• Title/Summary/Keyword: 침해

Search Result 2,138, Processing Time 0.025 seconds

A Legal Analysis on the Absence of Provisions Regarding Non-relative Patients in the Act of Decisions-Making in Life-Sustaining Medicine (연명의료결정법에서 무연고자 규정미비 등에 관한 법적 고찰)

  • Moon, Sang Hyuk
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.4
    • /
    • pp.103-128
    • /
    • 2023
  • According to the current act of Decision-Marking in Life-Sustaining Medicine, the decision to withhold or discontinue life-sustaining treatment is primarily based on the wishes of a patient in the dying process. Decision-making regarding life-sustaining treatment for these patients is made by the patient, if he or she is conscious, directly expressing his/her intention for life-sustaining treatment in writing or verbally or by writing an advance medical directive and physician orders for life-sustaining treatment. It can be exercised. On the other hand, if the patient has not written an advance medical directive or physician orders for life-sustaining treatment, the patient's intention can be confirmed with a statement from the patient's family, or a decision to discontinue life-sustaining treatment can be made with the consent of all members of the patient's family. However, in the case of an unrelated patient who has no family or whose family is unknown, if an advance medical directive or physician orders for life-sustaining treatment are not written before hospitalization and a medical condition prevents the patient from expressing his or her opinion, the patient's will cannot be known and the patient cannot be informed. A situation arises where a decision must be made as to whether to continue or discontinue life-sustaining treatment. This study reviewed discussions and measures for unbefriended patients under the current law in order to suggest policy measures for deciding on life-sustaining treatment in the case of unbefriended patients. First, we looked at the application of the adult guardian system, but although an adult guardian can replace consent for medical treatment that infringes on the body, permission from the family court is required in cases where death may occur as a direct result of medical treatment. It cannot be said to be an appropriate solution for patients in the process of dying. Second, in accordance with Article 14 of the Life-Sustaining Treatment Decision Act, we looked at the deliberation of medical institution ethics committees on decisions to discontinue life-sustaining treatment for patients without family ties.Under the current law, the medical institution ethics committee cannot make decisions on discontinuation of life-sustaining treatment for unbefriended patients, so through revision, matters regarding decisions on discontinuation of life-sustaining treatment for unbefriended patients are reflected in Article 14 of the same Act or separate provisions for unbefriended patients are made. It is necessary to establish and amend new provisions. In addition, the medical institution ethics committee must make a decision on unbefriended patients, but if the medical institution cannot make such a decision, there is a need to revise the law so that the public ethics committee can make decisions, such as discontinuing life-sustaining treatment for unbefriended patients.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Problems of Environmental Pollution (환경오염의 세계적인 경향)

  • 송인현
    • Proceedings of the KOR-BRONCHOESO Conference
    • /
    • 1972.03a
    • /
    • pp.3.4-5
    • /
    • 1972
  • 생활수준이 낮은 단계에 있어서는 우선 식량에 대한 수요가 강하다. 인간의 욕구가 만족스럽게 먹는다는 것에 대하여 제일 강하게 발동하는 것이다 그러나 점차 과학기술과 산업과 경제가 발전하여 성장과정에 오르게 되고 소득수준도 향상하게 되면 시장기구를 통해서 구입 할 수 있는 개인의 물적 소비재에 대해서는 점차 충족하게 되며 식량이외에도 의복, 전기기구 및 일용생활용품, 자동차 등에 이르기까지 더욱 고차원의 소비재가 보급하게 되는 것이다. 이렇게 되며는 사람의 욕구는 사적 재물이나 물적 수요에서 점진적으로 공공재나 또는 질적 수요(주택, 생활환경 등)의 방향으로 움직이게 되는 것으로써 여기에 환경오염 또는 공해문제에 대하여 의식하게 된다. 그러나 여기에서 더욱이 문제점이 되는 것은 소득 수준의 향상 과정이란 그 자체가 환경오염의 커다란 요인이라는 점이며 자동차의 급격한 보급과 생활의 편의성을 구하여 집중되는 도시인구의 집적, 높은 소득을 보장하기 위한 생산성 높은 중화학공업의 발전 등등은 그 자체가 환경권이란 사람이 요구하는 고차원의 권리를 침해하는 직접적인 요인이 된다는 것이다. 이와 같은 환경오염이나 공해문제에 대한 세계적인 논의는 이미 시작된 지 오래이지만 현재는 우리의 건강보호를 위해서나 생활환경의 보전을 위해서라는 점에서는 그치는 것이 아니고, 더욱 넓혀서 자연의 보호, 자원의 보호라는 견지로 확대되고 있다. 이와 같은 세계적인 확대된 이해와 이에 대한 대책강구의 제안은 1968년 국제연합의 경제사회이사회에서 스웨덴 정부대표에 의하여 제시되었으며 1969년의 우- 탄트 사무총장의 인간환경에 관한 보고서, 1970년 Nixon 미대통령의 연두일반교서 그리고 1972년 5월 6일 스웨덴의 스톡홀롬에서 개최되는 인간환경회의의 주제 등을 통해서 알 수 있고, 종래의 공해나 생활환경의 오염문제라는 좁은 개념에서가 아니고 인간환경전체의 문제로 다루고 있는 것이다. 즉 환경개발(도시, 산업, 지역개발에 수반된 문제), 환경오염(인위적 행위에 의하여 환경의 대인간조건이 악화하는 문제) 자연ㆍ자원의 보호관리(지하, 해양자원, 동식물, 풍경경치의 문제)란 3개 측면에서 다루고 있는 것이다. 환경오염이란 문제를 중 심하여 보면 환경을 구성하는 기본적인 요소로서 대기, 물, 토지 또는 지각. 그리고 공간의 사대요소로 집약하여 생각할 수 있음으로 이 4요소의 오염이 문제가 되는 것이다. 대기의 오염은 환경의 오염중 가장 널리 알려진, 또 가장 오랜 역사를 가진 오염의 문제로써 이에 속하는 오염인자는 분진, 매연, 유해가스(유황산화물, 불화수소, 염화수소, 질소산화물, 일산 화염소 등) 등 대기의 1차 오염과 1차 존재한 물질이 자외선의 작용으로 변화발생 하는 오존, PAN등 광화학물질이 형성되는 2차적인 오염을 들 수 있다. 기외 카도미움, 연등 유해중금속이나 방사선물질이 대기로부터 토지를 오염시켜서 토지에 서식하는 생물의 오염을 야기케 한다는 점등이 명백하여지고 있으며 대기의 오염은 이런 오염물질이 대기중에서 이동하여 강우에 의한 침강물질의 변화를 일으키게 되며 소위 광역오염문제를 발생케하며 동시에 토지의 토질저하등을 가져오게 한다. 물의 오염은 크게 내육수의 오염과 해양의 오염의 양면으로 나누어 볼 수 있다. 하천의 오염을 방지하고 하천을 보호하기 위한 움직임 역시 환경오염의 역사상 오래된 문제이며 시초에는 인분뇨와의 연결에서 오는 세균에 의한 오염이나 양수 기타 일반하수와의 연결에서 오는 오염에 대비하는 것부터 시작하였지만 근래에는 산업공장폐수에 의한 각종 화학적유해물질과 염료 그리고 석유화학의 발달에 의한 폐유등으로 인한 수질오탁문제가 점차 크게 대두되고 있다. 이것은 측 오염이란 시초에 우리에게 주는 불쾌감이 크므로 이것을 피하자는 것부터 시작하여 인간의 건강을 지키고 각종 사용수를 보존하자는 용수보존으로 그리고 이제는 건강과 용수보존뿐만 아니라 이것이 농림 수산물에 대한 큰 피해를 주게됨으로써 오는 자연환경의 생태계보전의 문제로 확대전환하고 있는 것이다. ?간 특히 해양오염에 대한 문제는 국지적인 것에만 끝이는 것이 아니고 전세계의 해양에 곧 연결되는 것이므로 세계각국의 공통관심사로 등장케 되었으며 이것은 특히 폐유가 유류수송 도중에 해양에 투기되는 유류에 의한 해양의 유막성형에서 오는 기상의 변화와 물피해등이 막심함으로 심각화 되고 있다. 각국이 자국의 해안과 해양을 보호하기 위하여 조치를 서두르고 있는 현시점에서 볼 때에는 이는 국제문제화하고 있으며 세계적인 국제적 협력과 협조의 필요성이 강조되는 좋은 예라 하겠다. 토양의 오염에 있어서는 대기나 수질의 오염이 구국적으로 토양과 관련되고 토양으로 환원되는 것이지만 근래에 많이 보급사용되는 농약과 화학비료의 문제는 토양자체의 오염에만 그치는 것이 아니고 농작물을 식품으로 하여 섭취함으로써 발생되는 인체나 기타생물체의 피해를 고려할 때 더욱 중요한 것이며, 또 토질의 저하를 가져오게 하여 농림생산에 미치는 영향이 적지 않을 것이다. 지반강하는 지각 에 주는 인공적 영향의 대표적인 것으로써 지하수나 지하 천연가스를 채취이용하기 위하여 파들어 감으로써 지반이 침하 하는 것이며 건축물에 대한 영향 특히 풍수해시의 재해를 크게 할 우려가 있는 것이다. 공간에 있어서의 환경오염에는 소음, 진동, 광선, 악취 등이 있다. 이들은 특수한 작업환경의 경우를 제외하고는 건강에 직접적인 큰 피해를 준다고 생각할 수 없으나 소음, 진동, 관선, 악취 등은 일반 일상시민생활에 불쾌나 불안을 줌으로써 안정된 생활을 방해하는 요인이 되는 것이다. 공간의 오염물로써 새로운 주목을 끌게된 것은 도시산업폐기물로써 이들은 대기나 물 또는 토지를 오염시킬 뿐만 아니라 공간을 점령함으로써 도시의 미관이나 기능을 손상케 하는 것이다. 즉 노배폐차의 잔해, 냉장고등고형폐기물등의 재생불가능한 것이나 비니루등 합성물질로 된 용기나 포장 등으로 연소분해 되지 않은 내구소비재가 이에 해당하는 것으로 이는 maker의 양식에 호소하여 그 책임 하에 해결되어야 할 문제로 본다. 이렇듯 환경오염은 각양각색으로 그 오염물질의 주요 발생원인 산업장이나 기타 기관에서의 발생요인을 살펴보며는 다음과 같은 것으로 요약할 수 있다. A. 제도적 요인 1. 관리체재의 미비 2. 관리법규의 미비 3. 책임소재의 불명확 B. 자재적 요인 1. 사용자재의 선택부적 2. 개량대책급 연구의 미흡 C. 기술적 요인 1. 시설의 설계불량, 공정의 결함 2. 시설의 점검, 보전의 불충분 3. 도출물의 취급에 대한 검사부족 4. 발생방지 시설의 미설치, 결함 D. 교육적 요인 1. 오염물질 방제지식의 결여 2. 법규의 오해, 미숙지 E. 경제적 요인 1. 자금부족 2. 융자상의 문제 3. 경제성의 문제 F. 정신적 요인 1. 사회적 도의심의 결여(이기주의) 2. 태만 3. 무지, 무관심 등이다. 따라서 환경오염의 방지란 상기한 문제의 해결에 기대하지 않을 수 없으나 이를 해결하기 위하여는 국내적 국제적 상호협조에 의한 사회각층의 총력적 대책이 시급한 것이다. 이와 같은 환경오염이 단속된다 하며는 미구에 인류의 건강은 물론 그 존립마저 기대하기 어려울 것이며, 현재는 점진적으로 급성피해에 대하여는 그 흥미가 집중되어 그 대비책도 많이 논의되고 있지만 미량의 단속접촉에 의한 만성축적에 관한 문제나 이와 같은 환경오염이 앞으로 태어날 신생률에 대한 영향이나 유전정보에 관한 연구는 장차에 대비하는 문제로써 중요한 것이라 생각된다. 기외에 우려되는 점은 오염방지책을 적극 추진함으로써 올 수 있는 파생적인 문제이다. 즉 오염을 방지하기 위하여 생산기업체가 투자를 하게 되며는 그만큼 생산원가가 상승할 것이며 소비가격도 오를 것이다. 반면 이런 시책에 뒤떨어진 후진국의 값싼 생산국은 자연 수입이 억제 당할 것이며, 이렇게되면 후진국은 무역경쟁에서 큰 상처를 입게될 것이고 뿐만 아니라 선진국에 필요한 오염물질의 발생이 높은 생산기기를 자연후진국에 양도하게 될 것임으로 후진국의 환경오염은 배가할 우려가 있는 것이다. 또 해양오염을 방지할 목적에서와 같이 자국의 해안보호를 위하여 마련된 법의 규제는 타국의 선박운항에 많은 제약을 가하게 될 것이며 이것 역시 시설이 미약한 약소후진국의 선박에 크게 영향을 미치게 될 것임으로 교통, 해운, 무역등을 통한 약소후진국의 경제성장에 제동을 거는 것이 될 것이다. 이렇듯 환경오염의 문제는 환경자체에 대해서만 아니라 부산물적으로 특히 후진국에는 의외 문제를 던져주게 되는 것임으로 환경오염에 대해서는 물론, 전술한 바와 같이 인간환경전체의 문제로써 Nixon 대통령이 말한 결의와 창의와 그리고 자금을 가지고 과감하게 대처해 나가야 할 것이다.

  • PDF

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Studies on Neck Blast Infection of Rice Plant (벼 이삭목도열병(病)의 감염(感染)에 관(關)한 연구(硏究))

  • Kim, Hong Gi;Park, Jong Seong
    • Korean Journal of Agricultural Science
    • /
    • v.12 no.2
    • /
    • pp.206-241
    • /
    • 1985
  • Attempts to search infection period, infection speed in the tissue of neck blast of rice plant, location of inoculum source and effects of several conditions about the leaf sheath of rice plants for neck blast incidence have been made. 1. The most infectious period for neck blast incidence was the booting stage just before heading date, and most of necks have been infected during the booting stage and on heading date. But $Indica{\times}Japonica$ hybrid varieties had shown always high possibility for infection after booting stage. 2. Incubation period for neck blast of rice plants under natural conditions had rather a long period ranging from 10 to 22 days. Under artificial inoculation condition incubation period in the young panicle was shorter than in the old panicle. Panicles that emerged from the sheath of flag leaf had long incubation period, with a low infection rate and they also shown slow infection speed in the tissue. 3. Considering the incubation period of neck blast of rice plant, we assumed that the most effective application periods of chemicals are 5-10 days for immediate effective chemicals and 10-15 days for slow effective chemicals before heading. 4. Infiltration of conidia into the leaf sheath of rice plant carried out by saturation effect with water through the suture of the upper three leaves. The number of conidia observed in the leaf sheath during the booting stage were higher than those in the leaf sheath during other stages. Ligule had protected to infiltrate of conidia into the leaf sheath. 5. When conidia were infiltrated into the leaf sheath, the highest number of attached conidia was observed on the panicle base and panicle axis with hairs and degenerated panicle, which seemed to promote the infection of neck blast. 6. The lowest spore concentration for neck blast incidence was variable with rice varietal groups. $Indica{\times}Japonica$ hybrid varieties were infected easily compared to the Japonica type varieties, especially. The number of spores for neck blast incidence in $Indica{\times}Japonica$ hybrid varieties was less than 100 and disease index was higher also in $Indica{\times}Japonica$ hybrid than in Japonica type varieties. 7. Nitrogen content and silicate content were related with blast incidence in necks of rice plants in the different growing stage changed during growing period. Nitrogen content increased from booting stage to heading date and then decreased gradually as time passes. Silicate content increased from booting stage after heading with time. Change of these content promoted to increase neck blast infection. 8. Conidia moved to rice plant by ascending and desending dispersal and then attached on the rice plant. Conidia transfered horizontally was found very negligible. So we presumed that infection rate of neck blast was very low after emergence of panicle base from the leaf sheath. Also ascending air current by temperature difference between upper and lower side of rice plant seemed to increase the liberation of spores. 9. Conidial number of the blast fungus collected just before and after heading date was closely related with neck blast incidence. Lesions on three leaves from the top were closely related with neck blast incidence, because they had high potential for conidia formation of rice blast fungus and they were direct inoculum sources for neck blast. 10. The condition inside the leaf sheath was very favorable for the incidence of neck blast and the neck blast incidence in the leaf sheath increased as the level of fertilizer applied increased. Therefore, the infection rate of neck blast on the all panicle parts such as panicle base, panicle branches, spikelets, nodes, and internodes inside the leaf sheath didn't show differences due to varietal resistance or fertilizers applied. 11. Except for others among dominant species of fungi in the leaf sheath, only Gerlachia oryzae appeared to promote incidence of neck blast. It was assumed that days for heading of varieties were related with neck blast incidence.

  • PDF