• Title/Summary/Keyword: laws and systems

Search Result 903, Processing Time 0.022 seconds

Development of a Harmonization Standard for Biosafety Risk Assessment of Infectious Disease Laboratories using Management Consulting Methodology (경영컨설팅 방법론을 이용한 감염병 실험실의 생물안전 위해성평가 조화기준 도출)

  • Yu, Minsu
    • Journal of Environmental Health Sciences
    • /
    • v.40 no.3
    • /
    • pp.187-203
    • /
    • 2014
  • Objectives: As the demand to deal with pathogens in domestic research institutions has expanded and biological accidents have increased, the need for systematic biosafety management in infectious disease laboratories has grown. According to international standards, risk assessment (RA) is required for biosafety management. However, RA criteria have not been clearly established in Korea, so to this end I have attempted to determine RA criteria meeting international levels Methods: In order to provide RA criteria for application, I analyzed the RA criteria in use in the U.S., Europe and at international organizations. In order to ensure the public nature of the RA criteria, I constructed the research model through modified management consulting methodology reflecting the model of Radnor and O'Mahoney. Results: According to the results of the study, existing laboratory biosafety regulations were comparable to domestic laboratory safety laws. Existing laboratory biosafety standards that are designed around risk factors were found to be insufficient. An RA case to be carried out in infectious disease laboratories at the National Institute of Health of KCDC was identified. Conclusion: To establish a systematic risk management system meeting international standards, it was necessary first to harmonize the systems of national and international standards. In addition, in order to provide specific biosafety management on-site, I recognized a need for methodology and planning strategies to discover biosafety management so that it can be carried out as required through the RA of individual laboratories.

Tracking Control for Robot Manipulators based on Radial Basis Function Networks

  • Lee, Min-Jung;Park, Jin-Hyun;Jun, Hyang-Sig;Gahng, Myoung-Ho;Choi, Young-Kiu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.285-288
    • /
    • 2005
  • Neural networks are known as kinds of intelligent strategies since they have learning capability. There are various their applications from intelligent control fields; however, their applications have limits from the point that the stability of the intelligent control systems is not usually guaranteed. In this paper we propose a neuro-adaptive controller for robot manipulators using the radial basis function network(RBFN) that is a kind of a neural network. Adaptation laws for parameters of the RBFN are developed based on the Lyapunov stability theory to guarantee the stability of the overall control scheme. Filtered tracking errors between the actual outputs and desired outputs are discussed in the sense of the uniformly ultimately boundedness(UUB). Additionally, it is also shown that the parameters of the RBFN are bounded. Experimental results for a SCARA-type robot manipulator show that the proposed neuro-adaptive controller is adaptable to the environment changes and is more robust than the conventional PID controller and the neuro-controller based on the multilayer perceptron.

  • PDF

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

A study on the application of PbD considering the GDPR principle (GDPR원칙을 고려한 PbD 적용 방안에 관한 연구)

  • Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2022
  • Countries around the world have recognized the importance of personal information protection and have discussed protecting the rights of data subjects in various forms such as laws, regulations, and guidelines. PbD (Privacy by Design) is one of the concepts that are commonly emphasized as a precautionary measure for the protection of personal information, and it is starting to attract attention as an essential element for protecting the privacy of information subjects. However, the concept of PbD to prioritize individual privacy in system development or service operation in advance is still only at the declarative level, so there is relatively little discussion on specific methods to implement it. Therefore, this study discusses which principles and rights should be prioritized to implement PbD based on the basic principles of GDPR and the rights of data subjects. This study is meaningful in that it suggests a plan for the practical implementation of PbD by presenting the privacy considerations that should be prioritized when developing systems or services in the domestic environment.

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

The Paradigm Shift of Intelligence Information Society: Law and Policy (지능정보사회에 대한 규범적 논의와 법정책적 대응)

  • Kim, Yun-Myung
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.24-37
    • /
    • 2016
  • An Intelligent information society means intelligent superconducting society that goes beyond information society where information is centered. Now that artificial intelligence is specifically discussed, it is time to start discussing the laws and systems for intelligent information society, where artificial intelligence plays a key role. At some point it may be too late to cope with singularity. Of course, it is not easy to predict how artificial intelligence will change our society. However, there are concerns on what kind of relationship should humans build with AI in the intelligent information society where algorithms rule the world or at least support decision making of humans. What is obvious is that humans dominating AI or ruling out AI will not be the answer. Discussions for legal framework to respond to the AI-based intelligent information society needs to be achieved to a level that replaces the current human-based legal framework with AI. This is because legal improvement caused by the paradigm shift to the intelligent information society may assume emergence of new players-AI, robots, and objects-and even their subjectivation.

Theoretical Background and Practice of Anti-dumping Policy in EU (EU 반덤핑정책의 이론적 배경과 실제)

  • Lee, Kab-Soo
    • International Area Studies Review
    • /
    • v.16 no.3
    • /
    • pp.269-291
    • /
    • 2012
  • Analyzing EU trade laws and institutional systems, the trade policy of EU has been founded, undoubtedly, on common interests for EU members. EU trade policy leaves room for 'Collective Protectionism' by permitting legal persona or interesting group to raise anti-dumping procedures. The anti-dumping policy of EU has shown a protectionism itself and has been affected by political motives. Investigation against anti-dumping can easily open and also there exists a wide range of political involvements. Furthermore, anti-dumping policy could be misused for protecting declining industries, which lost comparative advantage in global market. Economic theories show that anti-dumping measures divert import from outsider into insider members, which finally results in increasing intra-production of EU. This is exactly the reason why the anti-dumping policy has become attractive trade policy.

The Promotion State and Measures to Improve the Record Information Disclosure System (기록정보공개 제도 개선 추진 현황과 방안)

  • Zoh, Young-Sam
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.77-114
    • /
    • 2009
  • The right to know is not satisfied merely by making or improving laws or systems. The right to know is a matter of culture rather than system. Nevertheless, consistent system improvement measures are required. There are many laws relating to the right to know. In particular, at the core are the Official Information Disclosure Act, the Record and Archives Management Act, and the Presidential Record Management Act. The fact that systems relating to official record management and presidential record management are related to the right to know is understood by the promotion of records and archives management reform after the year 2004, as a result of which the national archives management innovation road map was established. Reflecting the many opinions of the "Information Disclosure System Improvement Task Force" composed with participation of the government and the press after the participatory government's announcement of "Measures to Advance the Support System for News Coverage," amendments to the Information Disclosure Act have come forward with system improvement measures in connection with issues that had arisen until then. Such improvement measures have not resulted in actual improvements. This thesis proposes several system improvement measures, focusing on those that have arisen until now but have not been reflected in discussion, such as converting the concept of information non-disclosure into disclosure postponement, preparing and disclosing particular information disclosure standards, specifying personal information for non-disclosure, specifying and strictly applying any information that has not been disclosed for purposes of internal review, deleting non-disclosure items in stenographic records that do not have a reason to exist, and establishing limits and terms of non-disclosure. Of the most remarkable system improvement measures that have been made until now is our recognition that the right to know is not limited to the information disclosure system but that the "cause" of archive management should be systematic and scientific. In other words, the right to know is understood to establish not just accidential factors, such as with a whistle-blower, but the inevitable factors of systemization of production, distribution, preservation, and use of archives. Much more study should be pursued regarding disclosure of archives information. In particular, difficult issues to be resolved regarding reading records at permanent archives management institutions, such as the National Archives of Korea, or copyrights that arise in the process, require constant study from academia and relevant institutions.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Distinction Technology for Harmful Web Documents by Rates (등급에 따른 웹 유해 문서 분류 기술)

  • Kim, Yong-Soo;Nam, Taek-Yong;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.859-864
    • /
    • 2006
  • The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for all users, notably children. Additionally for adults, some contents included in abnormal porn sites can do ordinary people's mental health harm. In the meantime, since Internet is a worldwide open network it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse way, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies.