• Title/Summary/Keyword: laws and systems

Search Result 895, Processing Time 0.026 seconds

Determining Personal Credit Rating through Voice Analysis: Case of P2P loan borrowers

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3627-3641
    • /
    • 2021
  • Fintech, which stands for financial technology, is growing fast globally since the economic crisis hit the United States in 2008. Fintech companies are striving to secure a competitive advantage over existing financial services by providing efficient financial services utilizing the latest technologies. Fintech companies can be classified into several areas according to their business solutions. Among the Fintech sector, peer-to-peer (P2P) lending companies are leading the domestic Fintech industry. P2P lending is a method of lending funds directly to individuals or businesses without an official financial institution participating as an intermediary in the transaction. The rapid growth of P2P lending companies has now reached a level that threatens secondary financial markets. However, as the growth rate increases, so does the potential risk factor. In addition to government laws to protect and regulate P2P lending, further measures to reduce the risk of P2P lending accidents have yet to keep up with the pace of market growth. Since most P2P lenders do not implement their own credit rating system, they rely on personal credit scores provided by credit rating agencies such as the NICE credit information service in Korea. However, it is hard for P2P lending companies to figure out the intentional loan default of the borrower since most borrowers' credit scores are not excellent. This study analyzed the voices of telephone conversation between the loan consultant and the borrower in order to verify if it is applicable to determine the personal credit score. Experimental results show that the change in pitch frequency and change in voice pitch frequency can be reliably identified, and this difference can be used to predict the loan defaults or use it to determine the underlying default risk. It has also been shown that parameters extracted from sample voice data can be used as a determinant for classifying the level of personal credit ratings.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Domestic radio waves propagate management and control systems investigate the system status (국내 전파관리제도 및 전파관리 시스템 현황에 대한 조사)

  • Shin, Hyun-Shin;Kim, Sung-Hong;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.441-450
    • /
    • 2016
  • The International Telecommunications Union(: ITU) Radio Regulations(: RR) and in which is defined as the frequency of electromagnetic waves below 3000GHz spread in space without artificial guidance, our country also follows the international definition. As radio waves are electromagnetic waves spreading in space without artificial induction means having a frequency within the range set by the ITU. Frequency distribution for dual-work is to inde 300GHz, among the divided frequency is our daily or less than 90% of the frequency band is in contact saenghwalyong 3GHz. Propagation, but can occur indefinitely without depleting that anyone can create only gatchumyeon transmission equipment, if the radio frequency to use at the same time and space, the soul is the interference occurs is not available radio resources. Due to the physical finiteness used in our country for the first time on such a propagation laws enacted in 1961 and to the state radio resource management, and rules to be used for propagation only if granted the rights.

Development of a Harmonization Standard for Biosafety Risk Assessment of Infectious Disease Laboratories using Management Consulting Methodology (경영컨설팅 방법론을 이용한 감염병 실험실의 생물안전 위해성평가 조화기준 도출)

  • Yu, Minsu
    • Journal of Environmental Health Sciences
    • /
    • v.40 no.3
    • /
    • pp.187-203
    • /
    • 2014
  • Objectives: As the demand to deal with pathogens in domestic research institutions has expanded and biological accidents have increased, the need for systematic biosafety management in infectious disease laboratories has grown. According to international standards, risk assessment (RA) is required for biosafety management. However, RA criteria have not been clearly established in Korea, so to this end I have attempted to determine RA criteria meeting international levels Methods: In order to provide RA criteria for application, I analyzed the RA criteria in use in the U.S., Europe and at international organizations. In order to ensure the public nature of the RA criteria, I constructed the research model through modified management consulting methodology reflecting the model of Radnor and O'Mahoney. Results: According to the results of the study, existing laboratory biosafety regulations were comparable to domestic laboratory safety laws. Existing laboratory biosafety standards that are designed around risk factors were found to be insufficient. An RA case to be carried out in infectious disease laboratories at the National Institute of Health of KCDC was identified. Conclusion: To establish a systematic risk management system meeting international standards, it was necessary first to harmonize the systems of national and international standards. In addition, in order to provide specific biosafety management on-site, I recognized a need for methodology and planning strategies to discover biosafety management so that it can be carried out as required through the RA of individual laboratories.

Tracking Control for Robot Manipulators based on Radial Basis Function Networks

  • Lee, Min-Jung;Park, Jin-Hyun;Jun, Hyang-Sig;Gahng, Myoung-Ho;Choi, Young-Kiu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.285-288
    • /
    • 2005
  • Neural networks are known as kinds of intelligent strategies since they have learning capability. There are various their applications from intelligent control fields; however, their applications have limits from the point that the stability of the intelligent control systems is not usually guaranteed. In this paper we propose a neuro-adaptive controller for robot manipulators using the radial basis function network(RBFN) that is a kind of a neural network. Adaptation laws for parameters of the RBFN are developed based on the Lyapunov stability theory to guarantee the stability of the overall control scheme. Filtered tracking errors between the actual outputs and desired outputs are discussed in the sense of the uniformly ultimately boundedness(UUB). Additionally, it is also shown that the parameters of the RBFN are bounded. Experimental results for a SCARA-type robot manipulator show that the proposed neuro-adaptive controller is adaptable to the environment changes and is more robust than the conventional PID controller and the neuro-controller based on the multilayer perceptron.

  • PDF

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

A study on the application of PbD considering the GDPR principle (GDPR원칙을 고려한 PbD 적용 방안에 관한 연구)

  • Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2022
  • Countries around the world have recognized the importance of personal information protection and have discussed protecting the rights of data subjects in various forms such as laws, regulations, and guidelines. PbD (Privacy by Design) is one of the concepts that are commonly emphasized as a precautionary measure for the protection of personal information, and it is starting to attract attention as an essential element for protecting the privacy of information subjects. However, the concept of PbD to prioritize individual privacy in system development or service operation in advance is still only at the declarative level, so there is relatively little discussion on specific methods to implement it. Therefore, this study discusses which principles and rights should be prioritized to implement PbD based on the basic principles of GDPR and the rights of data subjects. This study is meaningful in that it suggests a plan for the practical implementation of PbD by presenting the privacy considerations that should be prioritized when developing systems or services in the domestic environment.

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

The Paradigm Shift of Intelligence Information Society: Law and Policy (지능정보사회에 대한 규범적 논의와 법정책적 대응)

  • Kim, Yun-Myung
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.24-37
    • /
    • 2016
  • An Intelligent information society means intelligent superconducting society that goes beyond information society where information is centered. Now that artificial intelligence is specifically discussed, it is time to start discussing the laws and systems for intelligent information society, where artificial intelligence plays a key role. At some point it may be too late to cope with singularity. Of course, it is not easy to predict how artificial intelligence will change our society. However, there are concerns on what kind of relationship should humans build with AI in the intelligent information society where algorithms rule the world or at least support decision making of humans. What is obvious is that humans dominating AI or ruling out AI will not be the answer. Discussions for legal framework to respond to the AI-based intelligent information society needs to be achieved to a level that replaces the current human-based legal framework with AI. This is because legal improvement caused by the paradigm shift to the intelligent information society may assume emergence of new players-AI, robots, and objects-and even their subjectivation.

Theoretical Background and Practice of Anti-dumping Policy in EU (EU 반덤핑정책의 이론적 배경과 실제)

  • Lee, Kab-Soo
    • International Area Studies Review
    • /
    • v.16 no.3
    • /
    • pp.269-291
    • /
    • 2012
  • Analyzing EU trade laws and institutional systems, the trade policy of EU has been founded, undoubtedly, on common interests for EU members. EU trade policy leaves room for 'Collective Protectionism' by permitting legal persona or interesting group to raise anti-dumping procedures. The anti-dumping policy of EU has shown a protectionism itself and has been affected by political motives. Investigation against anti-dumping can easily open and also there exists a wide range of political involvements. Furthermore, anti-dumping policy could be misused for protecting declining industries, which lost comparative advantage in global market. Economic theories show that anti-dumping measures divert import from outsider into insider members, which finally results in increasing intra-production of EU. This is exactly the reason why the anti-dumping policy has become attractive trade policy.