. This study was conducted to investigate the plant back interval (PBI) of fluopyram for the rotational cultivation of radish. METHODS AND RESULTS: Two experimental approaches were performed the evaluation of residues in radish cultivated successively in soil 16 days after treated with fluopyram onto pepper plant (T1) and in radish cultivated in bare soil treated with fluopyram at PBI 30 and PBI 60 days (T2). A modified QuEChERS method coupled with LC/MS/MS analysis showed good linearity of matrix-matched standard calibration of fluopyram with the coefficient values of determination greater than 0.995. Recovery values at levels of 0.01, 0.05, 0.1 and 0.25 mg/kg ranged from average 84.9 to 117.6% with RSD less than 10%. Fluopyram residues in radish harvested from T1 and T2 were found as levels less than maximum residue limit. CONCLUSION: This study suggests 20~30 days as the PBI of fluopyram for the rotational cultivation of radish in the greenhouse soil treated with fluopyram used for pepper as the primary crop.

Effects of Human Rights Violation of the Elderly on Ageism - Focusing on the Mediating effect of Experiences elated to the elderly- (노인인권침해지각이 노인차별주의에 미치는 영향 -노인관련경험의 매개효과를 중심으로-)

  • Jang, Kyeung-Ae;Heo, Seong-Eun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.168-175
    • /
    • 2021
  • This study aimed to identify the impact of human rights violations on elderly discrimination, focusing on the mediating effect of elderly-related experiences. After conducting a two-month survey of 143 dental students in some parts of Busan from September 4, 2020, hierarchical regression analysis was conducted to find out the mediating effects of elderly-related experiences using the SPSS 26.0 program. Dental hygiene students' perception of infringement on elderly human rights was shown to be significant in elderly discrimination(r=-.310) and elderly-related experiences(.185), indicating that elderly-related experiences were partially mediated in elderly human rights infringement and elderly discrimination. Therefore, this study intends to provide basic data on the development of dental hygiene curriculum in a super-aging society by reconsidering the need for senior-related experiences in dental hygiene and education.

An Approach of Solving the Constrained Dynamic Programming - an Application to the Long-Term Car Rental Financing Problem

  • Park, Tae Joon;Kim, Hak-Jin;Kim, Jinhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.29-43
    • /
    • 2021
  • In this paper, a new approach to solve the constrained dynamic programming is proposed by using the constraint programming. While the conventional dynamic programming scheme has the state space augmented with states on constraints, this approach, without state augmentation, represents states of constraints as domains in a contraining programming solver. It has a hybrid computational mechanism in its computation by combining solving the Bellman equation in the dynamic programming framework and exploiting the propagation and inference methods of the constraint programming. In order to portray the differences of the two approaches, this paper solves a simple version of the long-term car rental financing problem. In the conventional scheme, data structures for state on constraints are designed, and a simple inference borrowed from the constraint programming is used to the reduction of violation of constraints because no inference risks failure of a solution. In the hybrid approach, the architecture of interface of the dynamic programming solution method and the constraint programming solution method is shown. It finally discusses the advantages of the proposed method with the conventional method.

Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments (AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술)

  • Park, Cheollhee;Hong, Dowon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.589-598
    • /
    • 2019
  • The amount of digital data a is explosively growing, and these data have large potential values. Countries and companies are creating various added values from vast amounts of data, and are making a lot of investments in data analysis techniques. The privacy problem that occurs in data analysis is a major factor that hinders data utilization. Recently, as privacy violation attacks on neural network models have been proposed. researches on artificial neural network technology that preserves privacy is required. Therefore, various privacy preserving artificial neural network technologies have been studied in the field of differential privacy that ensures strict privacy. However, there are problems that the balance between the accuracy of the neural network model and the privacy budget is not appropriate. In this paper, we study differential privacy techniques that preserve the performance of a model within a given privacy budget and is resistant to model inversion attacks. Also, we analyze the resistance of model inversion attack according to privacy preservation strength.

Monitoring and Risk Assessment of Carbendazim Residues in Soybean Sprout and Mungbean Sprout from Markets in Western Seoul (서울 강서지역 유통 콩나물 및 숙주나물중 카벤다짐 잔류실태 조사 및 위해성 평가)

  • Hwang, Lae-hong;Park, Sung-kyu
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.4
    • /
    • pp.348-353
    • /
    • 2019
  • This study was conducted to monitor the carbendazim residues in soybean and mungbean sprouts using LC-MS/MS method. Eighty-two samples were collected from markets in western Seoul. No carbendazim was detected in mungbean sprouts, however, it was detected in 6 among 59 soybean sprout samples showing a 10.2% of detection rate. Among these 6 carbendazim- detected soybean sprout samples, five exceeded the maximum residue limit presenting 83.3% of violation rate. The mean concentration in the detected samples was 0.063 mk/kg (0.012 ~ 0.104 mg/kg) and 5 of the 6 detected samples came from bulk sold products. None of the samples came from domestic products; three were from imported products and 3 were from unidentified sources. Risk assessment for the carbendazim from soybean sprout dietary intake was deemed safe and at less than 1 %Acceptable Daily Intake.

A Basic Study on the Introduction of Human Rights Education for Seafarers (선원인권교육의 도입 방안에 관한 기초연구)

  • Jin, Ho-Hyun;Lee, Chang-Hee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.560-571
    • /
    • 2019
  • In line with the United Nations' Action Plan for the First and Second World Programme for Human Rights, countries around the world are making efforts to strengthen and develop human rights education through voluntary participation and improvement of the legal system. South Korea is also trying to spread human rights education under the leadership of the National Human Rights Commission of the Republic of Korea, but there has been no significant progress so far. Moreover, it has failed to pay close attention to the human rights issues of seafarers on board. This study identified the phenomenological problems based on an analysis of domestic and international literature, and of cases of violation of seafarers' human rights. It utilized the interactivity research method to create an educational environment for improving the human rights situation of seafarers on board mixed-nationality crew vessels. In doing so, the research suggests the introduction of human rights education for seafarers and the implementation of a human rights education program in designated educational institutions as fundamental solutions to the human rights issues of seafarers, as these have been pointed out as the main cause of conflicts in mixed-nationality crew vessels.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF