• Title/Summary/Keyword: 보안 위험

Search Result 1,067, Processing Time 0.033 seconds

Strategy for Bio-Diversity and Genetic Conservation of Forest Resources in Korea (생물종(生物種) 다양성(多樣性) 및 삼림유전자원(森林遺傳資源) 보존(保存) 전략(戰略))

  • Park, Young Goo
    • Journal of Korean Society of Forest Science
    • /
    • v.83 no.2
    • /
    • pp.191-204
    • /
    • 1994
  • Due to its topographic complexities and various climatical condition, Korea exhibits diverse forest types. Dominant tree species in this zone are Quercus spp., Betula spp., Zelkova spp., Fraxinus spp., Pinus densiflora, Pinus koraiensis, and Pinus thunbergii ete. Genetic conservation in forest species in Korea there are three ways ; one is in situ, other is ex situ and third is in-facility conservation. In situ conservation include that are the present status of conservation of rare and endangered flora and ecosystem, the reserved forest, the national and provincial park, and the gene pool of natural forests. Ex situ conservation means to be established the new forest from in situ forest stands, progeny and provenance test populations, seed orchard and clone banks, and gene conservation in-facility. As a tool for low temperature storage, several aspects on in vitro system were studied ; (1) establishment of in vitro cultures from juvenile and/or rejuvenated tissues, (2) induction of multiple shoots from the individual micropropagules, (3) elongation of the proliferated shoots. Studies on cold storage for short-and long-term maintenance of in vitro cultures under $4^{\circ}C$ in the refrigerator were conducted. For the cryopreservation at $-196^{\circ}C$, various factors affecting survivability of the plant materials are being examined. The necessity of gene conservation of forest trees is enlarged not only to increase the adaptability for various environments but also to gain the breeding materials in the future. For effective gene conservation of forest trees, I would like to suggest followings ; 1. Forest stands reserved for other than the gene conservation purposes such as national parks should be investigated by botanical and gene-ecological studies for selecting bio-diversity and gene conservation stands. 2. Reserved forest for gene pool should be extented both economically important tree spp. and non-economical species. 3. Reserved forest for progeny test and clone bank should be systematically investigated for the use of Ex situ forest gene conservation. 4. We have to find out a new methodology of genetic analysis determining the proper and effective size of subpopulation for in situ gene conservation. 5. We should develop a new tree breeding systems for successful gene conservation and utilization of the genetic resources. 6. New method of in-facility gene conservation using advanced genetic engineering should be developed to save time and economic resources. 7. For the conservation of species with short-life span of seed or shortage of knowledge of seed physiology, tissue culture techniques will be played a great role for gene conservation of those species. 8. It is are very useful conservation not only of genes but of genotypes which were selected already by breeding program. 9. Institutional and administrative arrangements including legistlation must be necessarily taken for gene conservation of forest trees. 10. It is national problems for conservation of forest resources which have been rapidly destroyed because of degenerating environmental condition and of inexperienced management system of bio-diversity and gene conservation. 11. In order to international cooperation for exchanging data of bio-diversity and gene conservation, we should connect to international net works as soon as possible.

  • PDF

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

A Study on the Legislation for the Commercial and Civil Unmanned Aircraft System Operation (국내 상업용 민간 무인항공기 운용을 위한 법제화 고찰)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.1
    • /
    • pp.3-54
    • /
    • 2013
  • Nowadays, major advanced countries in aviation technology are putting their effort to develop commercial and civil Unmanned Aircraft System(UAS) due to its highly promising market demand in the future. The market scale of commercial and civil UAS is expected to increase up to approximately 8.8 billon U.S. dollars by the year 2020. The usage of commercial and civil UAS covers various areas such as remote sensing, relaying communications, pollution monitoring, fire detection, aerial reconnaissance and photography, coastline monitoring, traffic monitoring and control, disaster control, search and rescue, etc. With the introduction of UAS, changes need to be made on current Air Traffic Management Systems which are focused mainly manned aircrafts to support the operation of UAS. Accordingly, the legislation for the UAS operation should be followed. Currently, ICAO's Unmanned Aircraft System Study Group(UASSG) is leading the standardization process of legislation for UAS operation internationally. However, some advanced countries such as United States, United Kingdom, Australia have adopted its own legislation. Among these countries, United States is most forth going with President Obama signing a bill to integrate UAS into U.S. national airspace by 2015. In case of Korea, legislation for the unmanned aircraft system is just in the beginning stage. There are no regulations regarding the operation of unmanned aircraft in Korea's domestic aviation law except some clauses regarding definition and permission of the unmanned aircraft flight. However, the unmanned aircrafts are currently being used in military and under development for commercial use. In addition, the Ministry of Land, Infrastructure and Transport has a ambitious plan to develop commercial and civil UAS as Korea's most competitive area in aircraft production and export. Thus, Korea is in need of the legislation for the UAS operation domestically. In this regards, I personally think that Korea's domestic legislation for UAS operation will be enacted focusing on following 12 areas : (1)use of airspace, (2)licenses of personnel, (3)certification of airworthiness, (4)definition, (5)classification, (6)equipments and documents, (7)communication, (8)rules of air, (9)training, (10)security, (11)insurance, (12)others. Im parallel with enacting domestic legislation, korea should contribute to the development of international standards for UAS operation by actively participating ICAO's UASSG.

  • PDF

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

Study on High Sensitivity Metal Oxide Nanoparticle Sensors for HNS Monitoring of Emissions from Marine Industrial Facilities (해양산업시설 배출 HNS 모니터링을 위한 고감도 금속산화물 나노입자 센서에 대한 연구)

  • Changhan Lee;Sangsu An;Yuna Heo;Youngji Cho;Jiho Chang;Sangtae Lee;Sangwoo Oh;Moonjin Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.spc
    • /
    • pp.30-36
    • /
    • 2022
  • A sensor is needed to continuously and automatically measure the change in HNS concentration in industrial facilities that directly discharge to the sea after water treatment. The basic function of the sensor is to be able to detect ppb levels even at room temperature. Therefore, a method for increasing the sensitivity of the existing sensor is proposed. First, a method for increasing the conductivity of a film using a conductive carbon-based additive in a nanoparticle thin film and a method for increasing ion adsorption on the surface using a catalyst metal were studied.. To improve conductivity, carbon black was selected as an additive in the film using ITO nanoparticles, and the performance change of the sensor according to the content of the additive was observed. As a result, the change in resistance and response time due to the increase in conductivity at a CB content of 5 wt% could be observed, and notably, the lower limit of detection was lowered to about 250 ppb in an experiment with organic solvents. In addition, to increase the degree of ion adsorption in the liquid, an experiment was conducted using a sample in which a surface catalyst layer was formed by sputtering Au. Notably, the response of the sensor increased by more than 20% and the average lower limit of detection was lowered to 61 ppm. This result confirmed that the chemical resistance sensor using metal oxide nanoparticles could detect HNS of several tens of ppb even at room temperature.

Recidivism Follow-Up Study on Sex offenders under Electronic Monitoring (성범죄 전자감독대상자들에 대한 재범추적 연구)

  • Lee, SeungWon;Lee, SueJung;Seo, HyeRan
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.1
    • /
    • pp.15-33
    • /
    • 2021
  • In this study, we analyzed the difference in survival rates of those subject to electronic supervision of sex crimes based on the tracking of the period of recidivism and whether they were recidivism, and wanted to confirm the ability of the criminal record to predict recidivism. The criteria for recidivism were defined as cases where a conviction was confirmed due to a criminal case that occurred during the execution of electronic monitoring, and the date of recidivism was the date of occurrence of a case that was confirmed guilty. A total of 122 re-offenders were used in the analysis, and all of them were charged with electronic supervision for committing sex crimes. Studies have confirmed that the subjects commit the most recidivism within three years. In addition, in this study, the difference in survival rate between groups was analyzed after classifying mixed and sex recidivism cases. The number of members was 88 for the mixed recidivism group and 34 for the sex recidivism group. The analysis confirmed that both groups had the most recidivism within three years. There was a slight difference between the survival rate of the mixed recidivism group and the survival rate of the sex recidivism group. So the Log Rank Test and the Generalized Wilcoxon Test were conducted, but no statistically significant differences were identified(Wilcoxon statistic = 2.326, df = 1, p = .13, Log Rank = 1.345, df = 1, p = .25). Next, a Cox Regression analysis was performed to confirm the ability of the criminal record to predict recidivism. As a result, the number of criminal records(sex offense, violent crime) have been confirmed to be a good predictor of recidivism(X2=27.33, df=1, p< .001). As a result, the recidivism rate is gradually decreasing due to the implementation of the electronic monitoring. However, the duration of recidivism required by sex offenders in high-risk groups was found to be rather short. Currently, security measures against felons are being strengthened, so it is necessary to select high-risk groups. Therefore, based on the related studies, the characteristics of high-risk groups and the results of recidivism studies will be used as a basis for disposal within the criminal justice system, which will play a major role in granting objectivity.

  • PDF