• Title/Summary/Keyword: data protection law

Search Result 183, Processing Time 0.026 seconds

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

Development of a Fission Product Transport Module Predicting the Behavior of Radiological Materials during Severe Accidents in a Nuclear Power Plant

  • Kang, Hyung Seok;Rhee, Bo Wook;Kim, Dong Ha
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.3
    • /
    • pp.237-244
    • /
    • 2016
  • Background: Korea Atomic Energy Research Institute is developing a fission product transport module for predicting the behavior of radioactive materials in the primary cooling system of a nuclear power plant as a separate module, which will be connected to a severe accident analysis code, Core Meltdown Progression Accident Simulation Software (COMPASS). Materials and Methods: This fission product transport (COMPASS-FP) module consists of a fission product release model, an aerosol generation model, and an aerosol transport model. In the fission product release model there are three submodels based on empirical correlations, and they are used to simulate the fission product gases release from the reactor core. In the aerosol generation model, the mass conservation law and Raoult's law are applied to the mixture of vapors and droplets of the fission products in a specified control volume to find the generation of the aerosol droplet. In the aerosol transport model, empirical correlations available from the open literature are used to simulate the aerosol removal processes owing to the gravitational settling, inertia impaction, diffusiophoresis, and thermophoresis. Results and Discussion: The COMPASS-FP module was validated against Aerosol Behavior Code Validation and Evaluation (ABCOVE-5) test performed by Hanford Engineering Development Laboratory for comparing the prediction and test data. The comparison results assuming a non-spherical aerosol shape for the suspended aerosol mass concentration showed a good agreement with an error range of about ${\pm}6%$. Conclusion: It was found that the COMPASS-FP module produced the reasonable results of the fission product gases release, the aerosol generation, and the gravitational settling in the aerosol removal processes for ABCOVE-5. However, more validation for other aerosol removal models needs to be performed.

Study on Effectiveness of Accident Reduction Depending on Autonomous Emergency Braking System (AEB 장치에 대한 사고경감 효과 연구)

  • Choi, JunYoung;Kang, SeungSu;Park, EunAh;Lee, KangWon;Lee, SiHun;Cho, SooKang;Kwon, YoungGil
    • Journal of Auto-vehicle Safety Association
    • /
    • v.11 no.2
    • /
    • pp.6-10
    • /
    • 2019
  • This paper describes effectiveness of accident reduction on vehicles equipped with AEB using accident data occurring in Korea. During the statistical period, we used the number of vehicles which are covered by auto insurance and the number of accidents. To maximize the reduction effect of accidents caused by the driver's carelessness, the analysis was limited to Physical Damage Coverage that covers the cost of repairing or replacing the damaged vehicle caused by the driver's fault. Due to Personal Information Protection Law, it was not capable of comparing the same vehicle using Vehicle Identification Number in this study. Instead of that, we used it as a similar vehicle, so there are limits to the comparison and analysis results. As a result of this study, we have found that the effect of reducing accidents was different depending on the vehicle class, but it was generally concluded that the number of accidents decreased when the vehicle was equipped with an AEB system. Domestic research on the AEB effect of reducing accidents is not active yet. Therefore, it is absolutely essential to analyze the effects according to various conditions such as driver's age, occupation and gender as well as expanding the study models in the future.

A Study on Policy Improvement for Ensuring the Effectiveness of Suicide Prevention Law (「자살예방 및 생명존중 문화 조성을 위한 법률」의 실효성 확보를 위한 정책적 개선 방안 - 「개인정보보호법」과의 충돌문제 해결을 중심으로 -)

  • Kwon, Do-Hyun;Park, Jong-Ik;Ah, Yong-Min
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.261-285
    • /
    • 2019
  • The essential policy of suicide prevention is to continuously manage and treat suicide attempted people through data base related to suicide retry rate and follow-up study report. In Korea, only few people are allowed to follow-up by the Personal Information Protection Act. As a result, the research participation rate and the service participation rate are rather low, so that the research participants is limited to a part of the suicide attempted people. Therefore, the policy proposals to be improved in the Ministry of Health and Welfare Act were examined comparatively in order to increase the practical utilization of the suicide prevention about Article 14 and Article 20 of the Suicide Prevention Act. As a criterion for policy improvement, measures for non-discrimination of information to be considered in terms of technical and ethical dimensions and non-profit research and medical information for medical purposes were suggested. In addition to the severity of the suicide, the suicide risk was assessed and the criteria for the objective assessment of the follow-up observation were considered in consideration of the severity of the suicide.

Real-time Integrity for Vehicle Black Box System (차량용 블랙박스 시스템을 위한 실시간 무결성 보장기법)

  • Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.49-61
    • /
    • 2009
  • Recently, a great attention has been paid to a vehicle black box device in the auto markets since it provides an accident re-construction based on the data which contains audio, video, and some meaningful driving informations. It is expected that the device will get to promote around commercial vehicles and the market will greatly grow within a few years. Drivers who equips the device in their car believes that it can find the origin of an accident and help an objective judge. Unfortunately, the current one does not provide the integrity of the data stored in the device. That is the data can be forged or modified by outsider or insider adversary because it is just designed to keep the latest data produced by itself. This fact cause a great concern in car insurance and law enforcement, since the unprotected data cannot be trusted. To resolve the problem, in this paper, we propose a novel real-time integrity protection scheme for vehicle black box device. We also present the evaluation results by simulation using our software implementation.

About dentistry infection from dentistry medical institution recognition research of patient (치과내원환자의 감염관리에 관한 인식도 조사)

  • Lee, Youn-Kyung;Kim, Soon-Duck
    • Journal of Korean society of Dental Hygiene
    • /
    • v.10 no.4
    • /
    • pp.617-625
    • /
    • 2010
  • Objectives : The research which sees collected information about dentistry infection management recognition of the patients and the infection management which the medical treatment consumer does in necessity is what, grasped and satisfaction and became the fundamental data which makes the hospital will be able to trust about dentistry image rise and dentistry environment of the medical treatment consumer who assists a dentistry character executed. Methods : From 2009 April 1st until May 28th 233 people common people who have the experience which visits a Gyeongsangnam-do area dentistry the object with the entry question law which sleeps did and the data analysis SPSS, 12.0 For Window under using produced each question item by frequency and a ratio, the analytical degree of infection management One - Way ANOVA stamps and executed t-test. Results : Information experience experienced about dentistry infection of the investigation object person to be, appeared with 74.7% and the after that dentistry assistance at the time of conduct change which experiences the answer back regarding of Former times attentively observes organization disinfecting' was most with 46.6%. The protective equipments wearing goal of the dentistry medical attendance appeared the dentistry medical attendance and patient protection 77.7%, dentistry medical attendance protection 12.9%, by patient protection 9.4% order. Before medical treatment starting of the dentistry medical attendance the hand Does not confirm' appeared 72.1%, with. The hand washing, is whole and the degree which appears is high with 4.11 points the stamp. Is high there was a possibility of knowing the thing about the recording infection where the educational background will be high and considers statistically the difference which was visible Conclusions : The education which is active and continuous is necessary about infection management and sets the guides which are standardized to the patients and about infection management and about infection prevention and exposes from dentistry practices well to emboss the thing is thought that there is a necessity to plant a trust feeling about the dentistry where the patients assist.

Measurement of Flash Point for Binary Mixtures of 2-Butanol, 2,2,4-Trimethylpentane, Methylcyclohexane, and Toluene at 101.3 kPa (2-Butanol, 2,2,4-Trimethylpentane, Methylcyclohexane 그리고 Toluene 이성분 혼합계에 대한 101.3 kPa에서의 인화점 측정)

  • Hwang, In Chan;In, Se Jin
    • Clean Technology
    • /
    • v.26 no.3
    • /
    • pp.161-167
    • /
    • 2020
  • For the design of the prevention and mitigation measures in process industries involving flammable substances, reliable safety data are required. An important property used to estimate the risk of fire and explosion for a flammable liquid is the flash point. Flammability is an important factor to consider when developing safe methods for storing and handling solids and liquids. In this study, the flash point data were measured for the binary systems {2-butanol + 2,2,4-trimethylpentane}, {2-butanol + methylcyclohexane} and {2-butanol + toluene} at 101.3 kPa. Experiments were performed according to the standard test method (ASTM D 3278) using a Stanhope-Seta closed cup flash point tester. A minimum flash point behavior was observed in the binary systems as in the many cases for the hydrocarbon and alcohol mixture that were observed. The measured flash points were compared with the predicted values calculated via the following activity coefficient (GE) models: Wilson, Non-Random Two-Liquid (NRTL), and UNIversal QUAsiChemical (UNIQUAC) models. The predicted data were only adequate for the data determined by the closed-cup test method and may not be appropriate for the data obtained from the open-cup test method because of its deviation from the vapor liquid equilibrium. The predicted results of this work can be used to design safe petrochemical processes, such as the identification of safe storage conditions for non-ideal solutions containing flammable components.

Estimation of the Flash Points for n-Propanol+Formic acid System Using the Binary Parameters Optimization Method (이성분계 파라미터 최적화 기법을 활용한 n-Propanol+Formic acid 계의 인화점 추산)

  • Ha, Dong-Myeong;Lee, Sung-Jin
    • Fire Science and Engineering
    • /
    • v.22 no.4
    • /
    • pp.65-69
    • /
    • 2008
  • An accurate knowledge of the flash point is important in developing appropriate preventive and control measures in industrial fire protection. The lower flash points for the n-propanol+formic acid system were measured by Pensky-Martens closed cup apparatus. This binary mixture exhibited MFPB (minimum flash point behavior), which leads to the minimum on the flash point vs composition curve. The Raoult's law and optimization method using Wilson equation were used to predict the lower flash points and were compared with experimental data. The calculated values based on the optimization method were found to be better than those based on the Raoult's law.

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle (이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론에 관한 연구)

  • Seo, Woo-Seok;Kim, Kye-Soon;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1161-1170
    • /
    • 2013
  • Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.

A Study on Improving Installation Guideline of Facilities to Protect Groundwater Contamination: Applications of Packer Grouting to Contaminated Wells (지하수오염방지 시설기준의 개선에 관한 연구:지하수오염관정에의 팩커그라우팅 적용사례)

  • Choo, Chang-Oh;Ryu, Jong-Heum;Cho, Heuy Nam;Jeong, Gyo-Cheol
    • The Journal of Engineering Geology
    • /
    • v.23 no.3
    • /
    • pp.293-304
    • /
    • 2013
  • Because the present groundwater law broadly regulates a simple and impractical guideline ignoring aquifer characters and geology, general purpose facilities for protection of groundwater contamination is still considered unsatisfactory to ensure groundwater resources. In recent, there have been growing attempts in the packer development as crucial techniques and devices for groundwater protection. This study investigated the application of packer grouting techniques to contaminated groundwaters of two well sites in the Andong and Yeongi areas, both of which revealed a satisfactory effect with improved water quality: 94% decrease in turbidity at the Andong area and 60% decrease in $NO_3$-N, respectively. Based on aquifer characters including geology, weathering depth, fracture pattern, hydraulic gradient, and the flow path of contaminants, the integrated properties of groundwater contamination should be evaluated and treated with the help of accurate analyses such as bore hole imaging and monitoring data. Packer grouting and casing on well to ensure the useful aquifer free of contaminant are expected to play important role in inhibiting the inflow of contaminants when adequately applied. Therefore it is concluded that these can serve as reliable tools in remediation and protection of contaminated groundwater as well as efficient utilization of groundwater.