• Title/Summary/Keyword: Electronic collection

Search Result 436, Processing Time 0.021 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Herbal Medicine for the Treatment of Rosacea: A Systematic Review and Meta-analysis of Randomized Controlled Trials (주사(Rosacea)의 한약 치료에 대한 체계적 문헌고찰 및 메타분석)

  • Kang, Eun-Jeong;Kam, Eun-Young;Kim, Seo-Hee;Yoon, Seok-Yeong;Jeon, Seok-Hee;Choi, Jung-Wha;Kim, Jong-Han;Park, Soo-Yeon;Jung, Min-Yeong
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.34 no.3
    • /
    • pp.27-54
    • /
    • 2021
  • Objectives : This review was conducted to validate the effectiveness and safety of herbal medicine combined with conventional therapy for rosacea. Methods : Randomized controlled trials(RCTs) reporting the effects of herbal medicine treatment on rosacea were searched through eight electronic databases from 2016 to March 17, 2020. This study collection and data extraction were performed by two independent reviews. The Cochrane risk-of-bias tool was used for the evaluation of the risk of bias in all included RCTs. Mean differences(MD) and Risk ratio(RR) of 95% Confidence intervals(Cls) were calculated and data synthesis was conducted using Review Manager(RevMan, ver.5.4) Results : Eighteen RCTs were included and all trials compared the combined therapy of herbal medicine with conventional western therapy to conventional therapy alone. The effective rate of the combination of herbal medicine with western medicine(RR 1.20, 95% CI : 1.13-1.28, p<0.00001, I2=0%), the effective rate of the combination of herbal medicine with laser-based therapy(RR 1.12, 95% CI : 1.04-1.21, p=0.004, I2=18%) and the effective rate of the combination treatment group using herbal medicine, western medicine and external drugs were all statistically higher that of the control group(RR 1.19, 95% CI : 1.11-1.28, p<0.00001, I2=0%). The score of non transient erythema(MD -0.36, 95% CI : -1.01 0.29, p=0.27, I2=93%), flushing(MD -0.69, 95% CI : -0.97, 0.41, p<0.00001, I2=32%), papules or pustules(MD 0.10, 95% CI : -0.15, 0.35 p=0.44, I2=0%) were also seen in the herbal medicine and western medicine combination group. The overall risk of bias of the included studies was some concerns. No serious adverse effects were observed. Conclusions : This review found the safety and effectiveness of the combined therapy of herbal medicine with conventional western therapy for rosacea.

A Study on the Intention to Use the Loan Service of the Mobile-Based Financial Platform (모바일 기반 금융플랫폼의 대출서비스 사용의도에 관한 연구)

  • Lee, Sangho;Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • The purpose of this study was to investigate how the characteristics of mobile-based financial platforms have an impact on the intention to use loan service users. In addition, it was attempted to investigate whether usefulness and ease of use had a mediating effect in the relationship between each characteristic of the mobile financial platform on the intention to use the loan service. Data collection was conducted from March 1 to April 30, 2022, and 200 people participated in the study. Analysis methods were frequency analysis, exploratory factor analysis, reliability analysis, correlation analysis, hierarchical multiple regression analysis, and three-step mediation regression analysis. The research results are as follows. First, the influence of user factors, technical factors, and environmental factors of a financial platform on the intention to use a mobile loan service was found to be ubiquity in user factors, reliability in technical factors, and facilitation conditions in environmental factors. Second, in the relationship between convenience and intention to use user factors, usefulness had a completely mediating effect. Third, in the relationship between reliability of technical factors and intention to use, usefulness showed a partial mediating effect. Fourth, in the relationship between the social impact of environmental factors and facilitation conditions and intention to use, the usefulness showed a partial mediating effect. Fifth, ease of use showed a completely mediating effect in the relationship between convenience and intention of use of user factors. Sixth, in the relationship between reliability of technical factors and intention to use, ease of use showed a partial mediating effect. Seventh, in the relationship between the social impact of environmental factors and intention to use, ease of use showed a partial mediating effect, and in the relationship between facilitation conditions and intention to use, ease of use showed a fully mediating effect. Through this study, we tried to present basic data on the determinants of the user's acceptable intention to use the mobile loan service.

Effectiveness Analysis of HOT Lane and Application Scheme for Korean Environment (HOT차로 운영에 대한 효과분석 및 국내활용방안)

  • Choi, Kee Choo;Kim, Jin Howan;Oh, Seung Hwoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.1D
    • /
    • pp.25-32
    • /
    • 2009
  • Currently, various types of TDM (Transportation Demand Management) policies are being studied and implemented in an attempt to overcome the limitations of supply oriented policies. In this context, this paper addressed issues of effectiveness and possible domestic implementation of the HOT lane. The possible site of implementation selected for this simulation study is part of the Kyung-bu freeway, where a dedicated bus lane is currently being operated. Minimum length of distance required in between interchanges and access points of the HOT lane for vehicles to safely enter and exit the lane, and traffic management policies for effectively managing the weaving traffic trying to enter and exit the HOT lane were presented. A 5.2km section of freeway from Ki-heuing IC to Suwon IC and a 8.3km section from Hak-uei JC to Pan-gyo JC have been selected as possible sites of implementation for the HOT lane, in which congestion occurs regularly due to the high level of travel demand. VISSIM simulation program has been used to analyze the effects of the HOT lane under the assumption that one-lane HOT lane has been put into operation in these sections and that the lane change rate were in between 5% to 30%. The results of each possible scenario have proven that overall travel speed on the general lanes have increased as well by 1.57~2.62km/h after the implementation of the HOT lane. It is meaningful that this study could serve as a basic reference data for possible follow-up studies on the HOT lane as one effective method of TDM policies. Considering that the bus travel rate would continue increase and assuming the improvement in travel speed on general lanes, similar case study can be implemented where gaps between buses on bus lane are available, as a possible alternative of efficient bus lane management policies.

Management and Use of Oral History Archives on Forced Mobilization -Centering on oral history archives collected by the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea- (강제동원 구술자료의 관리와 활용 -일제강점하강제동원피해진상규명위원회 소장 구술자료를 중심으로-)

  • Kwon, Mi-Hyun
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.303-339
    • /
    • 2007
  • "The damage incurred from forced mobilization under the Japanese Imperialism" means the life, physical, and property damage suffered by those who were forced to lead a life as soldiers, civilians attached to the military, laborers, and comfort women forcibly mobilized by the Japanese Imperialists during the period between the Manchurian Incident and the Pacific War. Up to the present time, every effort to restore the history on such a compulsory mobilization-borne damage has been made by the damaged parties, bereaved families, civil organizations, and academic circles concerned; as a result, on March 5, 2004, Disclosure act of Forced Mobilization under the Japanese Imperialism[part of it was partially revised on May 17, 2007]was officially established and proclaimed. On the basis of this law, the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea[Compulsory Mobilization Commission hence after] was launched under the jurisdiction of the Prime Minister on November 10, 2004. Since February 1, 2005, this organ has begun its work with the aim of looking into the real aspects of damage incurred from compulsory mobilization under the Japanese Imperialism, by which making the historical truth open to the world. The major business of this organ is to receive the damage report and investigation of the reported damage[examination of the alleged victims and bereaved families, and decision-making], receipt of the application for the fact-finding & fact finding; fact finding and matters impossible to make judgment; correction of a family register subsequent to the damage judgement; collection & analysis of data concerning compulsory mobilization at home and from abroad and writing up of a report; exhumation of the remains, remains saving, their repatriation, and building project for historical records hall and museum & memorial place, etc. The Truth Commission on Compulsory Mobilization has dug out and collected a variety of records to meet the examination of the damage and fact finding business. As is often the case with other history of damage, the records which had already been made open to the public or have been newly dug out usually have their limits to ascertaining of the diverse historical context involved in compulsory mobilization in their quantity or quality. Of course, there may happen a case where the interested parties' story can fill the vacancy of records or has its foundational value more than its related record itself. The Truth Commission on Compulsory mobilization generated a variety of oral history records through oral interviews with the alleged damage-suffered survivors and puts those data to use for examination business, attempting to make use of those data for public use while managing those on a systematic method. The Truth Commission on compulsory mobilization-possessed oral history archives were generated based on a drastic planning from the beginning of their generation, and induced digital medium-based production of those data while bearing the conveniences of their management and usage in mind from the stage of production. In addition, in order to surpass the limits of the oral history archives produced in the process of the investigating process, this organ conducted several special training sessions for the interviewees and let the interviewees leave their real context in time of their oral testimony in an interview journal. The Truth Commission on compulsory mobilization isn't equipped with an extra records management system for the management of the collected archives. The digital archives are generated through the management system of the real aspects of damage and electronic approval system, and they plays a role in registering and searching the produced, collected, and contributed records. The oral history archives are registered at the digital archive and preserved together with real records. The collected oral history archives are technically classified at the same time of their registration and given a proper number for registration, classification, and keeping. The Truth Commission on compulsory mobilization has continued its publication of oral history archives collection for the positive use of them and is also planning on producing an image-based matters. The oral history archives collected by this organ are produced, managed and used in as positive a way as possible surpassing the limits produced in the process of investigation business and budgetary deficits as well as the absence of records management system, etc. as the form of time-limit structure. The accumulated oral history archives, if a historical records hall and museum should be built as regulated in Disclosure act of forced mobilization, would be more systematically managed and used for the public users.