• Title/Summary/Keyword: Infringement Prevention

Search Result 38, Processing Time 0.025 seconds

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

Comparative Analysis of Traffic Accident Severity of Two-Wheeled Vehicles Using XGBoost (XGBoost를 활용한 이륜자동차 교통사고 심각도 비교분석)

  • Kwon, Cheol woo;Chang, Hyun ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.1-12
    • /
    • 2021
  • Emergence of the COVID 19 pandemic has resulted in a sharp increase in the number of two-wheeler vehicular traffic accidents, prompting the introduction of numerous efforts for their prevention. This study applied XGBoost to determine the factors that affect severity of two-wheeled vehicular traffic accidents, by examining data collected over the past 10 years and analyzing the influence of each factor. Among the total factors assessed, variables affecting the severity of traffic accidents were overwhelmingly high in cases of signal violations, followed by the age group of drivers (60s or older), factors pertaining only to the car, and cases of centerline infringement. Based on the research results, a reasonable legal reform plan was proposed to prevent serious traffic accidents and strengthen safety management of two-wheeled vehicles. Based on the research results, we propose a reasonable legal reform plan to prevent serious traffic accidents and strengthen safety management of two-wheeled vehicles.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

Mechanism of aging and prevention (노화의 기전과 예방)

  • Kim, Jay Sik
    • IMMUNE NETWORK
    • /
    • v.1 no.2
    • /
    • pp.104-108
    • /
    • 2001
  • Aging is a senescence and defined as a normal physiologic and structural alterations in almost all organ systems with age. As Leonard Hayflick, one of the first gerontologists to propose a theory of biologic aging, indicated that a theory of aging or longevity satisfies the changes of above conditions to be universal, progressive, intrinsic and deleterious. Although a number of theories have been proposed, it is now clear that cell aging (cell senescence) is multifactorial. No single mechanism can account for the many varied manifestations of biological aging. Many theories have been proposed in attempt to understand and explain the process of aging. Aging is effected in individual by genetic factors, diet, social conditions, and the occurrence of age-related diseases as diabetes, hypertension, and arthritis. It involves an endogenous molecular program of cellular senescence as well as continuous exposure throughout life to adverse exogenous influences, leading to progressive infringement on the cell's survivability so called wear and tear. So we could say the basic mechanism of aging depends on the irreversible and universal processes at cellular and molecular level. The immediate cause of these changes is probably an interference in the function of cell's macromolecules-DNA, RNA, and cell proteins-and in the flow of information between these macromolecules. The crucial questions, unanswered at present, concerns what causes these changes in truth. Common theories of aging are able to classify as followings for the easy comprehension. 1. Biological, 1) molecular theories - a. error theory, b. programmed aging theory, c. somatic mutation theory, d. transcription theory, e. run-out-of program theory, 2) cellular theories - a. wear and tear theory, b. cross-link theory, c. clinker theory, d. free radical theory, e. waste product theory, 3) system level theory-a. immunologic/autoimmune theory, 4) others - a. telomere theory, b. rate of living theory, c. stress theory, etc. Prevention of aging is theoretically depending on the cause or theory of aging. However no single theory is available and no definite method of delaying the aging process is possible by this moment. The most popular action is anti-oxidant therapy using vitamin E and C, melatonin and DHEA, etc. Another proposal for the reverse of life-span is TCP-17 and IL-16 administration from the mouse bone marrow B cell line study for the immunoglobulin VDJ rearrangement with RAG-1 and RAG-2. Recently conclusional suggestion for the extending of maximum life-span thought to be the calory restriction.

  • PDF

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

Concerning the Constitution Court's constitutional decision and the direction of supplemental legislation concerning Article 33 paragraph 8 of the Medical Service Act - With a focus on legitimacy of a system that prohibits multiple opening of medical instituion, in the content of 2014Hun-Ba212, August 29, 2019, 2014Hun-Ga15, 2015Hun-Ma561, 2016Hun-Ba21(amalgamation), Constitutional Court of Korea - ('의료법 제33조 제8항 관련 헌법재판소의 합헌결정'에 대한 평가 및 보완 입법 방향에 대하여 -헌법재판소 2019. 8. 29. 2014헌바212, 2014헌가15, 2015헌마561, 2016헌바21(병합) 결정의 내용 중 의료기관 복수 개설금지 제도의 당위성 및 필요성을 중심으로-)

  • KIM, JOON RAE
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.3
    • /
    • pp.143-174
    • /
    • 2019
  • Our Constitution obliges the state to protect the health of the people, and the Medical Law, which embodied Constitution, sets out in detail the matters related to open the medical institution, and one of them is to prohibit the operation of multiple medical institutions. By the way, virtually multiple medical institutions could be opened and operated because the Supreme Court had interpreted that several medical institutions could be opened if medical activities were not performed directly at the additional medical institution which was opened under the another doctor's license. However, some health care providers opened the several medical institutions with another doctor's license for the purpose of the maximization of profit, and did illegal medical cares like the unfair luring of patients, over-treatment, and commission treatment. Also, realistic problems such as the infringed health rights have arisen. Accordingly, lawmakers had come to amend the Medical Law to readjust the system of opening for medical institution so that medical personnel could not open or operate more than one medical institution for any reason. For this reason, the Constitutional Court recently declared a constitutional decision through a long period of in-depth deliberation because the constitutional petition and the adjudication on the constitutionality of statutes had been filed on whether Article 33 paragraph 8 of the revised medical law is unconstitutional. The Constitutional Court acknowledged the "justice of purpose" in view of the importance of public medical institutions, of the prevention from seduction of for-profit patients and from over-treatment, and of the fact that health care should not be the object of commercial transactions. Given the risk that medical personnel might be subject to outside capital, the concern that the holder of the medical institution's opening certificate and the actual operator may be separated, the principle that the human body and life should not be just a means, and the current system's inability to identify over-treatment, it also acknowledged the 'minimum infringement'. Furthermore, The Constitutional Court judged it is constitutional in compliance with the principle of restricting fundamental rights, such as 'balance of legal interests'. In this regard, legislative complements are needed in order to effectively prevent the for-profit management and the over-treatment the Constitutional Court is concerned about. In this regard, consumer groups actively support the need for legislation, and health care providers groups also agree on the need for legislation. Therefore, the legislators should respect the recent Constitutional Court's decision and in the near future complete the complementary legislation to reflect the people's interests.