• 제목/요약/키워드: Security Compliance

검색결과 208건 처리시간 0.028초

An Investigative Treatise on the Success Story of Women Entrepreneurs in Tribal Areas of India

  • POTLURI, Rajasekhara Mouly;JOHNSON, Sophia;ULLAH, Rahat
    • 산경연구논집
    • /
    • 제11권9호
    • /
    • pp.17-24
    • /
    • 2020
  • Purpose: The purpose of this research is to explore the continuum of reasons and skills employed by tribal Indian women entrepreneurs to establish their successful businesses in terrorist affected areas. Research design, data and methodology: After an extensive literature review on women's entrepreneurship and their situations in disturbed areas, a qualitative research method was applied, and researchers conducted well-structured personal interviews to collect data from fifty respondents selected by using random and convenience sampling. Results: This study has identified the range of reasons for the successes of tribal women entrepreneurs. These are strict compliance with tribal culture and restrictions imposed by different stakeholders and the establishment of social networks and support from local communities and with their indefatigable and indomitable perseverance to proffer basic sustenance for their families. Conclusions: A minimum sample was selected from the Andhra-Odisha Border (AOB) areas due to security concerns. The research depicts the tribal Indian women entrepreneurs' grit and remorseless nature in overcoming impediments from the socio-cultural, economic, political, and legal framework of the country. This research is a gallant effort taken up by the authors, which is the first of its kind to visit as well as to conduct primary research in disturbed areas like the Andhra-Odisha Border in India.

관절경 수술을 위한 관주(灌注)시스 (Irrigation Pumping System) 제어기의 개발 (Design of Irrigation Pumping System Controller for Operational Instrument of Articulation)

  • 김민수;이순걸
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2003년도 춘계학술대회 논문집
    • /
    • pp.1294-1297
    • /
    • 2003
  • With the development of medical field, many kinds of operations have been performed on human articulation. Arthroscopic surgery, which has Irrigation Pumping System for security of operator vision and washing spaces of operation, has been used for more merits than others. In this paper, it is presented that the research on a reliable control algorithm of the pumping system instrument for arthroscopic surgery. Before clinical operation, the flexible artificial articulation model is used for realizing the model the most same as human's and the algorithm has been exploited for it. This system is considered of the following; limited sensing point, dynamic effect by compliance, time delay by fluid flow and so on. The system is composed with a pressure controller, a regulator for keeping air pressure, an airtight tank that can have distilled water packs, artificial articulation and a measuring system, and has controlled by the feedback of pressure sensor on the artificial articulation. Also the system has applied to Smith Predictor for time delay and the parameter estimation method for the most suitable system with both the experiment data and modeling. In this paper, the pressure error that is between an air pressure tank and an artificial articulation was measured so that the system could be presumed and then the controller had developed for performing State-Feedback. Finally, the controller with a real microprocessor has realized. The confidence of system can be proved by applying this control algorithm to an artificial articulation experiment material.

  • PDF

개인정보보호를 위한 ELIS의 자치법규서식 개선방안 (Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection)

  • 최철재;이영식;이태희
    • 한국전자통신학회논문지
    • /
    • 제11권11호
    • /
    • pp.1017-1024
    • /
    • 2016
  • 본 논문에서는 강원도 기초자치단체 18기관 가운데 4개 주요시에 대하여 자치법규의 개인정보 요구 실태를 파악하였다. 자치법규정보시스템(ELIS)을 활용하여 지자체의 자치법규에서 별지서식을 대상으로 전수조사를 실시하였다. 분석결과 슈퍼키인 주민등록번호를 포함하여 거부감이 있는 스마트폰 번호, 자택 전화번호 등의 개인정보 요구가 심각한 상태로 조사되었다. 개선방안으로 PIMS 준수와 개인정보 자동검색엔진의 시급한 개발을 제안하였다.

내부자거래(內部者去來) 규제개선(規制改善)의 효율적(效率的)인 방안(方案) (An Efficient Ways of Improving Regulations on Insider Trading)

  • 박상봉
    • 경영과정보연구
    • /
    • 제4권
    • /
    • pp.611-629
    • /
    • 2000
  • In the legislation interpretation and fundamental viewpoint about the legal system of insider trading, Japan strictly legislate under the proposition, the principle of 'nulla poena,' adopted 'the principle of limited enumeration,' and United states, under 'the principle of comprehension,' has entrusted courts with establishment of concrete concepts and standard, so the courts are very flexible in determining the range of insiders and the importance of inside information to show a strong will to eradicate insider trading. Korea has a legislative position of 'the principle of limited indication' which has been created by the negotiation between those principles of United states and Japan. Though this court has interpreted insider trading, insider trading using non-disclosed information has increased lately, needing the strengthening of its regulations. However, this shows us that sophisticate the regulations may be, the exposure of insider trading has limitations. The most important thing is to change recognition for transparency of the securities market, security of investors and to establish the atmosphere which is that fair stock trading made in a sound capital market to raise funds for corporation. The policies of improving unfair trading, self-regulation bodies, raising the transparency and legality of procedures of supervision and monitoring and applying 'compliance program' to stock companies are very needed to eliminate unfair trading in the securities market and establish the order of trading.

  • PDF

모바일 로봇 및 네트워크 카메라 기반 지능형 감시 시스템 설계 (A Design of Intelligent Surveillance System Based on Mobile Robot and Network Camera)

  • 박정현;이민영;심귀보
    • 한국지능시스템학회논문지
    • /
    • 제18권4호
    • /
    • pp.476-481
    • /
    • 2008
  • 보안이 중요시되는 공간에서 지능형 감시 시스템의 필요성이 점차 중요시되고 있다. 본 논문에서는 embedded Linux 기반의 Mobile Robot에 Network Camera를 탑재하여 침입자를 추적할 수 있는 시스템 구현에 목적을 두고 있다. Network Camera부터 Wireless Lan을 이용하여 서버로 영상을 전송하고, 서버에서 블록매칭 알고리즘을 이용하여 침입자의 이동경로를 파악하며 침입자에 대한 방향 정보를 전송하여 침입자를 추적한다. 로봇이 침입자를 추적함에 따라 침입자의 유효 영상을 얻는다. 본 논문에 의해서 구현된 시스템은 다른 감시 시스템과 연동하여 지능형 감시 시스템으로서 신뢰성을 더할 수 있다.

인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안 (Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators)

  • 정지용;김유림;장원석
    • 대한의용생체공학회:의공학회지
    • /
    • 제44권2호
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로- (Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects)

  • 최완식
    • 항공우주정책ㆍ법학회지
    • /
    • 제5권
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • 한국컴퓨터정보학회논문지
    • /
    • 제29권4호
    • /
    • pp.83-89
    • /
    • 2024
  • 인터넷 익스플로러의 서비스 종료 이후 ActiveX의 사용이 종료됨에 따라 Non-ActiveX 정책이 확산되었다. Non-ActiveX 정책을 바탕으로 정해진 웹 페이지 표준 규약으로 HTML5가 채택되어 사용되고 있다. W3C(World Wide Web Consortium)에서 개발된 HTML5는 다양한 기능을 플러그인 없이 브라우저만으로 쉽게 사용할 수 있고, 기존 HTML에 비해 다양한 요소와 속성이 추가되었으며 API를 통해 더 나아진 웹 응용 환경을 제공하고 있다. 그러나 새로 추가된 기술들로부터 새로운 보안 취약점이 발견되었고, 이러한 취약점으로 인하여 공격 범위가 넓어졌다. HTML5가 적용된 웹 사이트에서 발생할 수 있는 보안 취약점을 찾기 위한 연구가 부족하다. 본 논문은 최근 5년 이내에 플러그인이 제거된 공공기관 웹 페이지를 대상으로 웹 페이지의 보안 취약점을 탐지하고 분석하여 웹 취약점을 가지는 태그 및 속성을 탐지하는 모델을 제안한다. 제안된 모델을 웹 페이지에 적용한다면 플러그인 제거 후에도 현재까지 웹 페이지의 웹 표준 준수 여부 및 취약점을 분석할 수 있어 신뢰성 있는 웹 서비스를 제공할 수 있다. 그리고 해킹 피해로 인한 금전적, 물리적 문제들을 예방하는 데 도움이 될 것으로 기대된다.

사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구 (A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement)

  • 임규건;김해연;안재익
    • 정보화정책
    • /
    • 제29권1호
    • /
    • pp.24-37
    • /
    • 2022
  • 4차 산업혁명과 정보통신 기술의 발전 및 코로나 19로 ICT 환경이 급변하는 가운데 설계 초기에 보안성, 이동성, 관리성, QoS 등이 고려되지 않고 개발된 기존 인터넷은 기본 구조 위에 기능을 추가해야하는 한계성 때문에 인터넷 구조가 복잡해졌으며 보안성 취약, 안정성 취약, 신뢰성 취약 등의 문제가 지속적으로 발생하고 있다. 또한 인공지능, IoT 등 첨단 기술로 인한 디지털 트랜스포메이션 시점에 안정성과 신뢰성을 제공할 수 있는 새로운 개념의 인터넷이 요구되고 있는 실정이다. 이에 본 연구에서는 사이버 보안을 강화할 수 있는 한국형 미래 인터넷 구현 방안을 제시하기 위해 미래 인터넷 구현에 있어 중요한 핵심 요소를 분석하고 국내외 미래 인터넷 관련 연구 동향과 기술 적합성을 평가하여 한국의 사이버 환경에 적합한 미래 인터넷의 추진 방향 및 추진 전략을 도출하였다. 미래 인터넷 구현에 있어 핵심 요소의 중요도는 보안성, 무결성, 가용성, 안정성, 기밀성의 순으로 나타났다. 현재 미래 인터넷 프로젝트는 전 세계적으로 다양하게 연구되고 있는데 수많은 프로젝트 중 Bright Internet이 미래 인터넷 구현의 핵심 요소를 가장 적절히 만족하고 있으며 한국의 사이버 환경에 가장 적합한 기술로 평가되었다. Bright Internet을 한국형 미래 인터넷으로 추진하기 위해 기술적 이슈뿐만 아니라 전략적 이슈와 법률적 이슈도 같이 고려하여야 한다. 기술적 이슈로는 한국형 미래 인터넷의 표준으로 Bright Internet을 선정함에 있어 SAVA IPv6-NID 채택이 필요하고 데이터 센터 차원의 통합 데이터 관리와 국가 간 협력 체계수립이 필요할 것이다. 전략적 이슈로는 안전한 관리 체계와 운영기관의 확립이 필요하고, 법률적 이슈로는 한국의 개정된 데이터 3법과 같은 국내법 준수를 포함한 GDPR(General Data Protection Regulation, 개인정보보호규정)의 요구 사항도 만족시켜야 한다.

최적안전항로를 위한 충돌위험도 평가시스템의 개발 (Development of a Collision Risk Assessment System for Optimum Safe Route)

  • 전호군;정연철
    • 해양환경안전학회지
    • /
    • 제24권6호
    • /
    • pp.670-678
    • /
    • 2018
  • 선박의 통행량이 많은 연안해역은 선박들 사이에 복잡한 조우상황이 자주 발생하기 때문에 충돌사고의 가능성이 높다. 따라서 해상에서 충돌사고를 줄이기 위해서는 항해사의 국제충돌예방규칙(COLREG) 준수에 더하여 정량적인 충돌위험평가가 요구된다. 본 연구에서는 선박의 계획항로에 대한 충돌위험을 평가하기 위한 새로운 충돌위험도 평가시스템이 개발되었다. 먼저 기존의 충돌위험 평가모델들을 검토함으로써 적절한 충돌위험 평가방법이 제시되었다. 시스템은 MATLAB을 사용하여 개발되었으며 해도, 범퍼 및 평가의 세 부분으로 구성된다. 개발된 시스템은 시험을 위해 간단한 계산조건으로 시험해역에 적용되었으며, 그리고 검증을 위해 실제 계산조건으로 실제해역에 적용되었다. 그 결과 충돌위험은 자선의 길이, 항해시간 및 항로 등에 의해 영향을 받는 것으로 나타났다. 개발된 시스템은 항해사가 출항전 최적안전항로를 선택하는데 도움을 줄 수 있을 것으로 기대된다.