• Title/Summary/Keyword: 적발

Search Result 194, Processing Time 0.039 seconds

The UK Bribery Act 2010 and Measures Needed for Korean Multinational Corporations in the Era of Korea-EU FTA (영국 뇌물수수법(UK Bribery Act 2010) 시행에 따른 한-EU FTA 시대에 한국 다국적기업의 대처방안 관한 연구)

  • Bae, Sungho
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.253-273
    • /
    • 2014
  • The Korea-EU FTA has substantially escalated the volumes of South Korea's export and investment in the United Kingdom since its ratification. Coupling with the FTA effect, the ease of doing business in the United Kingdom will increase even more trade and investment by South Korean multinational corporations. In the meantime, the UK Bribery Act 2010 was enforced to end bribery by individuals and business entities which have close connection with the United Kingdom. The punishment of violating the Act is severe than ever because of "unlimited" fine. Without fully understanding the Act and have compliance measures as described in the Guidance issued by the UK Ministry of Justice, South Korean corporations may risk its whole business. Therefore, this paper will analyze the UK Bribery Act in details to provide critical implications for South Korean corporations under the Korea-EU FTA.

  • PDF

An Empirical Study on Expectation Factors and Certification Intention of ISMS (ISMS 인증 기대 요인 및 인증 의도에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.375-381
    • /
    • 2015
  • In the past few years, data leakage of information assets has become prominent issue. According to the NIS in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment, operation and certification of ISMS, even for private enterprises. The purpose of this study is to examine the factors influencing the certification intention of ISMS using EFA (Exploratory Factor Analysis) and regression analysis. We identified expectation factors for certification of ISMS from 13 elements using EFA (Strengthening practical ability & economic effect factor and Improvement of security level & handling incident factor). Next, we examined that the certification intention of ISMS using regression analysis. As a result of regression analysis, Strengthening practical ability & economic effect factor is not significant for the certification intention of ISMS (p<.05). Also, Improvement of security level & handling incident factor have a significant and positive effect on the certification intention of ISMS (p<.05).

Factors That Influence Digital Contents Piracy (디지털 콘텐츠 저작권 침해의도에 관한 영향요인 연구)

  • Kim, Kyunghee;Kim, Tae Ung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.63-71
    • /
    • 2013
  • This investigates the major factors that impact digital contents piracy in a college environment, mainly because the violation of the copyright is known to occur most often in college environments. Using a theoretical model based on Theory of Reasoned Action, this study examines the causal relationships among the variables of the digital contents piracy behavior. Major research variables include intention to commit piracy, attitude, social influence, fear of legal consequences, enjoyment, perceived easiness, knowledge level, and facilitating conditions. Survey responses from 335 undergraduate and graduate students indicate that the attitude and social influence affect the intention to commit piracy, and that social influence, enjoyment and perceived easiness influence the attitude. But, contrary to our expectation, knowledge level has been found to have no impact on the attitude. Perceived easiness, fear of legal consequences and facilitating conditions have all been shown to affect social influence. As a conclusion, the academic and practical implications of these findings are discussed.

  • PDF

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

An Analysis of Test Results Using the New Fusion Weight Conversion Algorithm for High-speed Weigh-In-Motion System (주행시험을 통한 고속축중기의 융합형 중량환산 알고리즘 효과 분석)

  • Kim, Jong Woo;Jung, Young Woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.4
    • /
    • pp.67-80
    • /
    • 2020
  • High-speed weigh in motion (HS-WIM) is a real-time unmanned system for measuring the weight of a freight-carrying vehicle while it is in motion without controlling vehicle traffic flow or deceleration. In Korea, HS-WIM systems are installed on the national highways and general national ways for pre-selection by law enforcement. In this study, to improve the measurement accuracy of HS-WIM, we devise improvements to the existing integral and peak weight conversion algorithms, and we provide a new fusion algorithm that can be applied to the mat-type HS-WIM. As a result of analyzing vehicle driving tests at a real site, we confirmed the highest level of weight-measuring accuracy.

A theoretical Review on the Relationship between Stimulus-Patterns of Marking on the Road-Surface and Driving-Behavior (Aiming at developing a suitable Model related) (노면표지 자극양상과 운전행동 간의 관련성에 대한 이론적 고찰 (관련된 적정 모델 개발을 목표로))

  • 윤홍섭
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.6
    • /
    • pp.101-110
    • /
    • 2000
  • 본 논문의 목적은 우리들의 현실적 노면표지 형태가 그 강도, 종류 및 출현빈도 측면에서 드러내는 지속적 증대 내지 강화 경향성을 문제점으로 제기하면서, 이런 노면표지 형태와 운전행동 간의 관련성에 대한 심리학적 제반 이론들을 고찰해보고 아울러 여기서 상호 연관적 특성을 밝혀주는 하나의 적절한 모델을 개발해보고자 하는 데에 두었다 이 모델에서는 운전자의 사고예방이나 안전운행이 곡 필요한 수준의 노면표지 자극화(stimulation)를 통해 조성된 쾌적한 교통환경에서 보다 용이하게 가능하다는 점이 전제되고 있다. 우리가 인간행동을 총체적으로나 효과적으로 분석하는 데 있어서는 일반심리적이거나 행동주의적 제반 이론 관점이 다소 미흡하다는 점이 지적되었다. 반면에 보다 거시적이고 종합적인 통찰에 중점을 두고있는 형태주의 심리학이나 장 이론적 시각은 행동분석 시에 비교적 결실적인 것으로 밝혀졌다 노면표지 자극의 양상여하가 운전자에게 스트레스, 정보과부담, 과도한 심리적 각성상태 등으로 인해 부정적인 영향을 미친다는 점에서는 이런 문제점이 환경심리학적 고찰측면에서도 관심의 대상이 되고 있다. \"노면표지 조성화 양 관점 모델\"에서 시사되고 는 터이지만. 이 모델에서의 노면표지 형태가 이론적인 면에서 \"정서-인지적\" 인간관에 근거를 두고있어 궁극적으로 이것이 옳다면, 그것은 곡 필요한 최소한의 수준에 머물러야 한다는 것이다. 올바른 운전행동, 다시 말해 교통법규 준수 행동은 노면표지 양상 측면의 각종 자극적 강화대책보다도 오히려 실효성 있는 교통교육, 확실한 적발 단속과 엄중한 처벌대책에 상대적으로 훨씬 더 큰 비중을 두고있는, 바로 그런 운전자의 의식개혁을 통해 비로소 제대로 정착될 수 있기 때문이다. 이 모델의 타당성 여부는 후속적 실증연구를 통해 해명되어질 수 있을 것이다.

  • PDF

Social Welfare Ethics in the Information Age - Focusing on Dataveillance through Social Welfare Information System - (사회복지정보화의 윤리적 쟁점 - 사회보장정보시스템을 통한 데이터감시를 중심으로-)

  • Kim, Suyoung
    • Korean Journal of Social Welfare
    • /
    • v.68 no.1
    • /
    • pp.193-224
    • /
    • 2016
  • The article aims to discuss ethical issues of social welfare informationisation, focusing on dataveillance through social welfare information system in South Korea. The Korean government plans to upgrade social welfare information system, by strengthening welfare fraud tracking and adding blind spot discovering functions. However, surveillance over poor population's data is inevitable when conducting such investigations. This article reviews current debates on dataveillance. It then conducts a case study on social welfare dataveillance in South Korea, asking what ethical problems lie in the dataveillance in terms of privacy, accuracy, property, and accessibility issues. Subsequently, this paper identifies three fundamental ethical dilemmas of social welfare in the informational age. Finally, it suggests policy alternatives to tackle the ethical problems and dilemmas of social welfare informationisation.

  • PDF

A study on the analysis of customer loan for the credit finance company using classification model (분류모형을 이용한 여신회사 고객대출 분석에 관한 연구)

  • Kim, Tae-Hyung;Kim, Yeong-Hwa
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.3
    • /
    • pp.411-425
    • /
    • 2013
  • The importance and necessity of the credit loan are increasing over time. Also, it is a natural consequence that the increase of the risk for borrower increases the risk of non-performing loan. Thus, we need to predict accurately in order to prevent the loss of a credit loan company. Our final goal is to build reliable and accurate prediction model, so we proceed the following steps: At first, we can get an appropriate sample by using several resampling methods. Second, we can consider variety models and tools to fit our resampling data. Finally, in order to find the best model for our real data, various models were compared and assessed.

심신(心腎)의 상호관계(相互關係)에 대한 동서의학적(東西醫學的) 연구(硏究) -관여심신상호관계적동서의학연구(關於心腎相互關係的東西醫學硏究)-

  • Lee, Yong-Sik;Yun, Chang-Yeol
    • Journal of Korean Medical classics
    • /
    • v.18 no.2 s.29
    • /
    • pp.20-44
    • /
    • 2005
  • 통과한의학화서양의학적원리연구심신적상호관계(通過韓醫學和西洋醫學的原理硏究心腎的相互關係), 득도료여하결론(得到了如下結論) 경연구심신지간재한의학상구유(經硏究心腎之間在韓醫學上具有): 심양여신음유'심신상교'적'수화기제'관계(心陽與腎陰有'心腎相交'的'水火旣濟'關係). 차외환유신양(명문화)여심양(심화)적상호의존관계(此外還有腎陽(命門火)與心陽(心火)的相互依存關係). 우유심장신여신장정적상호의존관계이지유신정충족시(又有心藏神與腎藏精的相互依存關係而只有腎精充足時), 재가이사심주신지적공능유지정상(才可以使心主神志的功能維持正常). 경연구심신지간재서양의학상구유(經硏究心腎之間在西洋醫學上具有): 제일(第一), 심장여신장재해부학상밀절연계(心臟與腎臟在解剖學上密切聯係), 즉종심장좌심실분지출신동맥(卽從心臟左心室分枝出腎動脈), 진이형성신소구등신장적혈관구화모세혈관강(進而形成腎小球等腎臟的血管球和毛細血管綱). 제이(第二), 심장향신장공응혈액(心臟向腎臟供應血液), 신장시인체중접수혈공최다적장기(腎臟是人體中接受血供最多的臟器). 제삼(第三), 심장통과심납소(ANP)적분비(的分泌), 증가신혈류양급신소체여과율(增加腎血流量及腎小體濾過率). 제사(第四), 신장통과신소(腎臟通過腎素)(renin)적분비조절혈압(的分泌調節血壓). 제오(第五), 신공능부전대심장구성부면영향(腎功能不全對心臟構成負面影響). 제육(第六), 심장여신장지간종서양의학적각도고려(心臟與腎臟之間從西洋醫學的角度考慮), 야존재착상생화상극관계(也存在着相生和相克關係). 경연구심신적상호관계재수행중적작용(經硏究心腎的相互關係在修行中的作用), 득출여하결론(得出如下結論): 제일(第一), 수행영인안정심지(修行令人安定心志), 사심화하강(使心火下降). 제이(第二), 수행시적호흡조절조폐금생신수(修行時的呼吸調節助肺金生腎水), 저시소유적수행법도재중시호흡조절적근본이유(這是所有的修行法都在重視呼吸調節的根本理由). 제삼(第三), 수행시발생수승화강(修行時發生水昇火降). 저실제상시의뢰심화중적일음효여신수중적일양효적발동내완성(這實際上是依賴心火中的一陰爻與腎水中的一陽爻的發動來完成). 제사(第四), 통과수행(通過修行), 가이달도보정적목적(可以達到保精的目的), 유차보장생명적지보(由此保藏生命的至寶). 제오(第五), 통과수행(通過修行), 가이달도연정화기(可以達到煉精化氣), 약능주도연정화기(若能做到煉精化氣), 가사인체불누설정액(可使人體不漏泄精液), 반이화기이증강인체기능(反而化氣以增强人體機能), 시보정적유효수단(是保精的有效手段). 수행적관건시'남자수성불누정(修行的關鍵是'男子修成不漏精), 여자수성온불누경(女子修成不漏經)'.

  • PDF

A Natural Scene Statistics Based Publication Classification Algorithm Using Support Vector Machine (서포트 벡터 머신을 이용한 자연 연상 통계 기반 저작물 식별 알고리즘)

  • Song, Hyewon;Kim, Doyoung;Lee, Sanghoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.959-966
    • /
    • 2017
  • Currently, the market of digital contents such as e-books, cartoons and webtoons is growing up, but the copyrights infringement are serious issue due to their distribution through illegal ways. However, the technologies for copyright protection are not developed enough. Therefore, in this paper, we propose the NSS-based publication classification method for copyright protection. Using histogram calculated by NSS, we propose classification method for digital contents using SVM. The proposed algorithm will be useful for copyright protection because it lets us distinguish illegal distributed digital contents more easily.