• Title/Summary/Keyword: 국가 행위

Search Result 499, Processing Time 0.027 seconds

Aspects of Development Education Described in the Geography Syllabus and Textbooks in the State of NSW, Australia (오스트레일리아 NSW 주 지리 교육과정 및 교과서의 개발교육 특징)

  • Cho, Chul-Ki
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.3
    • /
    • pp.551-565
    • /
    • 2013
  • This paper examines the aspects of development education in the Geography Syllabus in the State of NSW, Australia and geography textbooks developed by it. The aspects of development education in the Geography Syllabus and textbooks is as follows. Firstly, Development Education is implicitly described in terms of the difference of the quality of life and aid links in Geography (Mandatory) Stage 4 and Geography (Mandatory) Stage 5, but clearly in Geography Elective. Moreover, Development Geography is one of unit to learn deeply in case of Global Challenges in Stage 6. Secondly, in geography textbooks, development education is sequenced with learning of the quality of life in everyday life, understanding of diverse meaning of development and measure of development, and the role of individuals and organizations for reducing the global inequality. The implications of the findings is as follows. Firstly, geography curriculum needs to be consist of the difference of the quality of life in the middle school, and development geography in high school. Secondly, the major concepts of development education like development, measure of development and the aid etc. need to be described in the different views. Thirdly, development education needs learners to learn the interdependence and practice the global citizenship through learning of specific links of our country with others. Finally, geography textbooks should not describe the normative efforts for reducing global inequality, and treat individual practical cases as well as organizations like government and NGOs so that learners empathize with their value and attitude through individual practical cases.

  • PDF

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Medical Exposure of Korean by Diagnostic Radiology and Nuclear Medicine Examinations (진단방사선 및 핵의학 검사에 의한 한국인의 의료상 피폭)

  • Kwon, Jeong-Wan;Jeong, Je-Ho;Jang, Ki-Won;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.30 no.4
    • /
    • pp.185-196
    • /
    • 2005
  • Although medical exposure from diagnostic radiology procedures such as conventional x-rays, CT and PET scans is necessary for healthcare purposes, understanding its characteristics and size of the resulting radiation dose to patients is much of worth because medical radiation constitutes the largest artificial source of exposure and the medical exposure is in a trend of fast increasing particularly in the developed society. Annual collective doses and per-caput effective doses from different radiology procedures in Korea were estimated by combining the effective dose estimates per single medical procedure and the health insurance statistics in 2002. Values of the effective dose per single procedure were compiled from different sources including NRPB reports, ICRP 80, MIRDOSE3.1 code and independent computations of the authors. The annual collective dose reaches 27440 man-Sv (diagnostic radiology: 22880 man-Sv, nuclear medicine: 4560 man-Sv) which is reduced to the annual per-caput effective dose of 0.58 mSv by dividing by the national population of 47.7 millions. The collective dose is far larger than that of occupational exposures, in the country operated 16 nuclear power plants in 2002, which is no more than 70 man-Sv in the same year. It is particularly noted that the collective dose due to CT scans amounts 9960 man-Sv. These results implies that the national policy for radiation protection should pay much more attention to optimization of patient doses in medicine.

A Study on the Modernization of the Rome Convention and its Issues - Focusing on the recent ICAO Legal Committee's Discussion (로마조약의 현대화와 쟁점에 관한 고찰 - 최근 ICAO법률위원회의 논의를 중심으로 -)

  • Kim, Jong-Bok;Maeng, Sung-Kyu
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.1
    • /
    • pp.33-54
    • /
    • 2008
  • The damage to the third parties caused by aircraft in flight shall be fully compensated to the extent that the damage didn't occur unless the damage is caused by innocent victims. However, related international Conventions limit operator's liability of compensation to certain levels, which is one of the main reasons that such international Conventions have not been ratified by many aviation leading States. However, international community has agreed, since 9/11, that the accidents caused by terrorists and the protection of the third parties need to be addressed more actively. And the amendment of the related Rome Conventions has been drafted under the ICAO leadership by the special committee that was organized to modernize the related international Conventions. This study addresses the issues related to the draft Conventions, the draft Convention for Damage caused by Aircraft to Third Parties, in case of Unlawful Interference and the draft Convention on compensation for Damage caused by Aircraft to Third Parties. It is expected that it takes considerable time to reach an agreement on all the issues from appropriate apportionment of liability between the government and operator to the details regarding the management of Supplementary Compensation Mechanism. Under the circumstances where the needs for the air transportation as well as threats of terrorism increase, the new international Convention should be prepared taking into consideration the balance between the protection of the innocent third parties and that of air transport industry including air carriers. Along with this, the Republic of Korea should actively participate in the process of amendment to the related international Conventions to protect the life and property of the people from anticipated damages.

  • PDF

The Appropriation of Public Space and Logic of Exclusion: A Case of the Tap-Gol Park from late 1990's to early 2000's (공공 공간의 전유와 배제 논리: 1990년대 후반부터 2000년대 초반까지 탑골공원의 사례)

  • Lee, Kangwon
    • Journal of the Korean Geographical Society
    • /
    • v.48 no.6
    • /
    • pp.944-966
    • /
    • 2013
  • This study attempts to highlight the cultural importance of urban public space by analyzing the changes Tap-Gol Park from late 1990's to early 2000's, a park located in the heart of Seoul, underwent in its meanings and uses. Public space, a product of modern urban planning, is characterized by its openness and accessibility and represents the vitality of modern city, serving as a meeting place for citizens with different social backgrounds at such occasions as gatherings and festivals. While the government or a few dominant groups try to control the public and their behavior in public space by giving a specific meaning to it and specifying its use, people constantly set their foot in it and view the space as a place differently for each individual's personal or social reasons. It is therefore not very surprising that the meaning of public space has never been successfully defined. Following the traces of attempts to define the meaning of public space and considering how public space can be efficiently used will shed light on what types of groups, especially ages and classes participated in the contest for the use of public space and expressed their own cultures in urban society through various negotiations.

  • PDF

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

A Study on the Transition of Jidang in Changdeok-Place - Based on the Donggwoldo - (창덕궁 지당의 변화과정 연구 - 동궐도를 기준으로 -)

  • Kang, Kee-Rae;Lee, Kee-Cheol
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.1
    • /
    • pp.107-118
    • /
    • 2010
  • Palaces of a country can be representative aggregate of the culture and arts of the country. Palaces were used not only as a living place to protect kings and royal families and to live cultural lives, but also a political place to govern the country. Kings in Choseon founded the country on the Sung Confucianism, their philosophical background. They built Bangji and Wondo as constant reminders of their philosophy. Bangji is the most apparent characteristic in the palace gardens of the Choseon Dynasty. Finding out the original form of Jidang, restoring the original and passing it on to future generations can be passing on the spiritual culture of our ancestors. This study is done to find out or locate well preserved Jidang, transformed Jidang and lost Jidang in Changdeokgung, which is the best conserved palace of Choseon. This study is composed of Jidang which has been kept in its original state, transformed Jidang, locating lost Jidang and Jidnang which has been unearthed. The total number of Donggwoldo's Jidangs is 17; those that are kept in their original state, 4; transformed Jidangs, 5; Jidangs that were lost and have been located, 8; and newly appeared Jidangs, 2. From the results, opinions on restoration are presented. This study can be a small drop in the thin stream of tradition passing onto future generations in this world where knowledge and information are transported momentarily and the classification of culture and border is mixed, yielding vagueness.

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.