Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
Ⅰ. 개요
국내에서도 정보화사업을 체계적.객관적으로 평가, 사업추진상의 개선사항을 도출하고 이에 대한 정확한 정보를 적시에 제공함으로써 정보사회의 환경변화에 능동적으로 대처할 수 있는 국가사회 정보화를 촉진하기 위하여 정보화사업 평가제도를 도입하였다.
정보통신부에서는 정보
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f
regulation in China
Sexually Explicit Content Filtering
A preliminary round of testing examined 795 distinct URLs containing sexually explicit images.
These URLs had been used as the basis for a portion of Benjamin Edelman’s expert testimony in
Multnomah County Public Library, et al. v. United States (http://cyber.law.harvard.edu/people/
edelman/mul-v-us/). He generated this list by collec
II. A contemporary human rights dilemma
As we mentioned earlier, China is not democratized as much as the other leading states in the international system. China’s internet censorship over its people by the central government can be seen as human rights dilemma in China, such as freedom of expression and privacy. China's internet regulations may be one of the most extensive and restrictive r