• Title/Summary/Keyword: 보안인식

Search Result 1,359, Processing Time 0.03 seconds

A Study on the Actual Condition and Improvement Plan of the Space for Elementary School Care Classroom (초등돌봄교실 공간 조성 실태 분석 및 개선방안 연구)

  • Cho, Jin-Il;Choi, Hyeong-Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.18 no.1
    • /
    • pp.1-16
    • /
    • 2019
  • The purpose of this study is to diagnose the problems of an elementary school care classroom in terms of facilities and physical environment and to suggest an improvement plan for building safer and more pleasant facilities and environment in further proceeding the policies of a whole-day care classroom. To this end, we analyzed the main contents of the domestic policies for elementary school care classes and the related spatial standards amongst the management plans of provincial education offices nationwide. In addition, we analyzed the relevant care facility standards of advanced countries such as the U.S., Australia, and Singapore and diagnosed the physical environmental level of Korean care classes in comparison to the international standards. Afterwards, we conducted a case study of elementary school care classes in order to examine the key issues with the environment of care classes, the causes of these issues and the user recognition and demand. The key results of this research are as follows. First, it is necessary to elaborate and refine the guidelines on elementary school care classrooms. Second, in order to provide high-quality elementary care services, it is important to have a combined classroom that can be operated at the level equivalent to or similar to a dedicated care classroom. Third, it is necessary to regularly check the facilities and environment of the elementary school care classroom.

Operation of a 3-Year Training Program for Elementary and Secondary Administrators to Foster Creative Convergence Talent (창의융합 인재 양성을 위한 3년간의 초·중등 관리자 연수 프로그램 운영)

  • Jung, Yujin;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.177-186
    • /
    • 2021
  • The 2015 revised curriculum is structured around the core competencies of the 21st century, this is in line with the world's flow of education, such as OECD Education 2030. A future practical leading model was studied to provide a variety of creative teaching and learning experiences to elementary and Secondary students using intelligent information technology to cultivate core competencies such as ICT and computing thinking. In order for this practical model to stably settle the school field, the training was planned and operated to strengthen the creative convergence education capacity required by the teachers at the unit school through various types of the training. In particular, a nationwide administrators training program was operated for three years, reflecting the new curriculum, teaching and learning methods, and evaluation that can lead to future convergence talent training. In this paper, the perception of creative convergence education was investigated and analyzed considering the influence that administrators may have on the school field. Based on this, through the three-year operation results of the training, it was intended to establish a new training method for stable access to future creative convergence education under the post-corona era's social issues.

Effects of Intensive Course Program on the Sexual Violence for the Re-crime Risky Group in the Sex Offender: Focused on Impulsivity, Anger Expression, Rape Myth, and Self Esteem (재범위험 성폭력사범 집중교육 프로그램의 효과: 충동성, 분노표현, 강간통념, 자기존중감을 중심으로)

  • Gang, Chun-Hee;Kwon, Jae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.707-719
    • /
    • 2021
  • The purpose of this study was to find out how effect does the second-stage which is the intensive course program for sexual offenders of three-stage(basic, intensive and advanced remedial) on impulsivity, anger expression, rape myth and self-esteem of sexual offenders. To this end, 10 people waiting for the second-stage intensive education among sexual violence offenders serving at M prison located in J province were selected as subjects for the study. To verify the effectiveness of the program, repeated measurement design(pre, post and one month post test) was conducted, and a total of 200 hours of 'Intensive Course Program on the Sexual Violence' was conducted to the subjects. The results of this study are as follows. It was confirmed that the intensive course program on the sexual violence for the re-crime risky group in the sex offender is effective in reducing impulsivity and anger expression, which are risk factors of sexual crime, bringing positive changes to rape myths, which are distorted sexual perceptions of sexual violence criminals, and improving self-esteem. Finally, it suggested the necessity of continuous development and improvement of sexual violence preventive programs targeting sexual offenders, and construction of systematic supervision and related system to ensure the effectiveness of remedial after release of sexual offenders.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

A study on the Influence of Enterprise Content Management System Success Factors and Task Characteristics on Intention to Use (기업콘텐츠관리시스템 성공 요인과 업무적 특성이 시스템 사용 의도에 미치는 영향)

  • Hwang, Inho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.333-349
    • /
    • 2021
  • As information is recognized as an important asset of an organization, organizations are increasing their resource input for knowledge management. In particular, the enterprise content management system(ECMS) is a solution for organization-oriented content management, and it has high utility by helping to achieve business performance through systematic utilization of content and improve the level of internal information security. The purpose of this study is to suggest a plan to improve the intention to use organizational employee's ECMS and to suggest the effect of the relationships between information system quality characteristics and work environment characteristics on intention to use. In this study, a research hypothesis was presented based on previous studies, a questionnaire was conducted on workers of organizations that adopted an ECMS, and the hypothesis was verified by applying structural equation modeling. As a result of the analysis, information and service quality of the ECMS and task interdependence increased the intention to use, but task conflict decreased the intention to use. In addition, task interdependence and task conflict moderated the positive relationship between the quality factors of the ECMS and the intention to use it. This study has implications in terms of suggesting the direction of the organization's behavior through factors that increase the use of ECMS.

A Study on Punitive Damages System in Technology Protection Related Laws: Focusing on Patent Act, TSPA, ITPA, FTSA, MBCA (기술보호 관련 법률에서의 징벌적 손해배상제도에 대한 고찰: 특허법, 영업비밀보호법, 산업기술보호법, 하도급법, 상생협력법을 중심으로)

  • Cho, Yongsun
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.19-41
    • /
    • 2020
  • In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

3D Explosion Analyses of Hydrogen Refueling Station Structure Using Portable LiDAR Scanner and AUTODYN (휴대형 라이다 스캐너와 AUTODYN를 이용한 수소 충전소 구조물의 3차원 폭발해석)

  • Baluch, Khaqan;Shin, Chanhwi;Cho, Yongdon;Cho, Sangho
    • Explosives and Blasting
    • /
    • v.40 no.3
    • /
    • pp.19-32
    • /
    • 2022
  • Hydrogen is a fuel having the highest energy compared with other common fuels. This means hydrogen is a clean energy source for the future. However, using hydrogen as a fuel has implication regarding carrier and storage issues, as hydrogen is highly inflammable and unstable gas susceptible to explosion. Explosions resulting from hydrogen-air mixtures have already been encountered and well documented in research experiments. However, there are still large gaps in this research field as the use of numerical tools and field experiments are required to fully understand the safety measures necessary to prevent hydrogen explosions. The purpose of this present study is to develop and simulate 3D numerical modelling of an existing hydrogen gas station in Jeonju by using handheld LiDAR and Ansys AUTODYN, as well as the processing of point cloud scans and use of cloud dataset to develop FEM 3D meshed model for the numerical simulation to predict peak-over pressures. The results show that the Lidar scanning technique combined with the ANSYS AUTODYN can help to determine the safety distance and as well as construct, simulate and predict the peak over-pressures for hydrogen refueling station explosions.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

A Study on the Derivation of Port Safety Risk Factors Using by Topic Modeling (토픽모델링을 활용한 항만안전 위험요인 도출에 관한 연구)

  • Lee Jeong-Min;Kim Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.59-76
    • /
    • 2023
  • In this study, we tried to find out port safety from various perspectives through news data that can be easily accessed by the general public and domestic academic journal data that reflects the insights of port researchers. Non-negative Matrix Factorization(NMF) based topic modeling was conducted using Python to derive the main topics for each data, and then semantic analysis was conducted for each topic. The news data mainly derived natural and environmental factors among port safety risk factors, and the academic journal data derived security factors, mechanical factors, human factors, environmental factors, and natural factors. Through this, the need for strategies to strengthen the safety of domestic ports, such as strengthening the resilience of port safety, improve safety awareness to broaden the public's view of port safety, and conduct research to develop the port industry environment into a safe and specialized mature port. As a result, this study identified the main factors to be improved and provided basic data to develop into a mature port with a port safety culture.