[보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)

 1  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-1
 2  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-2
 3  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-3
 4  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-4
 5  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-5
 6  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-6
 7  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-7
 8  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-8
 9  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-9
 10  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-10
 11  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-11
 12  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-12
 13  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-13
 14  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-14
 15  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-15
 16  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-16
 17  [보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)-17
※ 미리보기 이미지는 최대 20페이지까지만 지원합니다.
  • 분야
  • 등록일
  • 페이지/형식
  • 구매가격
  • 적립금
자료 다운로드  네이버 로그인
소개글
[보험과 리스크 관리] INTELLECTUAL PROPERTY AND TECHNOLOGY RISK MANAGEMENT(영문)에 대한 자료입니다.
목차
1.INFORMATION TECHNOLOGY RISK

Information Technology
Information Technology Risk
Risk Assessment
Computer Fraud
Systems and records
Invasion of privacy
Regulation of IT Risk
Risk Control and Financing
Liability issues
Insurance

2.Biotechnology Risk: The Human Genome Project

The purposes of the Human Genome Project can be defined as:
Potential Benefits
LEGAL AND ETHICAL ISSUES
THE BIOTECHNOLOGY RISK
GOVERNMENT REGULATION (U.S.)
TASK LEFT BEHIND

3.NANOTECHNOLOGY RISK

*Classification
*Today uses and advantages
Risk Assessment and control
Risk financing

4.TECHNOLGY AND ENVIRONMENT

RISK ASSESSMENT AND CONTROL
RISK FINANCING
본문내용
Regulation of IT Risk

In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as criminal: illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, child pornography and offences related to copyright. The procedural law section covers law enforcement issues, including measures to be taken against the crimes and offenses, search and seizure of stored computer data, collection of real time computer traffic, and preservation of stored data. The convention also contains provisions concerning intergovernmental cooperation in the fight against cybercrime. Despite it being the first multi-governmental instrument related to cybercrime, some argue that the convention falls short of addressing privacy protection as well as restrictions on government use of power.
The APEC represents more than 60 percent of world’s internet users, also decided in 2002(reaffirmed in 2004) to adopt cyber-security regulatory measures, which follow the council of Europe cybercrime convention. The African union, in particular its African commission on Human and Peoples’ Rights adopted in 2002 a declaration of principles on Freedom of Expression in Africa, which deals in part with cybercrime as well as criminal and economic measures.
The OECD(2002) issued a non-binding guideline for the security of information systems and networks. Although the guideline is subject to further review, it proposes 9 principles that each member state should adopt to promote a culture of security.
The principles are:

Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security, they also should be aware of the potential harm to others arising from interconnectivity and interdependency.

Responsibility: all participants, including policymakers and program designers, are responsible for the security of information systems and networks.

Response: Participants should act in a timely and cooperative manner to prevent, detect and respond to security incidents. Where permissible, this may involve cross-border information sharing and cooperation.

Ethical standards and conducts: Participants should respect the legitimate interests of others.

Democracy: the security of information systems and networks should be compatible with essential values of a democratic society.

Risk assessment: Participants should conduct risk assessments, to include identification of key internal and external factors.

Security design and implementation: Participants should incorporate security as an essential element of information systems and networks. Participants should focus on the design and adoption of safeguards and solutions to manage potential harm from identified threats and vulnerabilities.

Security management: Participants should adopt a comprehensive approach to security management. The approach should include forward-looking responses to emerging threats, detection and response to incidents, review and audit.

Reassessment: Participants should review and reassess the security of information systems and networks and make appropriate modifications to security policies, practices, measures and procedures.

Individual governments also have enacted laws in an effort to
오늘 본 자료
더보기
  • 오늘 본 자료가 없습니다.
해당 정보 및 게시물의 저작권과 기타 법적 책임은 자료 등록자에게 있습니다. 위 정보 및 게시물 내용의 불법적 이용,무단 전재·배포는 금지되어 있습니다. 저작권침해, 명예훼손 등 분쟁요소 발견 시 고객센터에 신고해 주시기 바랍니다.