• Title/Summary/Keyword: Information Protection Policy

Search Result 539, Processing Time 0.024 seconds

In about Solution for Improvement in the Private Security Sector research (민간경비 구성요인에 따른 개선방안에 관한 연구)

  • Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.265-282
    • /
    • 2008
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Evaluation of Eco-friendliness for Tourist Complex Projects by EA-INDEX (EA-INDEX를 활용한 관광단지 개발사업의 친환경성 평가)

  • Seul-Ki Song;Jihyeon Park;Hyun-Jin Choi
    • Journal of Environmental Impact Assessment
    • /
    • v.32 no.2
    • /
    • pp.146-156
    • /
    • 2023
  • Since the tourism complex development projects is promoted for areas with good natural environment and excellent landscapes, it has s significant environmental impact on the surrounding area. Therefore, this study investigated the current status and various environmental influences of tourist complex based on environmental impact assessment reports from 2012 to 2021. Based on the results of the current status analysis of the development projects, EA-INDEX for the tourism complex development projects was developed and applied to comprehensively and quantitatively analyze various environmental impacts. Through this, we investigated eco-friendliness of the development projects by year in the natural environment conservation sector, resource conservation sector, and living environment protection sector. As a result we found that the tourism complex development projects were carried out in a way that increases eco-friendliness over the past ten years, especially in in the natural environment conservation sector. On the other hand, in the case of resource conservation, it has been confirmed that eco-friendliness is decreasing, so it is necessary to make efforts to improve it when establishing new development plans in the future. It is expected that the result of this study will be useful for identifying the development trend and environmental impact of development projects. If an analysis is made that synthesizes information such as policy events and social issues related to development projects in the future, it is also expected that a broader explanation will be possible to identify trends in development projects using EA-INDEX.

The New Social Contract and the Digital Bill of Rights : Focusing on Political and Social Context and Institutionalization (새로운 사회계약과 디지털 권리장전: 정치·사회적 맥락과 제도화를 중심으로)

  • Jo, Gye-Won
    • Informatization Policy
    • /
    • v.31 no.1
    • /
    • pp.53-71
    • /
    • 2024
  • Digital transformation calls for a new social contract that must transform the existing norms and paradigms of our society. Digital constitutionalism is a way of building new order through a new social contract and is an ideology that aims to establish and ensure a normative framework for the protection of fundamental rights and balance of power in the digital environment. The Internet/Digital Bill of Rights is a representative example of constitutionalization based on this ideology. Initially, it took the form of an informal, non-binding declaration led by civil society organizations or various stakeholders, setting forth normative principles adapted to the changing nature of digital society. More recently, they have taken the form of formal charters, declarations, or laws containing principles at the national or regional level. The "Digital Bill of Rights" proposed by the Korean government can be seen as an example of this trend, but it does not fully reflect the recent trend of Internet/Digital Bills of Rights in terms of substantive and procedural legitimacy. Even if the government provides a certain normative direction, it needs to be combined with a concrete action plan in each area to create a balance of norms with digital technologies and industries instead of simply being a "declaration".

Legal Issues and Regulatory Discussions in Generative AI (생성형 AI의 법적 문제와 규제 논의 동향)

  • Kim, Beop-Yeon
    • Informatization Policy
    • /
    • v.31 no.3
    • /
    • pp.3-33
    • /
    • 2024
  • This paper summarizes the legal problems and issues raised in relation to generative AI. In addition, we looked at what regulatory discussions individual countries or international organizations have in order to solve or respond to these issues or to minimize the risks posed by generative AI. Infringement of individual basic rights raised by generative AI, the emergence and control of new crimes, monopolization of specific markets and environmental issues are mainly discussed, and although there are some differences in the necessity and direction of regulation, most countries seem to have similar views. Regarding AI, the issues that are currently being raised have been discussed continuously from the beginning of its appearance. Although certain issues have been discussed relatively much, there are some differences between countries, and situations that require consideration of phenomena different from the past are emerging. It seems that regulations and policies are being refined according to the situation of individual countries. In a situation where various issues are rapidly emerging and changing, measures to minimize the risk of AI and to enjoy the utility and benefits of AI through the use of safe AI should be sought. It will be necessary to continuously identify and analyze international trends and reorganize AI-related regulations and detailed policies suitable for Korea.

Analysis of Adolescent Awareness of Radiation: Marking the First Anniversary of the Fukushima Nuclear Accident (청소년의 방사선 인식도 분석: 일본 후쿠시마 원전사고 1주년 계기)

  • Park, Bang-Ju
    • Journal of Radiation Protection and Research
    • /
    • v.37 no.2
    • /
    • pp.75-83
    • /
    • 2012
  • Marking the first anniversary of the Fukushima nuclear accident, which took place on March 11th, 2011, the level of adolescent awareness and understanding of radiation was surveyed, and the results were then compared with those for adults with the same questionnaires conducted at similar times. A qualitative survey and frequency analysis were made for the design of the study methodology. Those surveyed were limited to 3rd grade middle school students, 15 years of age, who are the future generation. The questionnaire, which is a survey tool, was directly distributed to the students and 2,217 answers were analysed. The questionnaires were composed of 40 questions, and it was found that Cronbach's coefficient was high with 'self awareness of radiation' at 0.494, 'risk of radiation' at 0.843, 'benefit of radiation' at 0.748, 'radiological safety control' at 0.692, 'information sources of radiation' at 0.819, and 'impacts of Fukushima accident'. The results of the survey analysis showed that the students' knowledge of radiation was not very high with 67.4 points (69.5 points for adults) calculated on a maximum scale of 100 points (converted points). The impacts of the Fukushima nuclear accident were found to be less significant to adolescents than adults, and the rate of answer of "so" or " very so" in the following questions demonstrates this well. It was also shown that the impacts of the Fukushima accident to adolescents were comparatively low with 27.0% (38.9% for adults) on the question of "attitude changed against nuclear power due to the Fukushima accident," 65.7%(86.6% for adults) on the question of "the damages from the Fukushima accident was immeasurably huge," and 65.0% (86.3% for adults) on "the Fukushima accident contributed to raising awareness on the safety of nuclear power plants". The adolescents had a high rate of "average" answers on most of the questions compared with adults, and it can be construed that this resulted from adolescent awareness of radiation not being firmly rooted on themselves. This study was the first of its kind for surveying adolescents regarding the level of awareness of radiation after the Fukushima accident, and the results were compared with the survey results of adults, and they are expected to greatly contribute toward establishing a radiation policy by the government in the future.

Some Considerations on Aviation Insurance : With a focus on coverage of aviation insurance (항공보험에 대한 약간의 고찰 -항공보험의 담보범위를 중심으로)

  • Kim, Sun-Ihee;Jung, Da-Eun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.43-77
    • /
    • 2010
  • The development of the aviation industry has exponentially increased the volume of passengers and cargo and gradually expanded the damage scope of all kinds of accidents in the process of transportation. As a result, the need for aviation insurance has accordingly grown bigger and bigger every day. That is why most nations have a law to force mandatory insurance on the aviation industry. However, the Montreal Convention of 1999, which Korea also signed and today has the most extensive effect in the international civil aviation community, offers no clear interpretations about the coverage of aviation insurance along with the Air Transport Business Promotion Act of Korea. The advanced nations of air transport business such as EU, the U. S. A. and Canada prescribe the coverage of aviation insurance and have a law that makes it mandatory for all the passengers and third parties to cover air carrier's liability. EU requires them to include cargo and baggage in scope of coverage, and the U. S. A. and Canada recommend insuring by having a shipper receive a written notice containing information about whether the concerned cargo is insured or not. Making the scope of coverage of aviation insurance clear by law serves several purposes including diversifying risks for air transport companies, providing the victims with enough protection, observing the international accountability required in the air transport industry, and promoting the productive and sustainable growth of the aviation industry. Thus problems with Korea's aviation insurance should be resolved by clearly stating the coverage of aviation insurance that the Korean air carriers and operators need to insure according to the current state of Korea's air transport by consulting the legislations of the advanced nations in air transports. and enacting a law to comprehensively govern Korea's aviation insurance.

  • PDF

The Problem of Space Debris and the Environmental Protection in Outer Space Law (우주폐기물과 지구 및 우주환경의 보호)

  • Lee, Young Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.205-237
    • /
    • 2014
  • Last 50 years there were a lot of space subjects launched by space activities of many states and these activities also had created tremendous, significant space debris contaminating the environment of outer space. The large number of space debris which are surrounding the earth have the serious possibilities of destroying a satellite or causing huge threat to the space vehicles. For example, Chinese anti-satellite missile test was conducted by China on January 11, 2007. As a consequence a Chinese weather satellite was destroyed by a kinetic kill vehicle traveling with a speed of 8 km/s in the opposite direction. Anti-satellite missile tests like this,contribute to the formation of enormous orbital space debris which can remain in orbit for many years and could interfere with future space activity (Kessler Syndrome). The test is the largest recorded creation of space debris in history with at least 2,317 pieces of trackable size (golf ball size and larger) and an estimated 150,000 debris particles and more. Several nations responded negatively to the test and highlighted the serious consequences of engaging in the militarization of space. The timing and occasion aroused the suspicion of its demonstration of anti-satellite (ASAT) capabilities following the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris. Therefore this breakup seemed to serve as a momentum of the UN Space Debris Mitigation Guidelines and the background of the EU initiatives for the International Code of Conduct for Outer Space Activities. The UN Space Debris Mitigation Guidelines thus adopted contain many technical elements that all the States involved in the outer space activities are expected to observe to produce least space debris from the moment of design of their launchers and satellites until the end of satellite life. Although the norms are on the voluntary basis which is normal in the current international space law environment where any attempt to formulate binding international rules has to face opposition and sometimes unnecessary screening from many corners of numerous countries. Nevertheless, because of common concerns of space-faring countries, the Guidelines could be adopted smoothly and are believed faithfully followed by most countries. It is a rare success story of international cooperation in the area of outer space. The EU has proposed an International Code of Conduct for Outer Space Activities as a transparency and confidence-building measure. It is designed to enhance the safety, security and sustainability of activities in outer space. The purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security. Of the space issues, the space debris reduction and the space traffic management require some urgent attention. But the current legal instruments of the outer space do not have any binding rules to be applied thereto despite the incresing activities on the outer space. We need to start somewhere sometime soon before it's too late with the chaotic situation. In this article, with a view point of this problem, focused on the the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris and tried to analyse the issues of space debris reduction.

A Study on the Stereotype of ICT SMEs' R&D: Empirical Evidence from Korea (ICT 중소기업 R&D의 스테레오타입에 대한 연구 : 한국의 사례를 중심으로)

  • Jun, Seung-pyo;Choi, San;Jung, JaeOong
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.334-367
    • /
    • 2017
  • The ICT industry has been the main driver of Korea's economy with international competitiveness and is expected to be the growth engine that will revitalize the currently depressed economy. A broad range of different perspectives and opinions on the industry exist in Korea and overseas. Some of these are stereotypes, not all of which are based on objective evidence. Stereotypes refer to widely-held fixed opinions on a specific group and do not necessarily have negative connotations. However, they should not be viewed lightly because they can substantially affect decision-making process. In this regard, this study sought to review the stereotypes of ICT industry and identify objective and relative stereotypes. In the study, a decision-tree analysis was conducted on a survey result of 3,300 small and medium-sized enterprises (SMEs) in order to identify Korean ICT companies' characteristics that distinguish them from other technology companies. The decision-tree analysis, a data mining process based on machine learning, took a total of 291 variables into account in 10 subjects such as: corporate business in general, technology development activities as well as organization and people in technology development. Identifying the variables that distinguish ICT companies from other technology companies with the decision-tree analysis, the study then came up with a list of objective stereotypes of ICT companies. The findings from the stereotypes of Korean ICT companies are as follows. First, the companies are in need of technology policies that help R&D planning and market penetration. Second, policies must better support the companies working to sell new products or explore new business. Third, the companies need policies that support secure protection of development outcomes and proper management of IP rights. Fourth, the administrative procedures related to governmental support for ICT companies' R&D projects must be simplified. It is hoped that the outcome of this study will provide meaningful guidance in establishment, implementation and evaluation of technology policies for ICT SMEs, particularly to policymakers or researchers in relevant government agencies who determine R&D policies for ICT SMEs.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF