• Title/Summary/Keyword: 공공-민간 합동개발

Search Result 3, Processing Time 0.015 seconds

공공-민간합동복합도시개발본격착수

  • Kim, So-Jin
    • 주택과사람들
    • /
    • s.198
    • /
    • pp.24-27
    • /
    • 2006
  • 인천, 아산, 대전, 광명 일대에 도시의 향연이 시작됐다. 각 도시마다 경쟁력 제고와 도약을 위한 발판으로 복합 도시 개발이 떠오르고 있다. 대한주택공사와 토지공사, 인천경제자유구역청 등 공공기관이 시행을 하고 민간 건설업체와 금융사들로 구성된 컨소시엄이 사업을 추진하는 형태의 민간 합동 복합 도시 개발이 본 괘도에 올랐다. 지역의 프리미엄을 높이고 도시의 기능을 재생시키는 복합 도시 개발의 현장을 살펴보았다.

  • PDF

Risk Analysis and Classification of Public-Private Partenership in Project Financing Process (민관합동형 PF사업의 단계별 리스크 분류 및 위험도분석)

  • Park, Hye-Sung;Kim, Sun-Kuk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.117-126
    • /
    • 2011
  • With Public-private partnership PF (project financing) deals saw explosive increase in quantity since its introduction to Korea in 2001, but, met with severe recession in the fallouts of the financial crisis that hit the global economy in 2008. This study intends to identify the risk factors corresponding to issues of public-private partnership projects financing structure and classify and analyze them by project phase. Outcomes of this research are expected to help recognize risk factors in each project phase during project planning and develop risk control and mitigation strategy during project implementation.

A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing (사이버위협정보 공유 활성화를 위한 관리적·기술적 개선모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • This paper shall suggest the improvement model for invigorating cyber threat information sharing from the national level, which includes, inter alia, a comprehensive solutions such as the legislation of a guideline for information sharing, the establishment of so-called National Center for Information Sharing, the construction and management of a integrated information system, the development of techniques for automatizing all the processes for gathering, analyzing and delivering cyber threat information, and the constitution of a private and public joint committee for sharing information, so much so that it intends to prevent cyber security threat to occur in advance or to refrain damage from being proliferated even after the occurrence of incidents.