• Title/Summary/Keyword: data breach

Search Result 71, Processing Time 0.035 seconds

A Comparative Study on Marine Transport Contract and Marine Insurance Contract with Reference to Unseaworthiness

  • Pak, Jee-Moon
    • Journal of Korea Trade
    • /
    • v.25 no.2
    • /
    • pp.152-177
    • /
    • 2021
  • Purpose - This study analyses the excepted requirement and burden of proof of the carrier due to unseaworthiness through comparison between the marine transport contract and marine insurance contract. Design/methodology - This study uses the legal analytical normative approach. The juridical approach involves reviewing and examining theories, concepts, legal doctrines and legislation that are related to the problems. In this study a literature analysis using academic literature and internet data is conducted. Findings - The burden of proof in case of seaworthiness should be based on presumed fault, not proved fault. The burden of proving unseaworthiness/seaworthiness should shift to the carrier, and should be exercised before seeking the protections of the law or carriage contract. In other words, the insurer cannot escape coverage for unfitness of a vessel which arises while the vessel is at sea, which the assured could not have prevented in the exercise of due diligence. The insurer bears the burden of proving unseaworthiness. The warranty of seaworthiness is implied in hull, but not protection and indemnity policies. The 2015 Act repeals ss. 33(3) and 34 of MIA 1906. Otherwise the provisions of the MIA 1906 remain in force, including the definition of a promissory warranty and the recognition of implied warranties. There is less clarity about the position when the source of the loss occurs before the breach of warranty but the actual loss is suffered after the breach. Nonetheless, by s.10(2) of the 2015 Act the insurer appears not to be liable for any loss occurring after the breach of warranty and before there has been a remedy. Originality/value - When unseaworthiness is identified after the sailing of the vessel, mere acceptance of the ship does not mean the party waives any claims for damages or the right to terminate the contract, provided that failure to comply with the contractual obligations is of critical importance. The burden of proof with regards to loss of damage to a cargo caused by unseaworthiness is regulated by the applicable law. For instance, under the common law, if the cargo claimant alleges that the loss or damage has been caused by unseaworthiness, then he has the burden of proof to establish the followings: (i) that the vessel was unseaworthy at the beginning of the voyage; and that, (ii) that the loss or damage has been caused by such unseaworthiness. In other words, if the warranty of seaworthiness at the inception of the voyage is breached, the breach voids the policy if the ship owner had prior knowledge of the unseaworthy condition. By contrast, knowingly permitting the vessel to break ground in an unseaworthy condition denies liability only for loss or damage proximately caused by the unseaworthiness. Such a breach does not, therefore, void the entire policy, but only serves to exonerate the insurer for loss or damage proximately caused by the unseaworthy condition.

Treatment of the Bed Slope Source Term for 2-Dimensional Numerical Model Using Quasi-steady Wave Propagation Algorithm (Quasi-steady Wave Propagation 알고리듬을 이용한 2차원 수치모형의 하상경사항 처리)

  • Kim, Tae-Hyung;Han, Kun-Yeun;Kim, Byung-Hyun
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.2
    • /
    • pp.145-156
    • /
    • 2011
  • Two dimensional numerical model of high-order accuracy is developed to analyze complex flow including transition flow, discontinuous flow, and wave propagation to dry bed emerging at natural river flow. The bed slope term of two dimensional shallow water equation consisting of integral conservation law is treated efficiently by applying quasi-steady wave propagation scheme. In order to apply Finite Volume Method using Fractional Step Method, MUSCL scheme is applied based on HLL Riemann solver, which is second-order accurate in time and space. The TVD method is applied to prevent numerical oscillations in the second-order accurate scheme. The developed model is verified by comparing observed data of two dimenstional levee breach experiment and dam breach experiment containing structure at lower section of channel. Also effect of the source term is verified by applying to dam breach experiment considering the adverse slope channel.

Evaluating Local Damages and Blast Resistance of RC Slabs Subjected to Contact Detonation (접촉 폭발 하중을 받는 RC 슬래브의 국부 손상 및 내폭 성능 평가)

  • Li, Ling;Lee, Jin Young;Min, Kyung Hwan;Yoon, Young Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.1
    • /
    • pp.37-45
    • /
    • 2013
  • In this study, the resistance of various reinforced concrete (RC) slabs subjected to contact detonation was assessed. In order to enhance the blast resistance, fibers and external FRP sheets were reinforced to RC slabs. In the experiment, the $2,000{\times}1,000{\times}100mm$ sized RC slabs were fabricated using normal concrete (NC), steel fiber reinforced concrete (SFRC), polyvinyl alcohol fiber reinforced cementitious composite (PVA FRCC), and ultra-high performance cementitious composites (UHPCC). The damage levels of RC slabs subjected to contact detonation were evaluated by measuring the diameter and depth of crater, spall and breach. The experimental results were compared to the analyzed data using LS-DYNA program and three different prediction equations. The diameter and depth of crater, spall and breach were able to be predicted using LS-DYNA program approximately. The damage process of RC slabs under blast load was also well expressed. Three prediction equations suggested by other researchers had limitations to apply in terms of empirical approaches, therefore it needs further research to set more analytical considerations.

Flood inundation analysis resulting from two parallel reservoirs' failure (병렬로 위치한 2개 저수지 붕괴에 따른 홍수범람 해석)

  • Kim, Byunghyun;Han, Kun Yeun
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.2
    • /
    • pp.121-132
    • /
    • 2016
  • The DAMBRK is applied to Janghyeon and Dongmak reservoirs in Namdaecheon basin, where two reservoirs were failed due to Typhoon Rusa in 2002. Relaxation scheme is added to DAMBRK to consider the tributary cross-section because two reservoirs are in tributary valleys. In addition, this study suggests the method to utilize the reservoir breach formation time of ASDSO (2005) and empirical formulas for peak break outflow from dam to reduce the uncertainty of reservoir breach formulation time. The single break of Janghyeon reservoir and consecutive break of Janghyeon and Dongmak reservoirs with the suggested method are considered. While the breach discharge from reservoirs rushes down, the discharge and water surface elevation along the river are predicted, and the predictions show the attenuation phenomena of reservoir break floodwave. The applicability of the model is validated by comparing the predicted height with field surveyed data, and showing good agreements between predictions and measurements.

The Influence of Deluxe Hotel Culinary Staff's Psychological Contract Breach on Job Satisfaction and Turnover Intention: Focus on the Moderating Effects of Staff Careers (특 1급 호텔 조리종사원이 인지하는 심리적 계약위반이 직무만족도 및 이직의도에 미치는 영향: 경력의 조절효과를 중심으로)

  • Hong, Yun-Ju;Kim, Young-Joong
    • Culinary science and hospitality research
    • /
    • v.22 no.7
    • /
    • pp.187-202
    • /
    • 2016
  • The purpose of this study was to better understand the influence of psychological contract breach in deluxe hotel culinary staff memeberss on job satisfaction and turnover intention. Based on a total of 280 samples obtained for empirical research, this study reviewed the reliability and fitness of the research model and verified a total of 4 hypotheses using the AMOS program. The hypothesized relationships in the model were simultaneously tested by using a structural equation model(SEM). The proposed model provided an adequate fit to the data, ${\chi}^2=334.152$ (p<.001), df=162, CMIN/DF=2.063, GFI=.893, AGFI=.861, NFI=.919, CFI=.956, RMSEA=.062. The model's fit, as indicated by these indexes, was deemed satisfactory, thus providing a good basis for testing the hypothesized paths. The SEM showed that relational contract breach (${\beta}=-.236$) had a negative significant influence on job satisfaction. In addition, job satisfaction (${\beta}=-.236$) had a negative significant influence on turnover intention. The moderating effects on career the formulated model was verified. Limitations and future research directions are also discussed.

An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization (행렬 기반 랜덤화를 적용한 프라이버시 보호 기술의 안전성 및 정확성 분석)

  • Kang, Ju-Sung;An, A-Ron;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.53-68
    • /
    • 2008
  • We study on the practical privacy-preserving techniques by matrix-based randomization approach. We clearly examine the relationship between the two parameters associated with the measure of privacy breach and the condition number of matrix in order to achieve the optimal transition matrix. We propose a simple formula for efficiently calculating the inverse of transition matrix which are needed in the re-construction process of random substitution algorithm, and deduce some useful connections among standard error and another parameters by obtaining condition numbers according to norms of matrix and the expectation and variance of the transformed data. Moreover we give some experimental results about our theoretical expressions by implementing random substitution algorithm.

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Internal pressure in a low-rise building with existing envelope openings and sudden breaching

  • Tecle, Amanuel S.;Bitsuamlak, Girma T.;Aly, Aly Mousaad
    • Wind and Structures
    • /
    • v.16 no.1
    • /
    • pp.25-46
    • /
    • 2013
  • This paper presents a boundary-layer wind tunnel (BLWT) study on the effect of variable dominant openings on steady and transient responses of wind-induced internal pressure in a low-rise building. The paper presents a parametric study focusing on differences and similarities between transient and steady-state responses, the effects of size and locations of dominant openings and vent openings, and the effects of wind angle of attack. In addition, the necessity of internal volume correction during sudden breaching, i.e., a transient response experiment was investigated. A comparison of the BLWT data with ASCE 7-2010, as well as with limited large-scale data obtained at a 'Wall of Wind' facility, is presented.

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi;Yoonhyuk Jung
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.547-567
    • /
    • 2020
  • As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.