leakage of IT technology
- Recruitment of key person
It is often called as a scout and the simple way to get rival's information by hiring the executives of rival's company. For example, In 2002, 30~50 persons belonged to Hynix moved into other countries such as China and Taiwan.
- computer hacking
Because of a rapid development of internet, a hacking becomes the issue for one of the main
leak out the customer information is increasing. Because of the fact, The 11st provide the general public certificate log-in service to prevent from leaking out the personal information. After that, the general public certificate log-in service helps customers log-in the 11st site easily, and it helps them not to confound ID and password which is used in other multiple internet site as well.
2
16 2010. 5. 6 ① BP confirms the arrival of three huge containment domes designed to collect much of the 5,000bpd leaking into the US Gulf from the Macondo blowout.
② The department of justice asks Transocean to preserve evidence in connection with the explosion and sinking of the rig
③ Hayward tells the BBC that the blowout preventer owned by Transocean was at fault for the leak. BP, he s
prevent its abuse by hackers and other criminals
Our Research Questions are…
Who is Policy entrepreneur?
How can we examine the policy with 3 streams in Kingdon’s model?
Is there any limitation?
Auction Hacking Incident (2008)
18,630,000 people’s information leaked
Nate Hacking Incident (2011)
35,000,000 people’s information leaked
The GREATIST scale of information spillage
in epidermis and partial dermis
Full thickness defect in dermis
Need skin graft
3rd degree
Damage in epidermis, dermis, hypodermis
Need skin graft
Ulcer
breakdown of the skin caused by fluid build-up in the skin from poor vein function (venous insufficiency).
Fluid leaks from the veins into skin tissue when the blood backs up rather than returning to the heart through the veins.