• Title/Summary/Keyword: Industrial Technology Protection

Search Result 454, Processing Time 0.025 seconds

Unfair Contractual Clauses for the Transfer of Technology (국제기술이전계약상(國際技術移轉契約上)의 부공정조항(不公正條項)에 관한 연구(硏究))

  • Seo, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.107-132
    • /
    • 1999
  • The technology transfer agreements, which transfer technology from industrialized countries to developing countries, are subjected to control and restrictions in many developing countries in order to protect national interests. The licensors endeavour, therefore, to ensure that their activities fit satisfactorily into the technological policies and plans of the host countries, and contribute to the development of national scientific and technological potential, including the establishment and improvement in host countries of their capacity to innovate. Secondly, the licensors adopt in the course of their business activities practices which permit the rapid diffusion of technologies with due regard to the protection of industrial and intellectual property rights. Thirdly, the licensors endeavour to grant licenses for the use of industrial property rights or to otherwise transfer technology on reasonable terms and conditions.

  • PDF

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security (방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안)

  • Park, Heungsoon;Kim, Seyong;Kwon, Hyukjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.111-122
    • /
    • 2021
  • With the spread of technology in the 4th Industrial Revolution, the defense industry in South Korea is getting developed into an industrial structure in which high-tech technologies are concentrated. As the importance of defense technology has gradually increased, the government has enacted the Defense Technology Security Act and required to build a protection system for institutions that possess or manage defense technology. In order for the target institution to introduce a protection system, it is necessary to identify the defense technologies that are protected and to ensure systematic data management. In order to cope with this, we derived master data items for data management and analyzed the implementation types of defense technology master data system suitable for the defense industry environments. The derived method identified the defense technology master data, such as primary and secondary master data, and through AHP analysis, Co-existence type was suitable as the target model for the master data management system. We expect that stronger defense technology security policy will be implemented through the defense technology MDM system.

Personal Information Protection Using Digital Twins in the Fourth Industrial Revolution (4차 산업혁명 시대의 디지털트윈을 활용한 개인정보보호)

  • Kim, Yong-Hun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.279-285
    • /
    • 2020
  • In the era of the Fourth Industrial Revolution, there are many sensors around. People and things are connected to these sensors to the internet. Numerous connected sensors produce the latest data in seconds, and these data are stacked with big data of unimaginable size. Because personal information can be contained in any place of data produced, device and system protection are needed. Digital twins are virtual models that accurately reflect the status information of physical assets and systems that utilize them. The characteristic of digital twin is that digital twin itself has temporal and structural identity enough to represent the object of reality. In the virtual environment the reproduced reality, it continuously simulates and it virtuals of the point of time or the future, the replica can be created. Therefore, this study cited factors threatening personal information in the era of the Fourth Industrial Revolution. And proposed using digital twin technology that can simulate in real-time to overcome the risk of personal information hacking.

EDUCATION AND TRAINING IN RADIATION PROTECTION IN KOREA: CURRENT STATUS AND IMPROVEMENTS

  • Son, Miyeon;Kim, Hyunkee;Nam, Youngmi;Nam, Jongsoo;Lee, Ki-Bog
    • Nuclear Engineering and Technology
    • /
    • v.44 no.7
    • /
    • pp.825-830
    • /
    • 2012
  • Radiation and its various industrial applications have been growing at approximately 10 percent per year for the past decade in Korea. As a result, the importance of the Education and Training (E&T) in radiation protection is of upmost importance. This paper is intended to investigate the present status of the E&T on radiation protection and safety in Korea and to draw up the improvements of the E&T courses required for building the national radiation safety infrastructure. For these purposes, the E&T data from the six major domestic organizations providing radiation protection training courses were investigated and analyzed. Each of the organizations is offering several kinds of E&T courses based on their own specific functions. These organizations have administrative facilities equipped with the latest technology for E&T in radiation protection. The E&T courses mainly cover the training courses for radiation workers, radiological emergency staff, license applicants, license holders, and regulatory staff. In 2010, a total of 58 E&T courses were carried out across six organizations. The conclusions make a number of observations highlighting challenges such as: establishing a formal feedback mechanism, introducing more practical training sessions, developing training courses tailored to the job categories and target audiences, and designing education and training courses in radiation protection that comply with current obligations as well as future requirements.

Evaluation of Genetic Diversity and Population Structure Analysis among Germplasm of Agaricus bisporus by SSR Markers

  • An, Hyejin;Lee, Hwa-Yong;Shin, Hyeran;Bang, Jun Hyoung;Han, Seahee;Oh, Youn-Lee;Jang, Kab-Yeul;Cho, Hyunwoo;Hyun, Tae Kyung;Sung, Jwakyung;So, Yoon-Sup;Jo, Ick-Hyun;Chung, Jong-Wook
    • Mycobiology
    • /
    • v.49 no.4
    • /
    • pp.376-384
    • /
    • 2021
  • Agaricus bisporus is a popular edible mushroom that is cultivated worldwide. Due to its secondary homothallic nature, cultivated A. bisporus strains have low genetic diversity, and breeding novel strains is challenging. The aim of this study was to investigate the genetic diversity and population structure of globally collected A. bisporus strains using simple sequence repeat (SSR) markers. Agaricus bisporus strains were divided based on genetic distance-based groups and model-based subpopulations. The major allele frequency (MAF), number of genotypes (NG), number of alleles (NA), observed heterozygosity (HO), expected heterozygosity (HE), and polymorphic information content (PIC) were calculated, and genetic distance, population structure, genetic differentiation, and Hardy-Weinberg equilibrium (HWE) were assessed. Strains were divided into two groups by distance-based analysis and into three subpopulations by model-based analysis. Strains in subpopulations POP A and POP B were included in Group I, and strains in subpopulation POP C were included in Group II. Genetic differentiation between strains was 99%. Marker AB-gSSR-1057 in Group II and subpopulation POP C was confirmed to be in HWE. These results will enhance A. bisporus breeding programs and support the protection of genetic resources.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.

A Study on the Algorithm for Multi-Functional Protection Devices in Distribution Systems with New Energy Sources (신 에너지전원이 연계된 배전계통의 통합 보호기기의 알고리즘 개발에 관한 연구)

  • Yoon, Gi-Gab;Kang, Dae-Hoon;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2253-2260
    • /
    • 2009
  • The typical distribution systems have the power flow from distribution substations (sources) to customers (load) only as one direction. However, in the case where new energy power sources are connected to distribution systems, the output variations of new energy sources to distribution systems, which is so called reverse power flow, may cause the bi-directional power flow. So, the reverse power flow has severe impacts on typical power system, for example power quality problems, protection coordination problems, and so on. Therefore, this paper proposes the algorithm for Multi-functional protection devices in distribution systems in the case where new energy sources are interconnected. The proposed algorithm is verified to show the effectiveness by simulating and experimenting the prototype systems.