• Title/Summary/Keyword: 법령 및 제도

Search Result 472, Processing Time 0.023 seconds

A Study on Improving the Support System for Libraries for the Disabled (장애인도서관 지원을 위한 법제도 개선방안 연구)

  • Sohee Youn;Youseung Kim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.37-58
    • /
    • 2023
  • The purpose of this study is to find ways to improve the legal system for supporting libraries for the disabled. For the stdy, related precedent studies were historically analyzed, and the legal definition of libraries for the disabled and related laws were discussed. Through this, it was confirmed that the current 「Library Act」 does not have sub-regulations of the Enforcement Decree and Enforcement Rules supporting the regulations related to library support for the disabled, and the 「Welfare of Persons with Disabilities Act」 replaces them. In addition, through research on the current status of libraries for the disabled and interviews with field workers in libraries for the disabled, the need for improvement of the legal system related to libraries for the disabled was confirmed. In conclusion, three improvement plans for supporting libraries for the disabled were proposed as follows: First, the definition and duties of libraries for the disabled through the 「Library Act」; second, preparation of regulations on support for library services for the disabled and fulfillment of duties through the 「Enforcement Decree of the Library Act」; third, through the 「Library Act」 and 「Enforcement Decree of the Library Act」, standards for facilities, collections and manpower of libraries for the disabled are presented.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

A Study on Problems with the ROK's Bioterrorism Response System and Ways to Improve it (생물테러 대응체제의 문제점과 개선방안 연구)

  • Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.113-144
    • /
    • 2010
  • Bioterrorism is becoming more attractive to terrorist groups owing to the dramatic increase in the utility and lethality of biological weapons in line with today's cutting-edge biological science and technology. The Republic of Korea is facing both internal and external terrorist threats, as well as the possible biological warfare by North Korea. Therefore, it is essential to establish an effective bioterrorism response system in the ROK. In order to come up with the adequate response system for the ROK, an in-depth study has been conducted on the current bioterrorism response system of the U.S. whose preparedness is considered relatively adamant. As a result, the following facts have been found: (1)the legislation with regard to bioterrorism has been established or amended according to the current situation in the U.S., (2)the counter terrorism activities have been integrated with the Department of the Homeland Security as the central agency in order to maximize the national CT capacity, (3)Specific procedures and instructions to cope with bioterrorism have been made into manuals so as to enhance the working-level response capabilities. Next, the analysis on the ROK's bioterrorism response system has been performed in various categories, including the legislation system, task role distribution, cooperative relations, and resource application. It turned out that the ROK's legislation basis is relatively weak and it lacks the apparatus to integrate the bioterrorism response activities on the national level. The shortage of the adequate response facilities and resources, as well as the poor management of manpower have also emerged as problems that hinder the effective CT implementations. Through an analytical and comparative study of the U.S. and the ROK systems, this paper presents several ways to ameliorate improve the current system in the ROK as follows: (1)establish the anti-terrorism law, which would be the basic legal basis for the bioterrorism-related matters; and make revisions to the disaster-related legislation, relevant to bioterrorism response activities, (2)establish an integrated body that has a powerful authority to coordinate the relevant CT agencies; and converge the decentralized functions to maximize the overall response capacity, (3)install the laboratories with a high biosafety level and secure enough of the strategic medical stock-pile, (4)enhance the ability of the inexperienced response personnel by providing with a manual that has detailed instructions.

  • PDF

A study on the Need for Introducing the Information and Communication Facilities Maintenance Mandatory System: In view of Apartment House Environment) (정보통신설비의 유지관리 의무화제도 도입 필요성에 관한 연구(공동주택환경을 중심으로))

  • Lim, Sang-Chool;Kim, Sun-Hyung
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.6 no.3
    • /
    • pp.15-24
    • /
    • 2007
  • According to an apartment house environment and the service provide method of major telecom operators, is providing optic-LAN service with installing the equipments of optical office center and optic distribution at MDF(Main Distribution Frame) and under-ground of apartment. therefore the distribute is deepening between service providers because of space securement to install equipments and spare pipe securement to reinstall UTP cable. These were reasons that operators leaned to subscriber collection and neglected to maintenance, in addition, insist the facilities invested by each operators is his own assets for all that in-plant of apartment house is private land. So, would not being touched by others. Accordingly, this study will search it through the field current condition examine that service's types and methods which various telecom operators and broadcast operators are providing, the current conditions of being maintained, the problems of being happened. etc. and would like to improve that the users could use the services safely by making the information & communication facilities maintenance mandatory under the regular size of apartment house circumstances through the analysis of various laws relations which are managed information & communication construction work law, telecommunication basis law, home network. etc. technical standards by the Ministry of Information and Communication and are managed housing law, construction law, the regulation related to house construct standards. etc. by the Ministry of Construction and Transportation.

  • PDF

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

The Investigate of Security Service History focused on 1920s after the Provisional Government in Korea (임시정부 수립 후 1920년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.53-68
    • /
    • 2008
  • The purpose of this study is to investigate about security service history as enlightenment period from the provisional government to 1920s. This study used materials by historical facts for the regulations and books in provisional government, newspapers in 1920s. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Kim Gu, a prominent Korean nationalist leader, was understand of security service which was to protect provisional government from the enemy. So, Kim Gu participated in training of security service agents in the police department of provisional government. Secondly, there was security service agency in the provisional government. In 1920s, security service agency and agents appeared for the first time in regulations of the provisional government. At the beginning of the security service agency's appearance was influenced on background and circumstances for Korean independence activist who helped the independence of Korea from Japan. Thirdly, security service agents leaded an active for independence movement of the private organizations in 1920s. They carried on an independence movement in defiance of Japanese coercion as nationalist in Korea history. Fourthly, security service came out the general society of Korea in 1920s. The security service was not just for safety, but also for its security system and peace of mind, which were influenced by the political situation, social environment in 1920s. For the this reason, now security service has safety perception in Korea despite the historical progress.

  • PDF

A Study on the Minimization of Problems of the Direct Payment for Subcontractor's Work in Public Construction Project (공공건설사업(公共建設事業) 하도급대가(下都給代價) 직접지급(直接支給)의 효과분석(效果分析)을 통한 문제점(問題點) 저감방향(低減方向)에 대한 연구(硏究))

  • Cho, Young-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.5
    • /
    • pp.101-108
    • /
    • 2007
  • To execute a construction project, many construction participants are engaged in the project. Especially many subcontactors role is very important, but their contract statute seems weaker rather than prime contractor. So to protect the subcontractor and to activate fair subcontract, Fair Transactions in Subcontracting Act was enacted. Direct payment to subcontractor clause of the act can protect subcontractor from the fear of insolvency of prime contractor, on the other hand can cause dispute about the interpretation of defect liability. Therefore the positive act and regulation were examined, and the effects of direct payment to subcontractor were analyzed. And the treatment direction of direct payment were suggested in this paper. Summary is as follows; (1) Statute of subcontractor for the ordering subject must be considered (2) Contract relationship must be reflected in the performance bond, subcontract bond, and subcontract construction conditions (3) To clarify the defect liability for the direct payment, retainage to guarantee the repair during contract period may be reflect on the subcontract construction conditions.

The Mediating Effect and Moderating Effect of Pseudonymized Information Combination in the Relationship Between Regulation Factors of Personal Information and Big Data Utilization (개인정보 규제요인과 빅데이터 활용간의 관계에서 가명정보 결합의 매개효과 및 조절효과)

  • Kim, Sang-Gwang
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.82-111
    • /
    • 2020
  • Recently, increasing use of big data have caused regulation factors of personal information and combination of pseudonymized information to emerge as key policy measures. Therefore, this study empirically analyzed the mediating effect and moderating effect of pseudonymized information combination as the third variable in the relationship between regulation factors of personal information and big data utilization. The analysis showed the following results: First, among personal information regulation factors, definition regulation, consent regulation, supervisory authority regulation, and punishment intensity regulation showed a positive(+) relationship with the big data utilization, while among pseudonymized information combination factors, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination were also found to be in a positive relationship with the use of big data. Second, among the factors of pseudonymized information combination, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination showed a positive(+) mediating effect in relation to regulation factors of personal information and big data utilization. Third, in the relationship between personal information regulation factors and big data utilization, the moderating effect hypothesis that each combination institution type of pseudonymized information (free-type, intermediary-type, and designated-type) would play a different role as a moderator was rejected. Based on the results of the empirical research, policy alternatives of 'Good Regulation' were proposed, which would maintain balance between protection of personal information and big data utilization.

A Comparative Study on the Civil Aviation Law between South and North Korea. (남.북한 항공법 비교연구)

  • Kim, Maeng-Sern;Lee, Si-Hwang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.97-121
    • /
    • 2006
  • Inter-Korean exchanges using civil aviation has been continuing since the temporary direct air route from Pyongyang to Seoul was opened on June 15th, 2000 for the summit meeting with North Korea. In this paper, I analyze the North Korea Aviation law by focusing on the differences with South Korean Aviation law. While South Korean Aviation law is modeled on the Pandect system, North Korean Aviation law can only be understood by looking at North Korea's socialist ideology. Therefore, North Korean Aviation law has some expressions which can hardly be understood. With respect to the source of aviation law, both South and North Korea are in compliance with the Convention on International Civil Aviation (Signed at Chicago, on 7 December, 1944). Thus, they established the aviation law based on the standards and recommendations provided by ICAO. For this reason, they have similar legal systems and composition. From this analysis, a few differences are also derived regarding aircraft ownership, airports, airline liability, aircraft accident investigation organization and aviation insurance. It is important to note that this paper has a particular limitation. Not only is the information about North Korean law very limited, but North Korea also does not provide easy access to its national legal codes. This paper describes the legal comparison of South and North Korea by focusing on the formation and framework of North Korean aviation law.

  • PDF

A Study on Establishment of National Science and Technology Strategy Applying PEST-SWOT-AHP : A Case Study of Fusion R&D (PEST-SWOT-AHP 방법론을 적용한 국가 과학기술 전략 수립에 관한 연구: 핵융합 연구개발 사례를 중심으로)

  • Chang, Hansoo;Choi, Wonjae;Tho, Hyunsoo
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.4
    • /
    • pp.766-782
    • /
    • 2012
  • Science and technology(S&T) are not only advancing, but also the number of stakeholders in those fields are increasing, and so the demands of S&T strategy for a particular field are increasing. In Korea, especially, this tendency is remarkable, and is evidenced by the fact that more than one hundred of S&T strategies have been established and implemented. However, academic attempts to clarify scientific methodologies for establishing S&T strategy have so far been rare. In this paper, a methodology to establish S&T strategies in a particular field is proposed and examined through a case study to determine its usefulness. First, through an analysis of the literature, previous studies on the establishment of a national S&T strategy and its related concepts are reviewed. Also, a representative framework plans, in accordance with relevant legislation and regulations, are reviewed. Meanwhile, the methodology, PEST-SWOT-AHP, is proposed and the features and applications are identified. For the case study, the strategy establishment of a fusion research and development program is performed. In order to apply the PEST-SWOT-AHP tool, an environmental analysis based on the fusion R&D roadmap is conducted. To examine the usefulness of the proposed framework, a national fusion R&D strategy applying PEST-SWOT-AHP is derived. As a result of the case study, four strategies were derived. Those are be the first mover, promotion of basic research and cultivation of manpower, boost commercialization and public acceptance and reinforcing international cooperation.

  • PDF