• Title/Summary/Keyword: protection of personal information

Search Result 762, Processing Time 0.026 seconds

Exposure Assessment of PCDD/Fs and Monitoring of Health Effects on Workers and Resident near the Waste Incinerators in Korea (국내 일부 소각장 근로자와 주변지역주민들의 PCDDs/Fs 노출과 건강 영향 평가)

  • Hong, Yun-Chul;Lee, Kwan-Hee;Kwon, Ho-Jang;Jang, Jae-Yeon;Leem, Jong-Han
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.4
    • /
    • pp.314-322
    • /
    • 2003
  • Objectives : In this study, the exposure status of the hazardous substances from incinerators, such as polychlorinated dibenzo-p-dioxins (PCDDs) and polychlorinated dibenzofurans (PCDFs), were studied , and the relationship between the exposure of these hazardous substances and their heath effects on the workers and residents near municipal solid waste (MSW) incinerators and an industrial incinerator investigated. Methods : Between July 2001 and Jure 2002, 13 workers at two MSW incinerators, 16 residents from the area around the two MSW incinerators, 6 residents from the control area, and further 10 residents near an industrial incinerator, estimated to emit higher levels of hazardous substances, were interviewed. Information, including sociodemographic information, personal habits, and work history, detailed gynecologic and other medical history were collected through interviews. Blood samples were also collected from 45 subjects, and analyzed for PCDD/DFs, by high resolution gas chromatography -high resolution mass spectrometry, using the US EPA 1613 method. In addition to the questionnaire survey, urinary concentrations of 8-hydroxydeoxyguanosine (8-OH-dG) and malondialdehyde (MDA) were measured as oxidative injury biomarkers. The urinary concentrations of 8-OH-dG were determined by in vitro ELISA, and the MDA by HPLC, using u adduct with thiobarbituric acid. Results : The PCDD/DFs concentrations in the residents near the industrial incinerator were higher than those in the controls, workers and residents near the MSW incinerators. The average TEQ (Toxic Equivalencies) concentrations of the PCDD/DFs in residents near the industrial incinerator were 53.4pg I-TEQs/g lipid. The estimated daily intakes were within the tolerable daily intake range (1-4 pg I-TEQ/Kg bw/day) suggested by WHO (1997) in only 30% to the people near the industrial incinerator. Animal studies have already shown that even a low body border of PCDD/DFs, such as 10 ng TEQ/kg bw, can cause oxidative damage in laboratory animals. Our study also showed that the same body burden of PCDD/DFs can cause oxidative damage to humans. Conclusions : The exposures to PCDD/DFs and the oxidative stress of residents near the industrial incinerator, were higher than those in the controls, workers and residents near the MSW incinerators. Proper protection strategies against these hazardous chemicals are needed. Because a lower body burden of PCDD/Fs, such as 10ng TEQ/kg bw, can cause oxidative damage, the tolerable daily intake range should be restrictedly limited to 1pg I-TEQ/kg bw/day.

Analysis of related words for each private security service through collection of unstructured data

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is mainly to provide theoretical basis of private security industry by analyzing the perception and flow of private security from the press-released materials according to periodic classification and duties through 'Big Kinds', a website of analyzing news big data. The research method has been changed to structured data to allow an analysis of various scattered unstructured data, and the keywords trend and related words by duties of private security were analyzed in growth period of private security. The perception of private security based on the results of the study was exposed a lot by the media through various crimes, accidents and incidents, and the issues related permanent position. Also, it tended to be perceived as a simple security guard, not recognized as the area of private security, and judging from the high correlation between private security and police, it was recognized not only as a role to assist the police force, but also as a common agent in charge of the public peace. Therefore, it should objectively judge the perception of private security, and through this, it is believed that it should be a foundation for recognizing private security as a main agent responsible for the safety of the nation and maintaining social orders.

Phenomenological Study about Bodyguards' Ethical Dilemmas (신변보호요원의 윤리적 딜레마에 대한 현상학적 연구)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.31-62
    • /
    • 2016
  • This study is about the phenomenological study of bodyguards' ethical dilemmas. Through this study, the meaning and essence of bodyguards' ethical dilemmas will be analyzed based on empirical facts. The purpose of this study is to provide basic information of the prevention and solutions for their ethical dilemmas and to understand and research the process and the essentials of them. To achieve this goal of the study, seven bodyguards who experienced ethical dilemmas working more than five years are selected as objects of the study. Colaizzi's six stage method are applied into this study so information gathered through interviews and questionnaire from 0ctober 1st, 2015 to November 20th, 2015 is analyzed. From the process of this research, these following conclusions are drawn considering validity of this study and ethical things. As a result, bodyguards' ethical dilemmas are divided into six centric meanings and 20 thematic statement. First, the centric meaning is conflict factors and the themes are discordance of pre-practice, regulatory or procedure problems, communication about sturcture and job and service disagreement. Second, the centric meaning is limited professional roles and the themes are institutional custom, decision making, priorities. Third, the centric meaning is difficulties of circumstantial judgement at work places and the themes are ambiguity of decision, conflict of knowledge, experience and opinion. Forth, the centric meaning is reasonable self-defense and the themes are lack of responsibility, rationalization, intentional negligence and sense of shame. Fifth, the centric meaning is difficulties of social network and the themes are the relationships between subordinates and superiors, the role of a moderator, uncooperative work and unpleasant sayings and doings. Sixth, the centric meaning is keeping secrets and the themes are burried for and illegal practice.

  • PDF

The Present Status of and Development Plans for Legal Technology in the Fourth Industrial Revolution (4차 산업혁명시대 법정보기술의 현황과 발전방안)

  • Lee, Sung-Jin;Lee, Yeon-Ju;Son, Hyoung-Kun;Kim, Gi-Bum
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.3-21
    • /
    • 2021
  • Klaus Schwab's discussion on the Fourth Industrial Revolution provides a framework for predicting the direction of legal technology development. Technological convergence, which has emerged as the core concept of the Fourth Industrial Revolution has a significant effect on legal technology. In particular, various new technologies, such as legal chatbots and platforms, are being introduced to enhance efficiency and accessibility in the legal field. However, legal technology is still in its early stage, with institutional improvement needed to vitalize the industry. In this paper, we first specify the concept and classification of legal technology in Chapter 2, followed by trends and limitations in Chapter 3 and ways of vitalizing legal technology in the future in Chapter 4. To invigorate legal technology development, it is necessary to put in place legal regulatory measures that stipulate the active disclosure of legal data, such as precedents, and make free use of such measures. In the law, many issues, such as the safety of artificial intelligence, personal information protection, and ethical standards, will be discussed in the future. Therefore, via this paper, we hope to promote the formation of social consensus and prepare countermeasures, such as legislative measures.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Overview of Legal Measures for Managing Workplace COVID-19 Infection Risk in Several Asia-Pacific Countries

  • Derek, Miller;Tsai, Feng-Jen;Kim, Jiwon;Tejamaya, Mila;Putri, Vilandi;Muto, Go;Reginald, Alex;Phanprasit, Wantanee;Granadillos, Nelia;Farid, Marina Bt Zainal;Capule, Carmela Q.;Lin, Yu-Wen;Park, Jihoon;Chen, Ruey-Yu;Lee, Kyong Hui;Park, Jeongim;Hashimoto, Haruo;Yoon, Chungsik;Padungtod, Chantana;Park, Dong-Uk
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.530-535
    • /
    • 2021
  • Background: Despite the lack of official COVID-19 statistics, various workplaces and occupations have been at the center of COVID-19 outbreaks. We aimed to compare legal measures and governance established for managing COVID-19 infection risks at workplaces in nine Asia and Pacific countries and to recommend key administrative measures. Methods: We collected information on legal measures and governance from both general citizens and workers regarding infection risks such as COVID-19 from industrial hygiene professionals in nine countries (Indonesia, India, Japan, Malaysia, New Zealand, Republic of the Philippines, Republic of Korea, Taiwan, and Thailand) using a structured questionnaire. Results: A governmental body overseeing public health and welfare was in charge of containing the spread and occurrence of infectious diseases under an infectious disease control and prevention act or another special act, although the name of the pertinent organizations and legislation vary among countries. Unlike in the case of other traditional hazards, there have been no specific articles or clauses describing the means of mitigating virus risk in the workplace that are legally required of employers, making it difficult to define the responsibilities of the employer. Each country maintains own legal systems regarding access to the duration, administration, and financing of paid sick leave. Many workers may not have access to paid sick leave even if it is legally guaranteed.

Limitations and Challenges of Game Regulatory Law and Policy in Korea (현행 게임규제정책의 한계와 과제 : 합리적인 규제를 위한 고려사항)

  • Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.149-164
    • /
    • 2014
  • The laws and policies governing Korea's game regulations are becoming more and more topics for debate as we enter the Age of Internet. The nature of the basis for Internet regulations and policies are not rooted in freedom of speech or fundamental values of democracy, but rather focused on solving real-world problems such as protection of the youth. Furthermore, the reality is that regulatory devices for keeping the social order such as regulating gambling are being applied directly to games without consideration on the characteristics of Internet gaming, raising concerns that the expansion of constitutional values and innovative empowerment inherent to the Internet are being weakened. The Geun-Hye Park Administration which succeeded Myung-Bak Lee's Administration, even went so far as to implement the so-called "Shutdown Policy", which prohibits access to Internet games during pre-defined time zones and also instigated a time zone selection rule. In order to curb the gambling nature of Internet games, government-led policies such as the mandatory personal identification and prohibition of player selection or in other words mandatory random player selection are being implemented. These institutions can inhibit freedom of speech, which is the basis of democracy, violate the right of equality through unreasonable discrimination between domestic and foreign service providers, and infringe upon the principles of administrative law, such as laws, due process in policies, and balance in among policies and governmental bodies. Going forward, if Korea's Internet game regulations and polices is to develop in a rational manner, regulatory frameworks will need to be designed to protect the nature of the Internet and its innovative values that enable the realization of constitutional values; for example, the Internet acting as the "catalytic media for freedom of expression as a fundamental human right ", which has already been acknowledged by the Korea's Constitutional Court. At the same time, transparent procedures should be put into place that will allow diverse participation of stakeholders including game service providers, game users, the youth and parents in the legislation and enforcement process of regulatory institutions; policies will also need to be transformed to enable not only regulatory laws but also self-regulation system to be established. And in this process, scientific and empirical analysis on the expected effects before introducing regulations and the results of enforcing regulations after being introduced will need to be strengthened.

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.

Study on Utilization Drones in Domestic Logistics Service in Korea (한국내 물류서비스에 드론 활용을 위한 연구)

  • Kang, Ki-Seog;Jeon, In-Oh
    • Journal of Distribution Science
    • /
    • v.14 no.5
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - In the year of 2015 and 2016, one of the items that got attention in CES was a drone. It has been 100 years since a drone emerged, but most were used for military purposes. As its use became diverse as of 2010, it got attention of the general public. In Korea, it was in 2011 that a drone was known to the public through an aerial video shooting for television program. This study tried to come up with suggestions by comparing domestic with overseas cases, and tried to consider the related technologies and systems with applying the role of drones in logistics service. Research design, data, and methodology - The overseas cases were regarded as drone's logistical purpose. The Prime Air service by US Amazon is still not commercialized and under pre-testing due to Federal Aviation Regulations, although it started in 2013. In Germany, DHL succeeded in delivering service testing which is called Parcelcopter, but it is not commercialized yet. Other than these, there are more attempts to prepare logistics service in China with Taobao, in France with Geopost's test, and in Africa. In Korea, CJ Korea Express tested delivery with a self-developed drone Results - In order to study for utilizing drones for logistics as the prerequisites, some overseas and domestic cases, which are currently considered, were reviewed. Also, the technologies and institutional requirements to commercialize drones for logistical purpose were reviewed. The reasons for using drones in logistics is to ensure the price competitiveness by reducing cost. The empirical test also will be needed because drone pilot areas are designated by ministry of land, infrastructure and transport. Conclusions - In order to utilize drones in logistics and foster the industry, this study would like to suggest the followings. First of all, size of drones for logistics needs to be fixed and their operating system should be standardized. Centralized investment resources are needed through standardization to ensure the market occupancy. Secondly, it is necessary to get the converged businesses that do research, develop and commercialize drones with the investment of private sector. Example can be found in Korea aerospace Industries. We can respond to the rapid growth of the market with intensive investing by integrating the private sector investment. Thirdly, institutional arrangements are needed to be established quickly. In the case of high-technologies like drones, institutional support often does not follow the rapid development of the technology. The problems can be found in securing drones-only airspace, creating drone-specialized pilot's license, matters related to remote controller and complementary regulations for drones in Aviation Act. If these regulations are not prepared or complemented at the right timing, technologies cannot be commercialized even though the development is completed. Fourthly, there is a need to secure the transparency regarding possible privacy and personal information protection problem while operating drones. Finally, in order to foster this new industry, government should focus on supporting R&D more in the long term than short term outcomes.