• Title/Summary/Keyword: 정보보호활동

Search Result 536, Processing Time 0.029 seconds

A Study on the Establishment of desirable Model for Licensed Private Investigation Service System (공인탐정제도의 올바른 모델설정에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.249-270
    • /
    • 2009
  • There have been great demands for various private searches and collecting information activities. but in korea it is still banned to supply private investigation service and to use the term 'private investigation'. So establishment of desirable model for private investigation service system is essential factor in strategic approaching for privatization of policing. In most developed countries private investigation service system is generally permitted and various methods to solve the side effects of that are considered. It is necessary to revise more the Security Business Law to introduce private investigation service system so that the dispute on determining how to do and what to do. It looks like that police agrees with the introduction of the private investigation service system because this could be an option when it comes to the job that its members can take after retirement and because this system helpful their own work. Actually Korea government have tried to prepare the law enactment of the private investigation service system since 1999 but have been failed. This study focuses on implementing the suitable system for private investigation service in Korea, which includes the consideration of the logical validity of the introduction by comparing with other foreign private investigation service system. We should make research and effort to cope with such as a partial amendment about the problem and the side effect that can be happened in a beginning stage of system trial.

  • PDF

A study on invention.intellectual property education content reflection status and needs analysis in secondary vocational education (중등단계 직업교육에서의 발명.지식재산 교육내용 반영 실태 및 요구 분석 연구)

  • Lee, Byung-Wook;Lee, Chan-Joo;Lee, Sang-Hyun
    • 대한공업교육학회지
    • /
    • v.39 no.2
    • /
    • pp.1-18
    • /
    • 2014
  • This study took existing invention intellectual property related textbooks being utilized in secondary vocational education, analyzed the formation status of 'key learning elements' reflection ratio and drew optimum key learning elements formation ratio by invention intellectual property education content required in secondary vocational education in the future. For this, the study task was set up as 'what kind and how much of invention intellectual property key learning elements are in the invention intellectual property textbook education content now and what is the desirable ratio of each key learning elements in the future'. To resolve this task, 3 specialists analyzed the invention intellectual property education content reflection status and optimum reflection ratio by invention intellectual property education content required in the future is suggested by Delphi survey. The results of this study are as following. First, the result of analysis on invention intellectual property key learning elements included in the invention patent recognition books being utilized in secondary vocational education was that the books included all key learning elements; however, some textbooks have the trend of concentrating in D area (problem-solving activities). Second, the result of analysis on the reflection ratio by invention intellectual property education content area in the invention patent recognition books being utilized in secondary vocational education was that there was the trend in most textbooks that they concentrate in intellectual property creation area; while some textbooks deal with intellectual property protection area and intellectual property utilization area. Regarding by achievement type, knowledge area was main in all textbooks. Meanwhile, function area is dealt in invention patent basic, invention and problem-solving and design textbooks. Attitude area is not dealt or is dealt insufficiently in most textbooks. Third, the optimum reflection ratio of invention intellectual property education key learning elements required in secondary vocational education in the future as obtained by specialists' delphi survey was that it is necessary to decrease D (problem-solving activities) 17.7% area, E(invention fusion knowledge) 2.9% area, K(patent application) 6.9% and L(patent information investigation) area 9.6%. Regarding the optimum reflection ratio of invention intellectual property education content, it is suggested that the invention literacy area 3.1%, intellectual property creation area 4.5% and intellectual property protection area 10.6% would be decreased; while intellectual property utilization area 17.7% would be increased. Regarding optimum reflection ratio of achievement type, it is suggested that knowledge area 52% would be decreased; while function area 32.3% and attitude area 19.6% would be increased.

History of Guard System during the Period of Military Rule in the Goryeo Dynasty (고려 무신집권기 호위제도의 경호학적 고찰)

  • Lee, Sung-Jin;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.233-258
    • /
    • 2013
  • In the early days of the Goryeo Dynasty, the royal guard was comprised of the central regular army in the 2-gun-6-wi system, and Nasungeomgun was in charge of the security inside the palace. However, the military system became disorganized during the period of military rule and the royal guard had to rely on military subjects. The military officials suppressed the civil ministers centering on Jungbang, the guarding organization close to the King to incapacitate the royal authority and control the state affairs. When the rule of the three leaders of the military rule became short-lived and Dae-seung Gyeong is raised to the ruler, he organized a do-or-die squad comprised of a hundred and more people for his personal safety, and this became the first dobang. Dobang was disassembled after Dae-seung Gyeong died of disease, but under the rule of Chung-heon Choe, Dae-seung Gyeong's dobang was revived and reinforced into 'Yukbeon Dobang' to provide the ruler with personal protection and intensify the ruling system, and it was quite a large organization with more refined system. Yukbeon Dobang was expanded and reinforced into Naeoedobang under the rule of Woo Choe, the son of Chung-heon Choe, and it was enhanced even more into Dobang Samsipyukbeon System under the rule of the grandson, Hang Choe. Dobang can be considered as the guard organization in modern sense, and it collected information and surveyed the area where guarding is required and house troops that belonged to Naedobang eliminated the risks that may follow afterwards to make assurance doubly sure for guarding. The Choe's regime established Mabyeolcho as a private guard organization in addition to dobang, and this formed the cavalry and infantry units with dobang. Yabyeolcho organized by Woo Choe in the reign of King Gojong was divided into Joabyeolcho and Ubyeolcho, and later Sineuigun was integrated with them to form Sambyeolcho. Originally, Yabyeolcho was established under the rule of Woo Choe to prevent crime in the evening, but after Sineuigun was organized with the ones who were captured by Mongolian army but escaped, in other words when Sambyeolcho was organized, the organization displayed much broader influence by covering military and police affairs as well as punishment and imprisonment. The guarding organization during the Period of Military Rule in the Goryeo Dynasty did not have strict distinction between official guard and personal guard. The private guard in modern days which is the equivalent of personal guard is characterized by its commerciality, however, house troops and the members of dobang did not seem to pursued profit. The guard organization during the period of military rule started from dobang which was organized for personal safety but gradually developed publicness through the participation of civil ministers and expansion, and later it played the pivotal role for social security serving official purpose up to the level where the distinction between official and private activities was blurred during the period of Sambyeolcho.

  • PDF

The Variation of Indoor Air Quality in Nursing Home

  • Ji, Dong-Ha;Choi, Mi-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.117-124
    • /
    • 2020
  • In this paper, we proposed a plan to maintain comfortable indoor air quality in nursing homes by suggesting ways to reduce items temporarily exceeding the reference values through real-time concentration variation analysis of indoor air quality. Five items including PM10, CO2, CO, VOC, and Radon are measured at nursing homes in spring (April) and autumn (September) was carried out and all of the measured items were analyzed to satisfy the criteria set by the Indoor Air Quality Control Act. As a result of the analysis of the real-time concentration change, the concentration of CO2 was close to the reference value based on the number of occupants in the sick room. Due to the disinfectant (alcohol) used to disinfect and the auxiliary tools (adhesive) used in the operation of the program such as making and coloring, it was analyzed to temporarily exceed the standard value in the hall. In conclusion, it is possible to provide pleasant indoor air quality and contribute to securing the nursing home's competitiveness if periodic ventilation, natural disinfectant and eco-friendly product are used in consideration of the thermal environment.

Biological Characteristics and Current Status of Nutria (Myocastor coypus) Introduced in Jeju Island (제주도에 도입된 뉴트리아(Myocastor coypus)의 생물학적 특성 및 서식 현황)

  • Kim, Ga-Ram;Oh, Hong-Shik
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • The study was carried out to understand the inhabiting status and biological features of nutria (Myocastor coypus) in the Jeju Island from May, 2013 to August, 2016. Five individuals were captured by traps and two individuals were collected in dead. Of the 7 individuals, those whose bio-information could not be known were excluded to perform autopsy of the rest of them. The results from morphological, cranial and anatomical analyses, it was found that the females achieved sexual maturation but had no breeding experience. An adult male showed similar sizes to those found in the Korean Peninsula. After collecting the 7 individuals in 2013, 1 nutria individual was filmed by the scouting camera in May, 2014 but not captured. The long-term investigation of the research area found no inhibiting individual. It is deemed the nutria was either died of natural death or migrated. In order to establish a proper nutria control, the environmental characteristics of Jeju Island should be considered where indigenous and introduced species coexist in a limited space. Our findings will provide helpful information for understanding biological features of nutria and planning protection program of natural ecosystems of Jeju Island.

A Study on Improvement Plan for Selecting Boundary Areas to Respond to Chemical Accidents and Terrorism (화학물질 사고·테러 대응을 위한 경계구역 선정 개선방안 연구)

  • Jeon, Byeong-Han;Kim, Hyun-Sub;Lee, Hyun-Seung;Park, Choon-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.60-66
    • /
    • 2020
  • This paper presents a method for improving the selection of boundary areas suitable for Korea's situation based on domestic and foreign case studies on the establishment of boundary areas to protect people and the environment from chemical substances in response to chemical accidents and chemical terrorism. Currently, various related ministries are divided into hot zones, warm zones, and cold zones in common, but in specific areas, they are used in different ways in terms of terminology utilization. Therefore, it was suggested that the boundary areas be divided into four zones: hot zone, warm zone, cold zone, and safety zone. In addition, the terms warm zone and safety zone should be re-established. The existing ERPG acute exposure standard does not take into account various exposure times. Therefore, it is unsuitable for long-term exposure, so the priority of application should be AEGL, ERPG, PAC, and IDLHs. The CARIS information provision method is classified into substances that can or cannot be diffused or classified as indoor leaks. In addition, the wind direction trust line and the ERG's initial separation distance and protective action distance are expressed together so that they can be used for accident responses.

A Comparative Review of the Satellite Remote Sensing (위성원격탐사에 관한 비교법적 고찰)

  • Kim, Young-Ju
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.203-319
    • /
    • 2020
  • The regulation of satellite remote sensing is generally included with the scope of statutes governing outer space activities. But not all states opted for dedicated satellite remote sensing regulation. The decision whether to do so depends in part on the specific capabilities of national satellite remote sensing programs. Five states that have dedicated statutes governing operations with remote sensing data are the United States, with its developed Landsat regime (the Land Remote Sensing Policy Act of 1992, LRSPA), Canada, with its Remote Sensing Systems Act, Germany, with its Satellite Data Securities Protection Act (SatDSiG), France, with its Law on Space Operations (LOS), Japan, with its Act on Ensuring Appropriate Handling of Satellite Remote Sensing Data. The major purpose of this article is to shed light on some legal issues surrounding remote sensing activities by comparative review. The paper analyzes international conventions or soft law and national law and policies relating to satellite remote sensing. It also offers some implications and suggestions for regulations of satellite remote sensing operations and satellite data.

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

Proposal for Amendment of the Basic Environmental Policy Act ('BEPA') Article 31 (환경정책기본법 제31조 무과실책임규정의 개정방안)

  • Koh, Moon-Hyun
    • Journal of Environmental Policy
    • /
    • v.8 no.4
    • /
    • pp.125-147
    • /
    • 2009
  • The Basic Environmental Policy Act (BEPA) (Law No. 4257 effective 1. August 1990) sets forth the basic policies and administrative framework for environmental preservation, leaving more detailed regulations, and emission controls to separate laws targeting air, water, and solid waste, etc. The BEPA Article 31 adopts an unprecedented strict liability standard for damages as an absolute liability. The BEPA Article 31 provides for liability as follows. If a company is alleged to have caused damage through pollution of the environment, it will be liable for damages unless it can show that the pollution did not cause damages, or that it did not actually cause pollution. If the company did cause pollution, and if the pollution is the cause for the damages in question, the company will be liable irrespective of whether it was negligent or otherwise at fault. If there are two or more companies involved in the pollution, but it is unclear which company caused the damages, all of the companies will be jointly and severally liable for the damages. In this paper, the author attempts to uncover the problems of BEPA Article 31 and then seeks desirable amendments by comparing it to the German Environmental Liability Act. First, it will be necessary to provide definitions of 'companies etc.'. Second, it will be necessary to enumerate the kinds of company facilities. Third, it will be necessary to provide exclusionary clauses on material damages. Fourth, it will be necessary to show 'presumption of cause and effect'. Fifth, it will be necessary to provide a clause on 'right to information'. Sixth, it will be necessary to provide a clause for force majeure. Seventh, it will be necessary to take measures to secure abundant liability for damages which can be caused by the owner of the facility, the potential polluter. Finally, it is appropriate that Korea now legislate an Environmental Liability Act akin to the German Environmental Liability Act.

  • PDF

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.