• Title/Summary/Keyword: National Assembly Security

Search Result 67, Processing Time 0.026 seconds

Network Analysis of Korean legislators using Bipartite Network Projection (입법 발의안을 통한 대한민국 국회의원 네트워크 분석)

  • Lee, Ji-Yeon;Jo, Hyun-Joo;Yoon, Ji Won
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.103-110
    • /
    • 2014
  • In study we analyze the network about the legislators in Korean National Assembly. We focused on 17th National Assembly since there were full of important changes in composition. Mutual cooperation is necessary to pass the bills beyond their given mission in legislation. In order to find out the relationship of legislators based on the introducing bills, total 5728 bills in 17th National Assembly, we used bipartite network projection. We can find who is a highly influential legislator and the difference between a ruling party and a main opposition party in aspects of cooperative behavior.

WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly (WACFI: 웹 어셈블리에서의 간접호출 명령어 보호를 위한 코드 계측 기술)

  • Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.753-762
    • /
    • 2021
  • WebAssembly(WASM) is a low-level instruction format that can be run in a web environment. Since WASM has a excellent performance, various web applications use webassembly. However, according to our security analysis WASM has a security pitfall related to control flow integrity (CFI) for indirect calls. To address the problem in this paper we propose a new code instrumentation scheme to protect indirect calls, named WACFI. Specifically WACFI enhances a CFI technique for indirect call in WASM based on source code anlysis and binary instrumentation. To test the feasibility of WACFI, we applied WACFI to a sound-encoding application. According to our experimental results WACFI only adds 2.75% overhead on the execution time while protecting indirect calls safely.

Network Analysis of Legislators and Committees based on bills in the 18th and 19th National Assembly, Korea (제 18대, 19대 대표발의안을 중심으로 본 국회의원 및 상임위원회의 입법활동에 대한 네트워크 분석)

  • Lee, Ji-Yeon;Jo, Hyun-Ju;Yoon, Ji Won
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.11-25
    • /
    • 2014
  • The purpose of this study is analyzing the network of the National Assembly based on the bill data in 18th, 19th National Assembly lawmakers submit to Committees. By using bipartite projection we find out a strong committee and understand the relationship of committees. We focused on bills that ten or more of the legislators propose and compare between the first opposition party and the ruling party, which accounts for more than 80% of the overall structure of the National Assembly. We point out an influential legislator and committee in the network. This result presents which committees and lawmakers have a significant effect on process of legislation. This work gives a reasonable source as qualified to judge whether the committee and legislators group enact positively or not.

A Study on Evaluation of Information Security Awareness and Security Level about Legislative Authority (입법기관의 보안성 평가와 정보보호 인식 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.269-273
    • /
    • 2010
  • 7.7 DDoS incident due to recent events and the emerging importance of privacy and Privacy laws are being discussed in the National Assembly. In this study, Legislative Assembly Secretariat support organization focused on using the system, such as the Internet network and the administrative, technical and physical security elements on the status of confidentiality, availability, integrity and security criteria to identify and follow and We are analyzing. In addition, the Internet, including network and use the system primarily for use, Legislative support agency, The National Assembly Secretariat staff awareness about information security and privacy on the survey for compliance with codes of conduct and We are analyzing. Through this analysis of legislative support agencies' security status, and social responsibility as an institution will wish to encourage the role.

  • PDF

A Study on the Direction for Revision of the Assembly and Demonstration Act - 'around the Article 6 and Article 8 of 2016 Revised Assembly and Demonstration Act' - (집회 및 시위에 관한 법률 개정 방향에 관한 연구 - '2016 개정 집시법 제6조·제8조를 중심으로 -)

  • Cho, Se-hee
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.39-63
    • /
    • 2016
  • After its decision of 'constitutional nonconformity' about a night assembly on September 24th, 2009, then the Korean Constitutional Court decided the 'limited violation of constitution' saying, 'Even a night demonstration should be allowed to be held up to the midnight' on March 27th, 20104. Since such a decision, the revision of Assembly and Demonstration Act has not been done, and the revised act is currently pending on the National Assembly on October, 2016. Amid the controversy about the 'Legislative Deficiency', some articles of the Assembly and Demonstration Act are revised and created like the imposition of the fine about a ghost assembly and the notice duty of fact to hold an assembly, the police superintendent's recommendation about the assembly place and partitioned assembly holding by time in order to protect the people's basic rights and convenience. However, this revised bill of Assembly & Demonstration Act limits the duty of assembly withdrawal report only to overlapping assemblies and a police superintendent can only recommend about the partition of assembly place and time, but has not a certain authority to forcibly enforce, so it is expected that the recommendation will be eventually ended to a formal procedure. And as this revised act has no punishment article concerning the violation of the notice duty within 1 hour before holding an assembly in this revised act, so there is a problem that the police can't force an assembly to follow the article. This study proposed some political suggestions concerning the articles to be supplemented and corrected in the Assembly & Demonstration Act after analyzing its articles around its 2016 revised Act. The Assembly & Demonstration Act has several problems to be continually corrected and supplemented further including the matter of 'Night Assembly & Demonstration' which is in the condition of 'Legislative Deficiency' since 2009.

  • PDF

A Study on Difference between Private Security and Private Investigation (민간경비업과 민간조사업의 차이점 연구)

  • Son, Dong-Woon;Jo, Sung-Gu;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.295-317
    • /
    • 2014
  • In advanced country, private investigation system is made up of private security and in domestic, there is growing need constantly to introduce private investigation but it is not passed until now in assembly so a messenger office which is run illegally is growing because of demand by subdividing business areas. That is a proof that both the police and private security don't meet demand of public peace to the public. that's why the police has own businesses like a investigation, traffic, intelligence, crime prevention and private security's business areas are limited like a facilities security, escort security, protection of a person, machine security, special security as the Private Security Act. This study attempts to know structural difference between private security system and private investigation system in case private investigation system becomes one of the private security. on some question, respondents reply like that private security and private investigation is very different(71.2%), different(22.4%), average(6.3%), similar(0.0%), very similar(0.0%). the result seems like respondents recognize private security and private investigation as different businesses. In the result of non-quantity analysis, the differences seem like a business character, expense, business scope, public power, scale of organization, object of threat, legislation. In domestic, effort to legislate private investigation system has undergone difficulty since congressman Ha Soon Bong's motion in 1999 and today, congressman Yoon Jae Ok's All Amendments Private Security Act and congressman Song Young Geun's Private Inveswtigation Act are pending in assembly. This study's result is intended for examining difference in exploration between private security and private investigation and then there is going to propose to the policy in case private investigation system is passed in assembly by amending Private Security Act like congressman Yoon Jea Ok's All Amendment Private Security Act.

  • PDF

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Change of Regional Clusters on Assembly and Demonstration (집회시위 군집변화에 대한 연구)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.293-313
    • /
    • 2017
  • The purpose of this study is to analyze the changes of regional clusters of national 16 areas on the assembly & demonstration in 2010 and 2015. The results of this study were as follows by using hierarchical cluster analysis. First, the regional clusters on the assembly & demonstration in 2010 were divided into three clusters in the first step: (1) Gwangju, Chungnam, Incheon, Chungbuk, Gyeongbuk, Daegu, Gangwon, Jeju, Daejeon, (2) Jeonnam, Gyeongnam, Busan, Jeonbuk, Ulsan, Gyeonggi, (3) Seoul. Second, the regional clusters on the assembly & demonstration in 2015 were divided into three clusters in the first step: (1) Ulsan, Gangwon, Chungbuk, Chungnam, Incheon, Gyeongbuk, Jeonnam, Gwangju, Jeju, Daegu, Daejeon, (2) Busan, Jeonbuk, Gyeongnam, (3) Seoul, Gyunggi. Third, The regional clusters on the assembly & demonstration were Busan, Jeonbuk, Gyeongnam of 'assembly & demonstration management area(labor related)', and Seoul, Gyeonggi of 'assembly & demonstration frequency areas' in 2015. This suggests that policing policies related to assembly & demonstration can be established and implemented flexibly in consideration of the degree of increase and decrease in assembly & demonstration by districts. Furthermore, it will be helpful to manage assembly & demonstration based on the 'police for human rights'.

  • PDF

The Causal Relationship between Supervisor Transformational Leadership and Employee Self-leadership Affected by Organizational Support - with a Focus on the Security Organization at the Korean National Assembly - (국회 경호.경비조직의 지원에 따른 상사의 변혁적 리더십과 셀프리더십의 인과관계)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.37-62
    • /
    • 2013
  • One of the organizational characteristics in the modern society is the emphasis placed upon individual autonomy in an effort to promote and develop each member's morale as well as the efficiency in personnel management. Therefore, it can be understood that the importance of "Self" is recognized in work places and the leadership of supervisors and each member's self-management and control are also emphasized, leading to establishment of the "Self-leadership" concept. In this study, the effect of the Transformational Leadership of the supervisors on the subordinates' Self-leadership was analyzed and the causal factor of organizational support in the relationship between Transformational Leadership and Self-leadership was defined. A survey was conducted with 182 security officials at the National Assembly and the following results were obtained. First, Transformational Leadership had a positive effect on Self-leadership and the Transformational Leadership of the supervisors had a statistically significant impact on the organizational support awareness. Furthermore, organizational support showed a statistically significant mediator effect in the relationship between the Transformational Leadership of the supervisors and the Self-leadership of the subordinates. Finally, future directions in regard to the personnel management system were suggested.

  • PDF

A Study on a Plan to Make Public of the Closed Minutes and the Non-published Minutes at the National Assembly of R.O.K (국회 비공개회의록 및 불게제 부분의 공표 방안 연구)

  • Kim, Jang-hwan
    • The Korean Journal of Archival Studies
    • /
    • no.35
    • /
    • pp.93-132
    • /
    • 2013
  • It is principle that the National Assembly Minutes are open to the general public based on the Constitution of the Republic of Korea. However, it will not be released to the public when the minutes are produced at a meeting held privately -the closed minutes- and the parts of the minutes are not published because of 'the demands on keeping confidential of the Chairman of the National Assembly or needs for the National Security' based on the National Assembly Act article 118 clause 1. These two minutes infringe the democratic rights, the public's rights to know seriously by reason that there are no procedures to disclose to the public. Especially the non-published parts of the minutes are highly likely in breach of the constitution. This paper will deal with the regulations and guidelines related to the disclosure of the closed minutes focusing on the United States and the United Kingdom where developing countries on the parliamentary democracy. Then, it is suggested placing an emphasis on the legal aspects that the plans to make public of the closed minutes and non published parts of the minutes based on the reviewed results of the committee of the National Assembly Archives and the initiative proposed by the member of the National Assembly, Jung Chang-rae in the last 2004.