• Title/Summary/Keyword: Violation

Search Result 860, Processing Time 0.022 seconds

Features of Legal Relations in the Field of Digital Services: Legal Realities and Prospects for the Future

  • Pohrebniak, Stanislav;Panova, Liydmyla;Gramatskyy, Ernest;Radchenko, Liliya;Kryvosheyina, Inha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.300-304
    • /
    • 2022
  • The central feature of a digital society is the presence of a significant volume of digital services. The main research-analytical goal of the work is to identify the characteristic features of digital services, to classify and compare various types of digital services, to study the main levers for the development of digital services, the principal determinants of the observance and implementation of digital rights, to identify the dominant threats regarding the violation of digital rights, to analyze the features of legal relations that arise between the supplier and the consumer of digital technologies, consider the available taxation options for the digital economy. The work uses the following methods and research methods: hermeneutic, forecasting, in particular, extrapolation, analysis and synthesis, comparative. Research results: the definition of the concept of "digital service" is given, its main characteristics and types, according to the level of digitalization, the states-leaders are identified, slowing down, promising and problematic, the main triggers of slowing digitalization in some EU countries are investigated, by analyzing the regulatory legal acts of the European Commission on digitalization the strategy of the EU's actions to increase the degree of digitalization was determined, the positive and negative effects of digital services concerning the observance of human rights and freedoms were highlighted, the issue of levying taxes from digital companies was investigated.

VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment

  • Supreeth, S.;Patil, Kirankumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1892-1912
    • /
    • 2022
  • With the massive demand and growth of cloud computing, virtualization plays an important role in providing services to end-users efficiently. However, with the increase in services over Cloud Computing, it is becoming more challenging to manage and run multiple Virtual Machines (VMs) in Cloud Computing because of excessive power consumption. It is thus important to overcome these challenges by adopting an efficient technique to manage and monitor the status of VMs in a cloud environment. Reduction of power/energy consumption can be done by managing VMs more effectively in the datacenters of the cloud environment by switching between the active and inactive states of a VM. As a result, energy consumption reduces carbon emissions, leading to green cloud computing. The proposed Efficient Dynamic VM Scheduling approach minimizes Service Level Agreement (SLA) violations and manages VM migration by lowering the energy consumption effectively along with the balanced load. In the proposed work, VM Scheduling for Efficient Dynamically Migrated VM (VMS-EDMVM) approach first detects the over-utilized host using the Modified Weighted Linear Regression (MWLR) algorithm and along with the dynamic utilization model for an underutilized host. Maximum Power Reduction and Reduced Time (MPRRT) approach has been developed for the VM selection followed by a two-phase Best-Fit CPU, BW (BFCB) VM Scheduling mechanism which is simulated in CloudSim based on the adaptive utilization threshold base. The proposed work achieved a Power consumption of 108.45 kWh, and the total SLA violation was 0.1%. The VM migration count was reduced to 2,202 times, revealing better performance as compared to other methods mentioned in this paper.

A Comparative Study on the Legal System for Risk Assessment in the Workplace (사업장 위험성평가에 관한 법제의 비교법적 고찰)

  • Jung, Jin-Woo
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.31 no.4
    • /
    • pp.304-316
    • /
    • 2021
  • Objectives: By comparing and analyzing the legal system for risk assessment in South Korea with other advanced countries, the study is designed to identify the key elements of risk assessment and seek improvement measures while focusing on solutions to the execution of risk assessment violations. Methods: The study started with an awareness of the need to improve the legislation on the risk assessment of businesses in Korea. In order to reflect this problem consciousness in Korea's industrial safety and health legislation, risk assessment legislation in Japan, Britain, Germany, and Korea was analyzed in comparative terms through the literature. Results: Unlike the other advanced countries, the concept of risk assessment is defined in Korea in a broad sense that includes measures to reduce risk, and risk assessment in the manufacturing and design stages is not institutionalized. In the case of worker participation, there is a problem regarding effectiveness. It is problematic that compared to the other foreign countries there is a possibility that general risk assessment will be neutralized because it is recognized as a uniform general risk assessment for a particular risk assessment, as well as inadequate risk assessment. Conclusions: The areas diagnosed with problems compared to the legislation in other advanced countries should be improved by revising laws and administrative rules and supplementing the explanatory guidelines, etc. by referring to the legislation of these countries. In particular, the issue of enforcement for violations of risk assessment must be improved in order to ensure the effectiveness of risk assessment.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

Worker Collision Safety Management System using Object Detection (객체 탐지를 활용한 근로자 충돌 안전관리 시스템)

  • Lee, Taejun;Kim, Seongjae;Hwang, Chul-Hyun;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1259-1265
    • /
    • 2022
  • Recently, AI, big data, and IoT technologies are being used in various solutions such as fire detection and gas or dangerous substance detection for safety accident prevention. According to the status of occupational accidents published by the Ministry of Employment and Labor in 2021, the accident rate, the number of injured, and the number of deaths have increased compared to 2020. In this paper, referring to the dataset construction guidelines provided by the National Intelligence Service Agency(NIA), the dataset is directly collected from the field and learned with YOLOv4 to propose a collision risk object detection system through object detection. The accuracy of the dangerous situation rule violation was 88% indoors and 92% outdoors. Through this system, it is thought that it will be possible to analyze safety accidents that occur in industrial sites in advance and use them to intelligent platforms research.

Application of the Rapid Prototyping Instructional Systems Design in Meridianology Laboratory (경혈학실습 체제적 교수설계를 위한 RPISD 모형 적용 연구)

  • Cho, Eunbyul;Kim, Jae-Hyo;Hong, Jiseong
    • Korean Journal of Acupuncture
    • /
    • v.39 no.3
    • /
    • pp.71-83
    • /
    • 2022
  • Objectives : Instructional design is the systematic approach to the Analysis, Design, Development, Implementation, and Evaluation of learning materials and activities. We aimed to apply the rapid prototyping to instructional systems design (RPISD) in meridianology laboratory, a subject in which students train acupuncture to develop lesson plan. Methods : The needs of the stakeholders including client, subject matter expert and students were analyzed using the performance needs analysis model. Task analysis was implemented by observation and interview. First prototype was drafted and implemented in meridianology laboratory class once. The second prototype was modified from the first, by usability evaluation of the stakeholders. Results : The client requested an electronically documented manual to improve the quality of acupuncture training. The learner requested an extension of practice time and detailed practice guidelines. The main problems of students' performance were some cases of violation of clean needle technique, the lack of communication between the operator and recipient in direct, and lack of confidence in their own performance. Stakeholders were generally satisfied with the proposed first prototype. Second prototype of lesson plan was produced by modifying some contents. Conclusions : A lesson plan was developed by applying the systematic RPISD model. It is expected that the developed instructional design may contribute to the quality improvement of meridianology laboratory education.

Extended Analysis of Unsafe Acts violating Safety Rules caused Industrial Accidents (산재사고를 유발한 안전수칙 위반행위의 확장분석)

  • Lim, Hyeon Kyo;Ham, Seung Eon;Bak, Geon Yeong;Lee, Yong Hee
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.3
    • /
    • pp.52-59
    • /
    • 2022
  • Conventionally, all the unsafe acts by human beings in relation to industrial accidents have been regarded as unintentional human errors. Exceptionally, however, in the cases with fatalities, seriously injured workers, and/or losses that evoked social issues, attention was paid to violating related laws and regulations for finding out some people to be prosecuted and given judicial punishments. As Heinrich stated, injury or loss in an accident is quite a random variable, so it can be unfair to utilize it as a criterion for prosecution or punishment. The present study was conducted to comprehend how categorizing intentional violations in unsafe acts might disrupt conventional conclusions about the industrial accident process. It was also intended to seek out the right direction for countermeasures by examining unsafe acts comprehensively rather than limiting the analysis to human errors only. In an analysis of 150 industrial accident cases that caused fatalities and featured relatively clear accident scenarios, the results showed that only 36.0% (54 cases) of the workers recognized the situation they confronted as risky, out of which 29.6% (16 cases) thought of the risk as trivial. In addition, even when the risks were recognized, most workers attempted to solve the hazardous situations in ways that violated rules or regulations. If analyzed with a focus on human errors, accidents can be attributed to personal deviations. However, if considered with an emphasis on safety rules or regulations, the focus will naturally move to the question of whether the workers intentionally violated them or not. As a consequence, failure of managerial efforts may be highlighted. Therefore, it was concluded that management should consider unsafe acts comprehensively, with violations included in principle, during accident investigations and the development of countermeasures to prevent future accidents.

Design and analysis of monitoring system for illegal overseas direct purchase based on C2C (C2C에 기반으로 해외직구 불법거래에 관한 모니터링 시스템 설계 및 분석)

  • Shin, Yong-Hun;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.609-615
    • /
    • 2022
  • In this paper, we propose a monitoring system for illegal overseas direct purchase based on C2C transaction between individuals. The Customs Act stipulates that direct purchases from overseas are exempted from taxation only if they are less than a certain amount (US$150, but US$200 in the US) or are recognized as self-used goods. The act of reselling overseas direct purchase items purchased with exemption from taxation online, etc., is a crime of smuggling without a report. Nevertheless, the number of re-sells on online second-hand websites is increasing, and it is becoming a controversial social issue of continuous violation of the Customs Act. Therefore, this study collects unspecified transaction details related to overseas direct purchase, refines the data in a big data method, and designs it as a monitoring system through natural language processing, etc. analyzed. It will be possible to use it to crack down on illegal transactions of overseas direct purchase goods.

Factors Affecting Deviation Broadcasting Intentions of Internet Personal Broadcasting Jockey: From the Perspective of the Social Pressure of Viewers (인터넷 개인 방송 진행자들의 일탈 방송의도에 영향을 미치는 요인: 시청자의 사회적 압력 관점에서)

  • Chae, Seong Wook;Song, Hye Ji
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.169-192
    • /
    • 2022
  • With the spread of Internet personal broadcasting service, the number of personal broadcasting hosts (BJs: Broadcasting Jockeys) and viewers is increasing, and immediate communication between them is also actively taking place. This study examines whether the mechanism to suppress deviant behavior of BJ works effectively and how viewers interacting with BJs affect the intentions of deviant behaviors of BJs. Through the structural equation model, the effect of formal and informal sanctions of deterrence theory on BJs' intention of deviant broadcasting through their policy compliance attitude was investigated. The moderating effect of social pressure on the relationship between BJs' policy compliance attitude and their deviant broadcasting intention was confirmed. A total of 234 data were analyzed by surveying Africa TV BJs. As a result of the analysis, it was found that informal as well as formal sanctions increased the BJs' attitude toward policy compliance. However, it was confirmed that the social pressure perceived by BJs from Internet personal broadcasting viewers reduced the effect of policy compliance attitudes on reducing deviant broadcasting intentions.