• Title/Summary/Keyword: personal integrity

Search Result 111, Processing Time 0.029 seconds

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Comparative Study on Effective Leadership in Combat and Noncombat Situation (전투 및 비전투 상황에서의 효율적 리더십에 대한 비교 연구)

  • Lee, Jae-Yoon
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.203-239
    • /
    • 2007
  • The current problems with the changing nature of the battlefield of the future point up the serious need for more and better research on the nature of effective military leadership. The purpose of this study was to examine effective leadership traits and behaviors of junior officers in combat situation. During times of peace, leader study battles and imagine themselves in all sorts of combat situations while at the same time, they must cope with numerous challenges and fill a variety of roles that they perceive are not battle related. This illustrates one of the fundamental paradoxes of the peacetime environment. Early studies, showing that combat leadership and noncombat leadership needed different talents, produced some clusters of traits which good combat leader were said to possess. Good combat leaders, for example, were described as possessing courage(e.g., bravery, fearlessness, daring, prowess, gallantry, guts, intrepidity, undaunted courage, fighting spirit, aggressive action), personal integrity(e.g., sincerity, flair, calmness, modesty), adaptability(e.g., flexibility, rapidity in action, speedy decision-making, clarity of thought) and so on. Behaviors found to be important in both combat and noncombat situations bore some relation to role requirements common to both situations. Behaviors important in one situation but not the other could be explained in terms of situational differences in role requirements for effective leadership. In order to achieve this purpose, a number of literature reviews were analysed. These results, though obtained in a somewhat rough and ready fashion, were useful not because they pointed to different leaders in war and in peace, but because they showed leaders the different things that were expected of them in different situations. It was also worth knowing how develop combat leadership. While these findings clearly suggest combat and noncombat differences, they do not necessarily confirm the complete study on effective leadership in combat situation. In conclusion, this study would be useful basis for further improvement on effective combat leadership and some further researches were recommended.

  • PDF

Trust to Share: Investigating the Key Factors to Influence Tenants' Participation in Online Short-Term Rent

  • Liuye Yu;Zhixia Zang;Xue Yang
    • Asia pacific journal of information systems
    • /
    • v.29 no.2
    • /
    • pp.308-327
    • /
    • 2019
  • The concept of sharing economy has received rich attention in recent years. As a typical type of business model in the sharing economy, online short rent has been paid attention by both industry and academia. In this study, we find trust to be a critical determinant to the success of online short rent platforms. Based on three dimensions of trust theory, i.e., ability, benevolence and integrity, we investigate the factors influencing tenant' willingness to participate in online short rent. We further examine the extent to which trust can influence the number of sales and comments of rooms listed at online short-term rent platforms, which can represent tenant' willingness to participate in the sharing economy. The results show that the trust dimensions represented by a landlord's personal characteristics have significant positive correlations with the number of sales and comments. For example, the real name authentication and the sesame score can represent the trust integrity; online replay ratio and the average confirmation time representing the trust sincerity, and the order acceptance ratio representing the trust ability. On this basis, we proposed some recommendations for both platforms and landlords. For example, the landlords can improve the tenants' trust by authenticating his/her real name, replying actively and timely. For platforms, when they make housing list ranking rules, they can take the landlord's personal attributes that may affect trust into consideration. Moreover, platforms can also allow landlords to supply value-added services to improve service quality and ultimately promote the virtuous circle of the platform ecosphere. Through conducting the empirical research on a particular application of the sharing economy, we aim to fill the research gap of this field in China and provide theoretical and practical contributions to the future development of online short rent.

The Effect of Military Leader's Behavioral Integrity on the Subordinate's Change-Oriented OCB : Focusing on the Moderating Effect of LMX (군 조직 리더의 언행일치가 구성원의 변화지향적 조직시민행동에 미치는 영향 : LMX의 조절효과를 중심으로)

  • Hax, Sun-Bok
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.157-167
    • /
    • 2020
  • This study aims to examine the effect of leader' behavioral integrity on subordinate's change-oriented OCB via their team commitment along with the moderating effect of LMX. For this, 395 soldiers from military organizations where external factors were relatively well controlled besides their personal characteristics were selected and surveyed using hierarchical regression methods. First, the results showed that leader' behavioral integrity was positively related to subordinate's change-oriented OCB. Second, the positive relationship between leader' behavioral integrity and subordinate's change-oriented OCB was mediated by team commitment. Third, the aforementioned mediated relationship was moderated by LMX. Although this study targeted members of military organizations with more restrictions on behavior than private organizations, such as corporations, it could be meaningful in that it confirmed that the leader's behavioral integrity lead to subordinate's voluntary behavior of change-oriented OCB, which should be followed by efforts to make it more general by comparing a variety of public and business organizations.

Research on Understanding of Game Information for the Elderly (중.노년층의 컴퓨터 게임이용과 인식에 대한 연구)

  • An, Jeong-Shin
    • The Korean Journal of Community Living Science
    • /
    • v.19 no.2
    • /
    • pp.235-244
    • /
    • 2008
  • The purpose of this study was to examine the elderly generation's understanding of game information and for recognition of computer based games as a recreation activity for the mid-to late adults. This study investigated game use and personal thoughts about the influences of computer games on each generation. The study was conducted by survey with the subjects being 242 adults aged 40 to 72 living in Busan and Kyung-nam area. Findings indicated that 43.5% of adults used computers to access games. The purposes for computer use were: business, searching portal sites, and games. 44.8% of adults knew about game information education. 67.4% of adults who had someone as a game information resource reported that their children provided the game information. Most adults used arcade games and recognized the influences of game information as positive to adults and the elderly but negative to children and adolescents. Finally, the adults aged "after mid-life" who knew about game information education showed higher ego-integrity and psychological well-being. These findings have implications for the development of elderly education programs aimed at promoting quality of life for older adults.

  • PDF

A Study on Acoustic Emission Characteristics of CFRP in aircraft operations (운항 중 실구조물(항공기 축소모델)에서의 탄소섬유강화플라스틱(CFRP)의 음향방출신호 특성에 관한 연구)

  • Lee, Kyung-Won;An, Ju-Seon;Hwang, Woong-Gi;Lee, Jong-Oh;Lee, Sang-Yul;Lee, Bo-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.4
    • /
    • pp.59-66
    • /
    • 2010
  • Aerospace structures need high stability and long life because many personal injuries can result from an accident and securing structural integrity for various external environments is more important than any other thing. So first of all we must prove the destruction properties for operating environment, have prediction technology about damage evolution and life, and develop an economical non-destructive technology capable of detecting structure damage. Acoustic emission (AE) have no need of artificial environment like ultrasonic inspection or radio fluoroscopy to emit a certain energy, is a testing technique using seismic signal resulting from interior changes of solids, and enables to observe if any fault is appeared and it grows seriously or not while running. In this study we suggest the method of structural integrity evaluation for aerospace structures through the acoustic emission technique, for which a model plane was manufactured and an actual operation test was conducted.

Exploring the Concept of University Research Ethics Education and the Direction of Curriculum Development

  • LEE, Hyo-Young
    • Journal of Research and Publication Ethics
    • /
    • v.3 no.1
    • /
    • pp.17-21
    • /
    • 2022
  • Purpose: Research ethics has social implications beyond the issues of personal morality and research integrity. In recent years, research ethics has become a more controversial topic in society. In this study, the concept of the university research ethics curriculum is defined, the current status of the research ethics curriculum is analyzed, and the direction of the university research ethics curriculum development direction is discussed. Research design, data and methodology: The concept of university research ethics education and the current status of research ethics education were examined, and the development direction of the university research ethics curriculum was explored based on the framework . Results: field education to secure university research ethics is still insufficient. In other words, only 12 universities for undergraduate programs and 37 universities for graduate programs included research ethics in their regular curriculum. Conclusions: The occurrence of research misconduct is mainly caused by not recognizing the error or not taking it seriously. In particular, university research misconduct results from a lack of understanding of research ethics, poor research education, a performance-oriented academic climate, and the absence of an institutional system for establishing research ethics.

Design and Analysis of a Secure Protocol for the P3P Standard (S-P3P: P3P 표준을 반영한 보안 프로토콜 설계 및 분석)

  • Choi, Hyun-Woo;Jang, Hyun-Su;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.545-552
    • /
    • 2007
  • P3P(Platform for Privacy Preference) that is used in the World Wide Web is a standard to define and negotiate policies about definition, transmission, collection, and maintenance of personal information. Current P3P standard provides methods that define client personal information protection policy and P3P policy associated with web server. It also provides a method that compares these two policies. The current P3P standard, however, does not handle detail functions for safe transmission of the personal information and data. Also, it does not handle problems that can be induced by the detail functions. In this paper, in order to solve these problems, we propose a Secure P3P(S-P3P) protocol, which is a security protocol for the current P3P standard, offers mutual authentication between the web server and the client, and guarantees integrity and confidentiality of the messages and data. Furthermore, a S-P3P protocol provides non-repudiation on transmission and reception of personal information that is transmitted from the client to the web server.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.