• Title/Summary/Keyword: 내부통제

Search Result 300, Processing Time 0.027 seconds

Indonesia in 2016: Jokowi's Struggles for a Secure Footing and Challenges from Identity Politics (인도네시아 2016: 조코위의 기반 다지기와 '정체성의 정치'의 도전)

  • SUH, Jiwon;JEON, Je Seong
    • The Southeast Asian review
    • /
    • v.27 no.2
    • /
    • pp.213-243
    • /
    • 2017
  • In the first half of 2016, Indonesian President Joko "Jokowi" Widodo continued his efforts to secure support from major political parties, often benefiting from internal party conflicts. During the tense campaign for the 2017 Jakarta gubernational election, however, blasphemy charges against incumbent "Ahok", an ethnic Chinese and Christian, put Jokowi in trouble. Led by radical Islamic organizations such as Front Pembela Islam (FPI), half a million people filled Jakarta's streets, calling for Ahok's arrest. The resurgence of identity politics questioned the boundaries of the Indonesian nation and its core premises on the relationship between religion and the state. In the realm of foreign policies, the Jokowi administration maintained its tougher stance against illegal fishing in its waters. In spite of Indonesia's clashes with Chinese vessels in the Natuna sea, however, it is unlikely that the tension will escalate uncontrollably, as the Jokowi administration is seeking investment from rich neighbors for building infrastructure, which will be his key legacy for the 2019 presidential election.

Emergency Rescue Guidance Scheme Using Wireless Sensor Networks (재난 상황 시 센서 네트워크 기반 구조자 진입 경로 탐색 방안)

  • Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1248-1253
    • /
    • 2019
  • Using current evacuation methods, a crew describes the physical location of an accident and guides evacuation using alarms and emergency guide lights. However, in case of an accident on a large and complex building, an intelligent and effective emergency evacuation system is required to ensure the safety of evacuees. Therefore, several studies have been performed on intelligent path finding and emergency evacuation algorithms which are centralized guidance methods using gathered data from distributed sensor nodes. However, another important aspect is effective rescue guidance in an emergency situation. So far, there has been no consideration on the efficient rescue guidance scheme. Therefore, this paper proposes the genetic algorithm based emergency rescue guidance method using distributed wireless sensor networks. Performance evaluation using a computer simulation shows that the proposed scheme guarantees efficient path finding. The fitness converges to the minimum value in reasonable time. The density of each exit node is remarkably decreased as well.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

The Study on the Construction of the Continuous Preventive Audit System for the Military Organization (군 조직의 상시 예방 감사시스템 구축방안 연구)

  • Hak-San No;Seung-Hyun Kim;Sang-Hyuk Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.204-215
    • /
    • 2023
  • Purpose: In this study, it was proposed a plan to build the Continuous Preventive Audit System in the military Organization with the expectation that we will develop an efficient audit method under the rapidly changing audit and work environment in the future. Method: it was examined the realities and problems of the military self-audit, the cases of the Continuous Preventive Audit System currently being used by government departments and institutions and internal control inspection of the information system of the Foreign Audit Office. Result: Government departments, agencies, and foreign auditors have established a Continuous Preventive Audit System to overcome the problems and limitations of their own audits, ensuring accounting accident prevention and audit work efficiency and are focused on auditing internal controls of information systems. Conclusion: In the future, more specific studies on the design of detailed scenarios for each function of defense work and the research and analysis on the improvement of defense information system should be followed for the establishment and settlement of a more specific Continuous Preventive Audit System.

Development of Web Based Business Process Management System for Small and Medium Sized Enterprise (중소기업을 위한 웹기반 비즈니스 프로세스 관리 시스템 개발)

  • Seo, Chang-Gap;Park, Young-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.4
    • /
    • pp.153-162
    • /
    • 2009
  • Innovation, especially business process innovation, has evolved into a core focus area for all successful organizations. To ensure long-tenn survival, an enterprise must place innovation at the top of daily business operations to drive desired revenue stability and growth. Business Process Innovation is a key success factor for the next generation enterprise. Companies need to nurture an environment that encourages and enables process innovation. Business Process Management (BPM) must become the focal point of innovation initiatives. But the most BPM solutions are for large company. The cost is too high to build for small and medium sized company. We need the light and easy BPM solution for small and medium sized company. In this paper, we introduce the SESS which is BPM solution for small and medium sized company.

Lee Geun-sam and Ideology of North Korea's Performing Arts (이근삼과 북한공연예술의 이데올로기)

  • Shim, Wooil
    • (The) Research of the performance art and culture
    • /
    • no.42
    • /
    • pp.23-45
    • /
    • 2021
  • In the 1980's, Lee Geun-sam wrote critiques that analyzed North Korea's performing arts and ideology. In the critiques, he posits the following characteristics of North Korea's performing arts. First, the works are designed in such a way to befit the purpose of the authorities' policy. Second, the works embrace political ideology whose purpose concerns class struggle. During the critique process, Lee Geun-sam compares the "freedom" of the performing arts activities in South Korea and the "regulatory" aspect of North Korea's performing arts activities and reveals implicitly the superiority of South Korea's system. In addition, Lee Geun-sam criticizes the political ideology of North Korea's performing arts and objects to viewing the concept of ideology from a Marxist viewpoint. According to Lee Geun-sam, an ideology is explained as an idea system representing an artist's conscious/unconscious worldview. Also, he contends that arts should distance itself from political ideology.

Probabilistic External Flood Hazard Assessment at Major National Facilities (국가주요시설물에 대한 확률론적 외부 침수 재해도 평가)

  • Kim, Beom Jin;Kim, Byunghyun;Han, Kun Yeun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.387-387
    • /
    • 2020
  • 본 연구에서는 LIP에 의한 극한강우로부터 발생되는 극한홍수량을 산정한다. Huff 형 강우시간 분포를 기후변화 시나리오별로 적용하고, 원전주변지역에서의 상세한 토지이용조건의 변화를 고려하여 빈도별 홍수량을 산정한다. 외부침수해석의 정교화를 위한 상세 지형자료를 구축하고, 원자력발전소 부지의 상세 DEM 자료를 생성한다. 이를 위해서 원자력발전소 부지에서 건물, 연석, 도로 등의 영향을 분석하고 토지이용상황에 따른 조도계수를 산정한다. 또한 원전지역에서의 외부침수재해도 분석을 위해서 국립해양조사원에서 검토한 기후변화를 고려한 조위분석 자료를 외부경계조건으로 설정한 후 부지에 대한 2차원 수리분석을 실시한다. 침수심, 침수유속, 침수시간, 침수동압력 분석 등 2차원 침수해석결과를 바탕으로 발생빈도별 침수심, 침수강도 등의 정량적인 분석을 통해서 빈도별 재해도 곡선을 개발한다. 그리고 원전지역에서의 외부 침수에 대한 대표적인 재해도 곡선을 산정하기 위하여 재현기간별 지속시간에 따른 침수심을 분석하고 정리한다. 재현기간별 침수심에 대해 확률 분포형을 적용하기 위해서 AIC검증을 통한 분포형의 적합성을 분석을 실시한다. 또한 재현기간별 지속시간에 따른 침수심들 간의 상관관계를 분석하여 분포형에 적용한다. 적용된 분포형을 몬테칼로 시뮬레이션을 통한 대표적인 확률론적 외부 침수 재해도 곡선을 산정한다. 본 연구를 바탕으로 원전 부지 및 그 부속 시설물(SSC)의 홍수방지 기능과 홍수 대비 시설물에 대한 적용 절차의 신뢰성, 홍수 저감 및 대응 전략에 대한 정량화가 가능하여 원전 홍수 위험에 대한 정량적인 평가 지원이 가능하겠다. 고려할 외부 홍수와 관련된 원전 내부시설 및 장비에 대한 상세한 모델링 절차, 특정 시나리오에 대한 홍수 방지 및 예방과 관련한 SSC의 정량화, 홍수저감 활동과 관련된 통제실 외부 시설물에 대한 수동 조작에 대한 평가가 이루어질 수 있겠다.

  • PDF

A Smart River Management Plan for Eco-Delta City (에코델타시티 스마트 하천관리 방안)

  • Yeo, Hong Koo;Kang, Jungu;Shim, Kyu Cheoul;Hong, Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.3-3
    • /
    • 2022
  • 부산 에코델타시티는 세종 5-1 생활권과 더불어 스마트시티 국가시범도시이며, 사업대상지역은 평강천이 관류하여 맥도강, 서낙동강 본류로 흐르는 세물머리지역이 그 중심에 위치하고 있다. 하천을 중심으로 스마트시티가 조성되고 있으나 하천관리는 유역내 홍수관리, 수질관리 등등에 관한 정부주체 상위계획에 종속성이 강한 공공분야로서 단위사업에서 스마트시티에 걸맞는 하천관리계획을 수립하고 시행하는 것은 많은 어려움이 존재한다. 하천관리의 주 관심 대상은 이수를 제외하면 치수, 하천환경, 친수, 하천시설물로 대별할 수 있으며, 스마트 하천관리란 이들에 대한 현황 정보구축 및 지속적인 현행화, 그리고 이들 실제 정보를 토대로 한 합리적 운영과 실시간 연계운영 실현으로 공공서비스를 제공하는 것이라 할 수 있을 것이다. 본 연구는 국가연구개발사업에서 연구한 각 분야별 하천관리기법을 에코델타시티에 시범적용하여 스마트하천관리를 구현할 수 있는 방법을 제시하고자 하였다. 에코델타시티 조성사업의 진행수준으로 인해 취득하기 어려운 정보들은 수립된 계획을 참조하여 적용하였다. 유역내 주 대상 하천들은 델타지역에서 수문으로 통제되므로 일반적인 하천과 달리 정수역에 가까운 특이한 수리특성을 보이고 있지만, 우선 스마트 하천관리를 위한 일반적인 과정들을 시범적용 해보고 필요에 따라 특성 고려 방안을 찾고자 하였다. 유역내 정량적 홍수위험도 평가, 하천환경 평가 적용방안, 하천시설물 관리방안, 주요 지점의 실시간 모니터링 방안 등이 에코델타시티 조성사업 진행단계를 고려하여 수행되고 있다. 사용편의성과 지속가능성을 담보하기 위한 하천연계플랫폼을 구축하여, 개발된 기법들을 각각 내부 모듈로 장착하거나 완성도에 따라 외부모듈로 연계할 수 있도록 하였다. 현재 개발된 기법들의 시스템화 완성 및 관련 정보들의 데이터베이스 확대를 위한 노력이 진행되고 있으며, 향후 하천관리연계플랫폼의 실제 운영을 통하여 완성도를 높여갈 계획이다.

  • PDF

The Effect of Internal Control on Academic Procrastination among Middle School Students: The Moderating Roles of Autonomous Motivation and Parental Pressure on Academic Performance (중학생의 내부통제성이 학업지연행동에 미치는 영향: 자율적 동기와 부모의 학업성취압력의 조절효과)

  • Seung Hee Seo;Ju Hee Park
    • Human Ecology Research
    • /
    • v.61 no.3
    • /
    • pp.429-443
    • /
    • 2023
  • The purpose of this study was to investigate whether internal control, autonomous motivation of middle school students, and perceived parental pressure on academic performance affect academic procrastination, while verifying the moderating roles of autonomous motivation and parental pressure on academic performance. The participants were a total of 371 middle school students. Academic procrastination, internal control, autonomous motivation, and parental pressure on academic performance were measured using the Procrastination Inventory (Aitken, 1982) revised by Jeon and Park (2014), the Internal-External Control Scale (Ko, 2014), the Academic Self-Regulation Questionnaire (Ryan & Connell, 1989) revised by Kim (2002), and the Scale of Kang (2003), respectively. The collected data was analyzed using SPSS 26.0 and a Process Macro Model 2 (multiple additional modulation effect). The results of the study are summarized as follows. First, middle school students' internal control, autonomous motivation, and perceived parental pressure on academic performance directly affected the students's academic procrastination. Second, the moderating role of parental pressure on academic performance was significant. On the other hand, the moderating role of autonomous motivation was not significant. In conclusion, the results of this study suggest that in order to reduce and prevent academic procrastination it is important to improve internal control by helping middle school students become confident enough to believe that they have the ability to change their behavior and achieve their aims. At the same time, parents need to be interested in the process rather than only the academic performance of their children and support their autonomy.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.