• Title/Summary/Keyword: private information protection

Search Result 253, Processing Time 0.027 seconds

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

Study on Forestland Conversion Demand Prediction based on System Dynamics Model (System Dynamics 기반의 산지전용 수요 모델 개발에 관한 연구)

  • Doo-Ahn, KWAK
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.4
    • /
    • pp.222-237
    • /
    • 2022
  • This study was performed to predict change of forestland area in future to 2050 based on System Dynamics Model which is based on feedback loop by causal relationship. As forestland area change in the future depends on potential forestland conversion demands, each demand type of forestland conversion such as agricultural, industrial, public and residential/commercial use was modeled using annual GDP, population, number of household, household construction permission area (1981~2019). In results, all of conversion demands would have continuously decreased to 2050 while residential and commercial land would be reduced from 2034. Due to such shortage, eventually, total of forestland in South Korea would have decreased to 6.18 million ha when compared to current 6.29 million ha. Moreover, the forestland conversion to other use types must be occurred continuously in future because most of forestland is owned privately in South Korea. Such steady decrement of forestland area in future can contribute to the shortage of carbon sink and encumber achievement of national carbon-neutral goal to 2050. If forestland conversion would be occurred inevitably in future according to such change trends of all types, improved laws and polices related to forestland should be prepared for planned use and rational conservation in terms of whole territory management. Therefore, it is needed to offer sufficient incentive, such as tax reduction and payment of ecosystem service on excellent forestland protection and maintenance, to private owners for minimizing forestland conversion. Moreover, active afforestation policy and practice have to be implemented on idle land for reaching national goal 'Carbon Neutral to 2050' in South Korea.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

A Study on the Swiss Cadastral & Registration System (스위스의 지적과 등기제도에 관한 연구)

  • Ryu, Byoung-chan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.169-187
    • /
    • 2020
  • In Korea, Switzerland has been known as a country that integrates the Cadastral System (hereafter as CS.) and the registration system(hereafter as RS.) according to a research report by the Ministry of Home Affairs since 1975. However, I found that Switzerland's CS. and RS. were separately managed by the Dept. of Defense, Civil Protection & Sports(hereafter as DDPS.) and the Dept. of Justice & Police(hereafter as DJP.). Therefore, I have a question about where is the institution in charge of the CS. and RS. in Switzerland, what are the relevant laws and regulations, and what are the related public records, and the background and purpose of this study is to resolve this. Research Results First, cadastral affairs are handled by the Cadastral Surveying Division at the Federal Office for Topography (Swisstopo) under the DDPS, and the registered affairs are handled by the Private Law Division at the Federal Office for Justice under the DJP. Second, Cadastral-related laws include 'VAV' and 'TVAV' newly enacted in 1993, and Registration-related laws include 'Civil Act(ZGB)' and 'Order on Land Registration(GbVO)' etc. which have been in effect since 1912. Third, the cadastral record includes the Cadastral Books, Cadastral Maps & Numerical Cadastral Books etc, and the register includes the Hauptbuch, Tagebuch, Pläne, Liegenschaftsbeschreibung etc. It is hoped that the results of this study will provide an accurate understanding of the fact that Switzerland's CS. is managed separately by the DDPS, and the RS. is managed by the DJP.

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

Deep Learning OCR based document processing platform and its application in financial domain (금융 특화 딥러닝 광학문자인식 기반 문서 처리 플랫폼 구축 및 금융권 내 활용)

  • Dongyoung Kim;Doohyung Kim;Myungsung Kwak;Hyunsoo Son;Dongwon Sohn;Mingi Lim;Yeji Shin;Hyeonjung Lee;Chandong Park;Mihyang Kim;Dongwon Choi
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.143-174
    • /
    • 2023
  • With the development of deep learning technologies, Artificial Intelligence powered Optical Character Recognition (AI-OCR) has evolved to read multiple languages from various forms of images accurately. For the financial industry, where a large number of diverse documents are processed through manpower, the potential for using AI-OCR is great. In this study, we present a configuration and a design of an AI-OCR modality for use in the financial industry and discuss the platform construction with application cases. Since the use of financial domain data is prohibited under the Personal Information Protection Act, we developed a deep learning-based data generation approach and used it to train the AI-OCR models. The AI-OCR models are trained for image preprocessing, text recognition, and language processing and are configured as a microservice architected platform to process a broad variety of documents. We have demonstrated the AI-OCR platform by applying it to financial domain tasks of document sorting, document verification, and typing assistance The demonstrations confirm the increasing work efficiency and conveniences.

A Study on the Current Rotation System of Hunting Ground (현행(現行) 순환수렵장(循環狩獵場) 제도(制度)에 관(關)한 연구(硏究))

  • Byun, Woo Hyuk
    • Journal of Korean Society of Forest Science
    • /
    • v.74 no.1
    • /
    • pp.47-55
    • /
    • 1986
  • During the past 4 years, I have made a careful analysis of the present rotating system of hunting areas, on the one hand, by asking a group of hunters to fill out a questionnaire, and on the other hand, by referring to the written documents on the subject. And, as a result, it is concluded that this system, by varying the hunting grounds each year, contains in itself several problems as follows. 1. The hunters find it quite inconvenient to use a different hunting ground year after year and they also complain that the present hunting ground charge is more than it is worth. Therefore, it is expected that the number of hunters will explosively increase in the future with the betterment of hunting conditions. 2. The hunters have almost no information about game and they are, as a whole, lacking in the ethics of hunting. 3. The allotment of time in hunting training courses is not so sufficient that it is next to impossible to improve the quality of hunters. 4. As a rule, the population density of wildlife is so sparse that it falls short of the proper standard of it. 5. The present hunting system does not seem to contribute to the advancement of tourism. 6. It is absolutely necessary to make a general survey of the situation of wildlife for the legal protection of it. Besides, the interests of hunters are so closely tied up with those of farmers and foresters that dreastic measures should be taken to settle their conflicting differences. For the purpose of solving the above-mentioned problems and at the same time, of developing sound hunting practices in the long run, I hereby make two suggestions. 1. The Establishment of the Hunting License Test System It is desirable to issue a license to a prospective hunter after he has met a special qualification and then passed a test so that he may have bits of information needed for his hunting activities. 2. The Introduction of The Revier System The fundamental concept of this system is based on the assumption that the private landowner should reserve a right to the pursuit of game and take responsibility for wildlife management.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF