• Title/Summary/Keyword: invasion of privacy

Search Result 158, Processing Time 0.026 seconds

Legal Research about the Public Offering of Director Compensation (이사보수의 공개에 관한 법적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.169-177
    • /
    • 2012
  • Due to the influences of global financial crisis, countries are putting their efforts on the enhancement of appropriateness and transparency of director compensation. In several countries including Germany, the United States, the United Kingdom, France, and Italy, listed companies and financial institutions in certain levels make public announcement for compensations of individual directors, not the averages. Recently, even Asian countries including China, Hong Kong, and Singapore are introducing individual director compensation public announcement policies. On the other hand, in cases of companies, which must submit annual reports, under current Korean capital market laws and enforcement ordinances, they are obligated to mention 'total wage paid to all executives in that business year' on the annual report, but does not have to mention individual wages of each executive. About this, at the 17th national assembly, revised bill for the Securities and Exchange Act for companies to mention wages of each executive. The financial world is opposing to open individual director compensation to the public as they concern about the shrinking of outstanding human resources recruitment, breach of corporate confidence, privacy invasion, deterioration of labor-management relations, and downfall of the executive's management will as director compensation will be standardized downward; however, if public opening of individual director compensation is forced, domestic companies will prepare more objective and rational standards when they calculate director compensations, and moreover, it will prevent arbitrary intervention of dominant shareholders. Therefore, to clearly and efficiently control director compensation, we need regulations for obligating public opening of individual director compensation.

Woman College Students' Perception of Their Parent's Child-rearing Attitudes (여대생이 지각한 부모의 양육태도)

  • Kim Young-Hee;Kim Shin-Jeong
    • Child Health Nursing Research
    • /
    • v.9 no.3
    • /
    • pp.309-322
    • /
    • 2003
  • Purpose: This study was carried out to show the parental child-rearing attitudes perceived by daughters(woman college students), who were in the process of pursuit of resonable values, ethics and preparing for marriage and settling down, and another purposes were to help them to have positive attitudes toward their child-rearing in the future and set up preliminary parenting education program. Method: The subjects were 120 woman college students who were freshmen to junior in one university in Seoul. Using the self-report questionnaire, data were collected from December in 1999 to March in 2000. The contents which subjects wrote down were categorized by content analysis method. Result: 1) The age range of subjects were 19-25 years old and main rearer was mother(85.84%). 2) The perception of parent's child-rearing by subjects were revealed 555 statements and then tied together 50 themes: 'emphasizing on studying hard'(8.3%), 'doing by oneself'(5.6%), 'sternness'(5.2%), 'respect of personality'(4.5%), 'eagerness'(4.0%), 'humanity education'(4.0%), 'moderating in daily living'(4.0%), 'propriety education'(3.8%), 'sacrificing for children'(3.6%), 'expectation'(3.2%), 'concerning'(3.1%), 'parent-centered'(3.1%), 'giving a free hand'(2.9%), 'sharing with'(2.9%), 'consideration'(2.7%), 'over-protectiveness'(2.3%), 'hostile attitude' (2.2%), 'corporal punishment'(2.2%), 'expression of parental love'(2.0%), 'encouragement'(1.8%), 'family-centered' (1.8%), 'treating fairly'(1.6%), 'offering live experiences'(1.6%), 'exacting obedience'(1.62%), 'exemplary parental role' (1.6%), 'sexual discrimination'(1.6%), 'cooperation'(1.4%), 'giving favors'(1.4%), 'indifference'(1.4%), 'understanding' (1.3%), 'confidence'(1.3%), 'intimacy'(1.3%), 'pursuit of health'(1.3%), 'warm-hearted'(1.1%), 'stinginess'(1.1%),'broad-mindedness'(0.7%), 'granting'(0.7%), 'interfering'(0.7%), 'reproach'(0.7%), 'distinction of sex in household affairs'(0.7%), 'help'(0.5%), 'preparing for the future'(0.5%), 'disregarding'(0.5%), 'making environment'(0.4%), 'bringing up a child personally' (0.4%), 'comparing'(0.4%), 'religious life'(0.4%), 'good deed'(0.4%), invasion of privacy' (0.2%), 'controlling desire'(0.2%). 3) 50 themes were categorized by 18 categories once more: 'control' (13.2%), 'crazy for education'(12.3%), 'endeavoring'(8.6%), 'autonomy'(8.5%), 'home education'(7.7%), 'esteem' (6.67%), 'support'(6.67%), 'pursuit of healthy daily life'(5.6%), 'earnestness'(5.4%), 'disregarding personality'(5.4%), 'emotional bonding'(3.2%), 'imposing a burden'(3.2%). 'inhospitality'(3.1%), 'acceptance'(5%), 'discrimination'(2.3%), 'mature parenthood'(1.8%), 'strengthening family tie'(1.8%), 'psychological intimacy'(1.1%). 4) On the basis of this study, 3/5 of subjects(61.2%) perceived their parents had mature and autonomous child-rearing attitudes, and on the other hand 2/5(39.5%) of them perceived controlling, just forcing to work harder and personally disregarding attitudes. Conclusion: So we need to offer them nursing implementation such as preliminary parenting education program and parenting consulting like to strengthen positive perception and help improving in realistic, developmental child-rearing attitudes.

  • PDF

Smartphone Usage Experience of College students (대학생들의 스마트폰 사용 경험)

  • Kim, Jungae;Cho, Eui-young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.187-201
    • /
    • 2016
  • The purpose of this study was to analyze the smart phone usage experience structure for college students. The phenomenology approach was used by conducting 4 times in-depth interviews with the 7 college students age between 20~23. Collected Data was analyzed by Giorgi's phenomenological method. There were 4 general structure descriptions and 28 themes. General structure descriptions were 'Dependence on smart phone', 'Phenomenon of smart phone usage', 'Results of smart phone usage' and 'Relationship between stress and smart phone'. Themes consisted of 'Ambivalence', 'Positive feelings for smart phones', 'Separation anxiety', 'Negative feelings for smart phones'. 'Dependent feelings for smart phones', 'A sense of unity with smart phones', 'Helpful for my life', 'Deeply involved with my life', 'Useful tool in my life', 'Study, communication, relaxation and health care', 'Maintain personal relationship', 'The most important thing in my life', 'Shallow relationship stress', 'Interference with personal relationship', 'Forming a negative relationship', 'Invasion of privacy', 'Forming a Incorrect relationship', 'Unwanted participation', 'No effort to improve relationship', 'Poor concentration', 'Interference with academic study', 'Study assistance', 'Limited help for study in depth', 'Shelter from the stress', 'Amplification of the stress', 'Obsessive focus', 'Feel separation for the reality' and 'Waste of time'. Smart phone usage make college students dependent on smart phones and had negative influence on both personal relationship and academic results. Usage of smart phone also amplified stress. Therefore we need fundamental principles on usage of smart phone and propose to build cultural etiquette that provides reasonable way to use smartphone.

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.