• Title/Summary/Keyword: Privilege

Search Result 200, Processing Time 0.028 seconds

Privilege and Immunity of Information and Data from Aviation Safety Program in Unites States (미국 항공안전데이터 프로그램의 비공개 특권과 제재 면제에 관한 연구)

  • Moon, Joon-Jo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.2
    • /
    • pp.137-172
    • /
    • 2008
  • The earliest safety data programs, the FDR and CVR, were electronic reporting systems that generate data "automatically." The FDR program, originally instituted in 1958, had no publicly available restrictions for protections against sanctions by the FAA or an airline, although there are agreements and union contracts forbidding the use of FDR data for FAA enforcement actions. This FDR program still has the least formalized protections. With the advent of the CVR program in 1966, the precursor to the current FAR 91.25 was already in place, having been promulgated in 1964. It stated that the FAA would not use CVR data for enforcement actions. In 1982, Congress began restricting the disclosure of the CVR tape and transcripts. Congress added further clarification of the availability of discovery in civil litigation in 1994. Thus, the CVR data have more definitive protections in place than do FDR data. The ASRS was the first non-automatic reporting system; and built into its original design in 1975 was a promise of limited protection from enforcement sanctions. That promise was further codified in an FAR in 1979. As with the CVR, from its inception, the ASRS had some protections built in for the person who might have had a safety problem. However, the program did not (and to this day does not) explicitly deal with issues of use by airlines, litigants, or the public media, although it appears that airlines will either take a non-punitive stance if an ASRS report is filed, or the airline may ignore the fact that it has been filed at all. The FAA worked with several U.S. airlines in the early 1990s on developing ASAP programs, and the FAA issued an Advisory Circular about the program in 1997. From its inception, the ASAP program contained some FAA enforcement protections and company discipline protections, although some protection against litigation disclosure and public disclosure was not added until 2003, when FAA Order 8000.82 was promulgated, placing the program under the protections of FAR 193, which had been added in 2001. The FOQA program, when it was first instituted through a demonstration program in 1995, did not contain protections against sanctions. Now, however, the FAA cannot take enforcement action based on FOQA safety data, and an airline is limited to "corrective action" under the program. Union contracts can exclude FOQA from the realm of disciplinary action, although airline practice may be for airlines to require retraining if there is no contract in place forbidding it. The data is protected against disclosure for litigation and public media purposes by FAA Order 8000.81, issued in 2003, which placed FOQA under the protections of FAR 193. The figure on the next page shows when each program began, and when each statute, regulation, or order became effective for that program.

  • PDF

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

A Pilot Study of Rural Women Leader's Psychological Trap for Getting Some Informations to Reinvent One's Life (여성농업인 리더의 생애경험을 통한 심리적 장애요인에 관한 소고)

  • Kim, Gyung-Mee;Lee, Jin-Young;Choi, Yoon-Ji
    • Journal of Agricultural Extension & Community Development
    • /
    • v.13 no.1
    • /
    • pp.149-171
    • /
    • 2006
  • This is a pilot study on rural women's psychological trap to define some obstacles to self directed learning. During few decades, according to major crop of each farm household has shifted from rice to other crops like as vegetables, fruits, horticultures, livestock, etc., women's role or labor sharing of women in farming has been also increased. Although women are important human resources, till now, there is no a research or an approach to rural woman on the view of individual human being. Therefore this study will contribute to understand woman's behavior or attitudes based on psychological description at each person's experiences. For this study, the data was collected from 23 women leaders who participated in a training course in 2005, through the scale of Jeffrey E. Young & Janet S. Klosko which was developed to improvement of one's repetitious behavior based on cognitive psychological care. It was categorized into 11types of psychological trap of one person, named as follows; (1) trap of being deserted by someone (2) trap of disbelief and being ill-treated (3) trap of weakness (4) trap of dependence (5) trap of emotional deprivation (6) trap of feelings of alienation among society (7) trap of deficiency (8) trap of anxiety to failure (9) trap of subordination (10) trap of the merciless standard by self-estimation (11) trap of the sense of privilege. From the data, the average age of subjects was 52.8years old, and the educational back of subjects was higher than general rural women. In both of the trap of weakness and the trap of the merciless standard by self-estimation, the ratio of over and 4 point score of 6 points was 71.4% and 76.2%. It means most of subjects have experienced fear of unexpected calamity(trap of weakness), and mental press hard for efforts to meet one's ideal standard(trap of the merciless standard by self-estimation). Especially the trap of the merciless standard by self-estimation may have relation with rural women's over burden from farming and local society activities.

  • PDF

A Study on the Auction Schemes of Fish Commodities in the Koheung Region (고흥지역 수산물 경매시장의 특성에 관한 연구)

  • 강연실
    • The Journal of Fisheries Business Administration
    • /
    • v.29 no.2
    • /
    • pp.111-141
    • /
    • 1998
  • Why are auctions so prevalent in fisheries fields\ulcorner One answer is, perhaps, that fisheries products have no standard value. The price of any catch of fish (at least of fish destined for the fresh fish market) depends on the demand and supply conditions at a specific moment of time, influenced by prospective market developments and prices must be remade for each transaction. There are various auction schemes including written-bid method in Korea. It is difficult to make decision the application of auction selling in market distribution. One reason is the absence of adequate data on which to base firm statements. There is very little precise information about the relative volume handled by auction scheme as compared with other sales schemes Because of the paucity reliable data, one must depend largely on qualitative in attempting to above this problem. This paper is designed to examine which auction scheme is more efficient as a economic tool by introducing the three auctions, as samples, utilized in Koheung peninsula. Koheung coast with abundant fisheries resource, locates on the Middle-South part in Korea and has three auction firm operating by fisheries cooperatives. fur selling of dry fish included sea weed, live fish and fresh fish respectively, As a result, 1 found that there are three interesting auction schemes as follow : 1. More than one winners are selected as buyers. The highest bidder can at first get fishes he wants to buy, second winner can get surplus fishes after the highest bidder employes one's privilege with the highest pay, and next winner would be a buyer if fishes would be left in sequence after being sold with higher price. Every fisherman can sell one' s fishes with equal unit price if he delivery it to the winner within one day. Therefore, all the vendors feel they are equal members of fisheries cooperation. 2. Written-bid pricing on the cover of handy book. It is easy to write and to erase the figure more than on the small black board, and is convenient also to keep in the pocket. 3. Auctioning on the fixed platform with fixed fish tank is a very fast auction scheme in spite of short displaying time. Auctioneer presides bidding at one place on the fixed platform, instead of moving, vendors should carry a container of live fishes in the fish tank into showing table in front of would-be buyers and auctioneer. Although the applicability of the auction system to a marketing problem depends in part on subjective considerations by those making decision, basically it is a matter of comparative economic efficiency. In general, if the scheme maximizes returns in relation to the effort expanded by both buyers and sellers, it will be utilized. If it does not, a more efficiency may take place over a period of time, but, even more important, those making decisions may become aware of the potentialities of new schemes. Therefore, in order to applicate the three interesting auction schemes introduced in this paper to other fisheries market, it is necessary not only to analyze many other auction schemes but also to compare the economic efficiency those schemes utilizing in other fisheries market.

  • PDF

Group Key Management Scheme for Access Control with Reactive Approach (접근 제어를 위한 반응적 방식의 그룹키 관리 기법)

  • Kim, Hee-Youl;Lee, Youn-Ho;Park, Yong-Su;Yoon, Hyun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.589-598
    • /
    • 2007
  • In the group communication which has multiple data streams and various access privileges, it is necessary to provide group access control. The group members having the same access privilege are classified into one class, and the classes form a hierarchy based on the access relations. Then each class is assigned to a secret key. In the previous schemes, a single logical key graph is constructed from the hierarchy and each member always holds all secret keys of the classes he can access in the proactive manner. Thus, higher-privileged members hold more keys then lower-privileged members. However, if the hierarchy is large, each member manages too many keys and the size of multicast message in rekeying increases in proportion to the size of the hierarchy. Moreover, most of the members access a small portion of multiple data streams simultaneously. Therefore, it is redundant to receive rekeying message and update the keys in which he is not currently interested. In this paper, we present a new key management scheme that takes a reactive approach in which each member obtains the key of a data stream only when he wants to access the stream. Each member holds and updates only the key of the class he belongs. If he wants to get the key of other class, he derives it from his key and the public parameter. Proposed scheme considerable reduces the costs for rekeying, especially in the group where access relations are very complex and the hierarchy is large. Moreover, the scheme has another advantage that it easily reflects the change of access relations.

A Study on the Symbolism of Buttns of 18.19 Century (18.19세기 단추의 상징성에 관한 연구)

  • 강두옥;김진구
    • Journal of the Korean Society of Costume
    • /
    • v.18
    • /
    • pp.225-245
    • /
    • 1992
  • The button is a part of costume. But it has the symbolism of costume in itself and reflects the sociocultural phenomena. The purpose of this study is to clarify symbolism of button of eighteenth and nineteenth century which had been most popular. This study is based on the library research. Through this paper, I reached conclusions as follows. The symbolism of button is found in various ways. First, Aesthetics is found in material, color, design and type etc. of button. Especially Indian silver button of abstract type shows well distinctive aesthetics of Indians. Second, The material and the number of button vary with one's status and show off one's privilege. I England, there was the rule, in which the symbol of the King was a silver button with a figure of lion. The livery button represents his family to the nble and shows the meaning of obedience to the servant. Third, The button on uniform varies with ranks. This is prominent in a uniform of a soldier or a policeman. Fourth Material and craft of button show one's economic position. The button gives a Very good picture of what one's life was then. Precious button with gold, silver, and other jewels is an index to one's property. Fifth, The button of political event is used for election, which shows the face and the name of runner. Besides that, there were buttons designed for the flag or the slogan for political event. Sixth, The button of social event reflects a social phase of life in war or revolution, for example, it satirizes the burning of the Bastille in the French Revolution, or the taxpayer bearing the burden. Seventh, the buttons that symbolize a historic event are made to commemorante an epochal and critical occurrence or an important person's birth, death, visit to some place, etc., Eighth, there were well-known persons, for example, a president, a king, a queen, a singer, or an artist in the buton of personality. Nineth, The button of one's company shows one's community in figures or pictures, that is, this button is used as a symbol one's community. Tenth, The button varies with the development of science and technology. It gives a very good picture of what it was and what the technological level was. Eleventh, The buttons that symmbolize on occupation most impressively are uniform buttons. Symbolic marks related with a particular occupation are carved on the buttons of compary employees' uniforms. Twelfth, Various natural phenomena are designed to appear on buttons, Some express themselves simply as they are, and others appear as a symbolic form such as environmental relationship between men and nature, four seasons, a constellation and all other natural things occurring during a year. Finally, The button of rebus is a motto expressed by a combination with objects figures, letters, words, or phrases.

  • PDF

Face Image in the Cinema : Based on the Early Silent Film Period (영화 속 얼굴 이미지 : 초기 무성영화시기를 중심으로)

  • Hwang, Ji-eun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.776-783
    • /
    • 2016
  • Discussion of facial image of the movie starts is recognized as an art movie that started from silent film period. Critical discussions on the facial image initiated with the emergence of 'close-up' are performed in the context to claim the superiority of close-up format. Therefore, the trend of critical discussion on the facial image differs from two perspectives to perceive close-up in this era. The first perspective is to privilege both face and close-up since close-up is recognized as the unique tool to realize the face considering close-up as the independent body to have new aesthetic feasibility of the movie. The second perspective is to consider close-up as one of the plots in the movie language to complete its narration. In this case, it is perceived as just a short, which has no differentiation from the others, as long as the facial image does not interfere the completeness of the narration, because the characteristics of close-up to highlight the subject more than the other short is not recognized as the unique form to complete the movie, and because it has the meaning only when the subject and the format aim to maintain the completeness of the narration.

Effects of FasL Expression in Oral Squamous Cell Cancer

  • Fang, Li;Sun, Lin;Hu, Fang-Fang;Chen, Qiao-Er
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.1
    • /
    • pp.281-285
    • /
    • 2013
  • Purpose: To probe the role of FasL in cell apoptosis in oral squamous cell carcinomas (OSCCs). Methods: The expression of Fas/FasL was assessed in 10 cases of normal oral epithelium, 38 cases of OSCC and tumor infiltrating lymphocytes (TIL), and 11 cases of metastatic lymph nodes by immunohistochemistry. Apoptosis of tumor cells and TIL was detected by terminal deoxynucleotidyl transferase-mediated dUTP-biotin nick end labeling assay (TUNEL). FasL-induction of T cell apoptosis was tested by co-culture assay in vitro with SCC-9 and Jurkat T cells. Results: The 10 cases of normal oral epithelium all demonstrated extensive expression of Fas, the positive rate being largely down-regulated in OSCC (21/38) (P<0.05) compared to the normal (10/10). At the same time, the positive rate of FasL significantly increased in OSCC (P<0.05) especially those with lymph node metastasis (P<0.05). The positive rates of Fas in well and middle differentiated OSCC were higher than those in poor differentiated OSCC (P<0.05). The AI of tumor cells in Fas-positive OSCC was remarkably higher than that in Fas-negative OSCC (P<0.01), with a positive correlation between Fas expression and cell differentiation as well as apoptosis (r=0.68, P<0.01). The AI of tumor cells in FasL positive OSCC was remarkably lower than that in control while the AI of TIL was higher than in FasL negative OSCC (P<0.05). The AI of tumor cells reversely correlated with that of TIL (r = -0. 72, P<0.05). It was found that SCC-9 cells expressing functional FasL could induce apoptosis of Jurkat cells as demonstrated by co-culture assays. As a conclusion, it is evident that OSCC cells expressing FasL can induce apoptosis in Fas-expressing T cells. Conclusions: In progression of OSCC, expression of the Fas/FasL changes significantly. The results suggest that FasL is a mediator of immune privilege in OSCC and may serve as an marker for predicting malignant change in oral tissues.

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

A study on the developmental ideas of Franchising industry in Korea (프랜차이즈 산업의 발전방안)

  • Son, Yong-Seung;Han, Chul-Yong;Ahn, Kwan-Young
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.177-187
    • /
    • 2012
  • Franchising has long been an effective form of distribution that is used primarily by manufacturers whose product lines are especially suited exclusive or highly selective distribution. By IFA(International Franchise Association), franchising is defined as a continuing relationship in which the franchisor provides a licensed privilege to do business, plus assistance in organizing, training, merchandising, and management in return for a consideration from the franchisee. Thus franchising is a method for the owner(franchisor) of product, service, or method to obtain retail or wholesale distribution through licensed, affiliated dealers(franchisees). With rapid increase of franchising industry globally, franchising industry is very rapidly increasing especially in the sector of outdoor restaurant industry in Korea. But there are many problems to be settled for promoting this industry. For example, the industry is too much lean outdoor restaurant industry. With franchisors' short history and lack of management capacity, shortage of distribution infrastructure, smaller size of franchising system, and low trust between franchisor and franchisee, and so on, the industry has many barriers to overcome for promoting it. Here we are suggesting that taxation benefaction, monetary support for the starting franchisee, establishment of fair trade principle, promoting information system and professional human resource should be needed.

  • PDF