• Title/Summary/Keyword: school violation

Search Result 131, Processing Time 0.02 seconds

Exploring on Research Ethics in Humidifier Disinfectant Case from the Court Judgement

  • CHOI, Eun-Mee;JEON, Chan-Il;KWON, Lee-Seung
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.5 no.4
    • /
    • pp.57-67
    • /
    • 2022
  • Purpose: The purpose of this study is to identify what research ethics issues are related to chemical incidents at the level of national disasters in Korea, and then to secure clear research ethics to prevent similar incidents from recurring. Research design, data and methodology: The study design was a case study of the humidifier disinfectant disaster in Korea. The humidifier disinfectant incident is a worldwide issue that has never occurred in the world. The main cause of the humidifier disinfectant incident that occurred only in Korea was the toxicity of the humidifier disinfectant contained in the humidifier spray. In this regard, research ethics will be derived through related laws and systems, research ethics status, incident damage and compensation, prosecution's investigation status, and the final precedent of the Supreme Court. Results: Although the lack of laws and systems of government departments related to humidifiers is important in the research results, the violation of ethics regulations by researchers during research experiments has become a decisive problem. Conclusions: In conclusion, the most important thing is that the research bioethics of researchers at the forefront should take precedence over any other values, especially during experiments and research related to public health.

Exploratory Research of Possibilities and Limiatation of Drone Journalism (재난재해 대응수단으로 드론저널리즘의 가능성과 한계에 관한 탐색적 연구)

  • Cho, Hang-Min
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.71-79
    • /
    • 2018
  • This study discussed the meaning of a drone, and especially drone journalism and legal and ethical issues around that, at an introductory dimension, which is used in various social bases, but is still just an academic discussion at the beginning stage. As a methodology, content analysis was used. It seems that drone journalism has high diffusibility as a technology with high 'relative advantage', 'compatibility', 'trial ability' and 'observability' and low 'complexity' in terms of the diffusion of innovation theory. However, it will be very likely that controversies will be raised, such as safety issue due to collision and crash, a dispute over violation of privacy that may seriously infringe privacy like individual portrait rights and a controversy about the accuracy and source of information as drone filming low price and ease of use. Suggest solutions to legal and ethical issues based on existing research. Technical stability is required. Also, it is necessary to change the awareness of journalists about the drones coverage and to educate ethics, and it is necessary to establish social public opinion on issues such as privacy violation and establish system and legal measures through it. Future research is expected to carry out empirical research including journalists and public awareness surveys.

Comparative Evaluation of Staggered Pedestrian Crossings and Pedestrian Crossings by Using Risk Analysis (위험도분석을 통한 이단횡단보도와 일반횡단보도의 비교평가)

  • Kim, Tae-Ho;Park, Jun-Tae;Lee, Yeon-Hyung;Rho, Jeong-Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.6
    • /
    • pp.1287-1295
    • /
    • 2015
  • This research is the study on the comparative evaluation of SPC (Staggered Pedestrian Crossings) vs PC (Pedestrian Crossings) using risk analysis. Accident factor was elicited by survey of driver's and pedestrian's at SPC & PC. I estimated the weight of a risk of violation and a mental burden by AHP (Analytic Hierarchy Process) and compared degree of risk at SPC AND PC. In conclusion, a new alternative plan of a pedestrian crossing system, staggered pedestrian crossing which plays an important role in traffic flow, pedestrian's crossings which plats an important role in traffic flow, pedestrian's convenience and traffic safer is sager than pedestrian crossings the degree of risk used this study doesn't imply an measure of the number of accident and the rate of accident, in estimating the degree of risk of pedestrian crossings, we should analyze more data of accident, behaviors, and road circumstance to include driver's and pedestrian's violation behavior in an estimate index.

The Legal Interest of Doctor's Duty to Inform and the Compensation to Damages for Non-pecuniary Loss (의료행위에서 설명의무의 보호법익과 설명의무 위반에 따른 위자료 배상)

  • Yi, Jaekyeong
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.37-73
    • /
    • 2020
  • Medical practice with medical adaptability is not illegal. Consent to medical practice is also not intended to exclude causes of Illegality. The patient's consent to medical practice is the exercise of the right to self-determination, and the patient's right to self-determination is take shape through the doctor's information. If a doctor violates his duty to inform, failure to inform or lack of inform constitutes an act of illegality of omission in itself. As a result, the legal interest of self-determination is violated. The patient has the right to know and make decisions on his or her own, even when it is not connected to the benefit of life and body as the subject of the body. If that infringed and lost, the non-property damage shall be recognized and the immaterial damage must be compensated. On the other hand, the violation of the duty of information does not belong to deny the compensation for physical damage. Which the legal interest violated by violation of the obligation to inform is the self-determination, and loss of opportunity of choice is recognized as ordinary damage. However, if the opportunity of choice was lost because of the infringement of the right to self-determination and the patient could not choice the better way, that dose not occur plainly bad results, under the prove of these causal relationship, that bad results could be compensated. But the unexpectable damage could not be compensated, because the physical damage is considered as the special damage due to the violation of the right of the self-determination.

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

A Minimum Data-Rate Guaranteed Resource Allocation With Low Signaling Overhead in Multi-Cell OFDMA Systems

  • Kwon, Ho-Joong;Lee, Won-Ick;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.26-35
    • /
    • 2009
  • In this paper, we investigate how to do resource allocation to guarantee a minimum user data rate at low signaling overhead in multi-cell orthogonal frequency division multiple access (OFDMA) wireless systems. We devise dynamic resource allocation (DRA) algorithms that can minimize the QoS violation ratio (i.e., the ratio of the number of users who fail to get the requested data rate to the total number of users in the overall network). We assume an OFDMA system that allows dynamic control of frequency reuse factor (FRF) of each sub-carrier. The proposed DRA algorithms determine the FRFs of the sub-carriers and allocate them to the users adaptively based on inter-cell interference and load distribution. In order to reduce the signaling overhead, we adopt a hierarchical resource allocation architecture which divides the resource allocation decision into the inter-cell coordinator (ICC) and the base station (BS) levels. We limit the information available at the ICC only to the load of each cell, that is, the total number of sub-carriers required for supporting the data rate requirement of all the users. We then present the DRA with limited coordination (DRA-LC) algorithm where the ICC performs load-adaptive inter-cell resource allocation with the limited information while the BS performs intra-cell resource allocation with full information about its own cell. For performance comparison, we design a centralized algorithm called DRA with full coordination (DRA-FC). Simulation results reveal that the DRA-LC algorithm can perform close to the DRA-FC algorithm at very low signaling overhead. In addition, it turns out to improve the QoS performance of the cell-boundary users, and achieve a better fairness among neighboring cells under non-uniform load distribution.

A Broker-Based Framework for QoS-Aware Mobile Web Services Selection (품질고려 모바일 웹 서비스 선택을 위한 중개자 기반의 프레임워크)

  • Yeom, Gwy-Duk;Lee, Kun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.209-218
    • /
    • 2014
  • The more mobile devices consuming web services, the more QoS-aware selection of mobile web services, we need. A QoS(Quality of Service) contract is an agreement between the web service provider and the mobile user that specifies the level of the service quality. Web services users can be assured of the level of the service quality specified by the QoS contract. We propose a broker-based framework for QoS-aware mobile web services selection in this work. Under this architecture, the mobile users can request the web services through the service broker on the wireless networks. The service broker utilizes agents to monitor the web services quality and manages the service quality by notifying the service provider and mobile user of the service contract violation. Reliability, response time, and cost were the metrics used for QoS monitoring. Futhermore mobile users can select a web service best suited for his/her needs through the service broker.

A Study on Legal Limitations of Teachers' Right for Expression (초.중.고교 교원의 정치적 표현과 제한법리에 관한 탐색적 연구: '시국선언' 관련 판례를 중심으로)

  • Lee, Jae-Jin;Lee, Jeong-Ki
    • Korean journal of communication and information
    • /
    • v.54
    • /
    • pp.32-57
    • /
    • 2011
  • This study examined how the Korean courts have made a balance between rights of school teachers' expression and the public interests derived from regulating their rights for expression in related cases. Under the Korean laws such as National Public Service Law and the Law on Assembly and Demonstration, school teachers are considered as civil servants and basically not allowed to assemble to demonstrate for their own interests. The analysis revealed that in 24 cases from a total of 31 teacher-related court cases, teachers were found guilty in violation of related laws. In deciding whether the teachers' participation on anti-government assembly was guilty or not, the courts put an emphasis on public purpose of their expression, the degree to which their expressions affect the society, and specific contents of their expression. Conclusively, it was found out that in applying the related law, Korean courts tend to overweigh the public interests, rather than the teachers' right to express.

  • PDF

Indoor Air Quality Monitoring Systems in the IoT Environment (IoT 기반 실내 공기질 모니터링 시스템)

  • Oh, Chang-Se;Seo, Min-Seok;Lee, Jung-Hyuck;Kim, Sang-Hyun;Kim, Young-Don;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.886-891
    • /
    • 2015
  • Recently, The World Health Organization announced that harms human health because of air pollution that are emerging as threats to human health worldwide. according to the, Seoul, 2011 According to a July 2014 - Public Facilities indoor air quality measurements, were examined to be in violation of indoor air pollution standards in most multi-use facility. Indoor air pollution resulting from this is present in the paper, and cause disease, such as pulmonary disease, asthma, bronchitis and to In this connection, the measurement of indoor air quality by using the environment sensor, analyzing the measured data to generate an actuator signal required for ventilation and improve indoor air quality by implementing a monitoring system with real-time measurement, autonomously managing the air quality in our lives so that it can be.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.