• Title/Summary/Keyword: 보호부담

Search Result 296, Processing Time 0.025 seconds

Benefit-Cost Analysis and Sustainability of National Pension (국민연금의 수급부담구조분석과 지속가능성)

  • Kim, Seongyong;Bang, Junho;Park, Yousung
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.4
    • /
    • pp.603-620
    • /
    • 2015
  • The National Pension of Korea is a public social security system designed to alleviate social risks and poverty that has had a major impact on the quality of life for the aging population. However, a rapidly aging population and low fertility threaten the sustainability of national pension in Korea. The National Pension Research Institute publishes a nancial projection every ve years; consequently, the government has lowered the entitlements for the sustainability of national pension based on the projection results. The current reform of the pension system that arbitrarily reduces the entitlements might detract from the income security role of the national pension for pensioners without accounting for the highest elderly poverty rate in the OECD countries. We first discuss methods for the financial projection of the national pension in terms of population, subscribers, and pensioner projections in order to estimate the pension reserve fund and the financial depletion year. We also conduct a sensitivity analysis for population variables, institutional variables, and economic variables based on pension reserves and the financial depletion year. We evaluate intergenerational fairness between the income hierarchy by conducting a money's worth analysis. Finally, we investigate the possibility of the sustainability of national pension by adjusting pension contributions and entitlements (income replacement rate). A new dependency ratio shows that a simple reform of the national pension does not secure the sustainability of the national pension without adapting a pay-as-you-go system.

Utilization of Medical Assistance Patients in Nursing Hospital (의료급여환자의 요양병원 이용에 관한 연구)

  • Lee, Yong-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.366-375
    • /
    • 2017
  • The purpose of this study is to analyze the use of hospital, hospitalization, medical service, discharge and power of medical care patients who are concerned about moral hazard. We conducted focus group interview with 3 medical care patients and their families and 5 workers who had worked for more than 4 years in a nursing hospital. The main results and implications are as follows. First, admission to nursing hospitals was mostly based on the linkage between the medical institutions and the competition to attract the patients rather than the choice of the patients. Second, the main cause of the long-term hospitalization of medical assistance patients was the lack of social protection measures such as absences of residence and care giver, although there are factors that cause moral hazard such as low self-pay. Third, most of the patients were in need of treatment, but they were admitted to the hospital even though their needs were not higher than those of the health insurance patients. Fourth, the rehabilitation service is the mainstay of the medical service of the nursing hospital, and the roles of nursing staff and care givers are important. Fifth, medical care patients are paying medical expenses for nursing hospitals due to cost of living and family support, but they are exempted from the hospital expenses or the burden of their own expenses in the hospital. Sixth, public institutions and social welfare institutions have not managed continuously since commissioning patients to nursing hospitals and have neglected the connection with community services after discharge.

Liability for Damages Due to Violation of Supervisory Duty by the Legal Guardian of the Mental Patient (정신질환자 보호의무자의 감독의무 위반으로 인한 손해배상책임 -대법원 2021. 7. 29. 선고 2018다228486 판결의 검토-)

  • Dayoung Jeong
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.133-170
    • /
    • 2022
  • Supreme Court 2018Da228486, on July 29, 2021, ruled Article 750 of the Civil Act as the basis for liability for damages due to the violation of the supervisory duty of the responsible mental patient. This judgment recognizes that the legal guardian is liable for tort due to neglect of the responsibility of supervision under Article 750 of the Civil Act because the duty of protection bears the duty of supervision over the mental patient under the law. However, unlike the case of Article 755 Paragraph 1, which explicitly requires a legal obligation to supervise, Article 750 only stipulates general tort liability. Thus, to admit tort liability under Article 750, it is not necessary that the basis of the supervisory duty by the law. In this case, the supervisory duty may also be acknowledged according to customary law or sound reasoning. The duty of supervision of a legal guardian is not a general duty to prevent all consequences of the behavior of a mental patient but a duty within a reasonably limited scope. Therefore, the responsibility of the burden of care should be acknowledged only when the objective circumstances in which it is appropriate to hold the legal guardian for the acts of the mental patient are admitted. Under the Act on the improvement of mental health and the support for welfare services for mental patients, a legal guardian cannot even be granted the supervisory duty to prevent the mental patient from harming others.

Indigenous psychological analysis of delinquency among Korean adolescents: Comparison of adolescents under probation and high school students (한국 일탈 청소년의 토착심리 탐구: 보호관찰 청소년과 일반 청소년의 부모자녀관계에 대한 비교를 중심으로)

  • Young-Shin Park ;Uichol Kim ;Soo Yeon Tak
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.1
    • /
    • pp.107-145
    • /
    • 2004
  • This study examines factors that influence delinquency among adolescents under probation using indigenous psychological analysis, focusing specifically on parent-child relationship. A total 268 adolescents under probation and their parents and 251 high school students and their parents participated in the two studies. In the first study, qualitative results indicate that both groups of adolescents were most likely to trust their parents than any other person and reason for their trust is reported to be based on blood relationship. Similarly, majority of parents of both groups reported trusting their children because of the blood relationship. Parents hope that their children will be sincere a person and will be able to maintain harmonious social relationship. Parents of adolescents under probation were more likely to report disobedience as being most problematic, whereas parents of high school students were more likely report providing social and financial support for their children's education as being the most difficult. In the second study, structured questionnaires were administered to the four groups and the following set of results were obtained. First, in terms of family background, the socio-economic status of adolescents under probation was lower, they are less likely to live with both parents or natural parents, and more likely to have ran away from home than high school students. Second, adolescents under probation are less likely to trust their parents and more likely to view their parents as being hostile. Third, parents of adolescents under probation were less likely to trust their children, more likely to view their relationship as being conflictual and hostile, and feel that they had to sacrifice for their children when compared with parents of high school students. Implications of these results for parent-child relationship and delinquency are discussed.

  • PDF

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme (조건값의 개수에 독립적인 조건부 프록시 재암호화 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.147-155
    • /
    • 2013
  • Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption. To solve this problem, conditional proxy re-encryption scheme was proposed. But, it is computationally expensive generate the same number of re-encryption key with the number of condition values. In this paper, we propose an efficient conditional proxy re-encryption scheme in terms of re-encryption key generation. The proposed scheme uses only encryption and decryption process. Therefore it has advantage to generate one re-encryption key for one person. The proposed scheme is secure against chosen-ciphertext attack.

Methods for the Revitalization about LBS Mobile Games -Comparative Analysis between Internal and Overseas Case Study- (위치기반(LBS) 모바일게임의 활성화방안 -국내게임과 해외게임의 사례연구를 중심으로-)

  • Yu, Sung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.11
    • /
    • pp.74-84
    • /
    • 2008
  • Mobile game is a killer content among the various mobile contents provided by Telecommunication companies. Recently, Location Based Service (LBS) market is growing rapidly and LBS will be a killer content in the near future. As a consequence, mobile game combined with LBS will be a dominant trend of mobile content. However, there exist some limitations on the revitalization of the mobile service market. In this paper, analysis of the restrictions on the mobile service market is performed and then methods for the revitalization of the mobile service market are proposed various billing system is required to reduce network fee for users, a new policy to protect privacy has to be offered, and the infrastructure for high network performance should be developed. The result of this research will provide key role to find a new and more innovative approach to enhance the interaction design of the future Location Based Mobile Games.

사이버 아파트 네트워크 기본 설계에 관한 연구

  • Choe Chang-Geun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.2
    • /
    • pp.107-115
    • /
    • 2002
  • 최근 정부(정보통신부)는 사이버 아파트를 포함하여 초고속 정보통신망을 2005년까지 구축하여 각 가정당 10Mbps의 고속 정보통신 서비스를 실현한다는 계획을 발표하고, 초고속 정보통신을 활성화하므로 정보통신 선진국 진입을 위하여 "초고속 정보통신 건물 인증제도"를 발표, 현재 시행하고 있다. (1999.7 제정발표) 그러나 시행 과정에서 아파트 중앙 관리실에 있는 MDF 이후의 광케이블과 기타 공사는 건설회사에서 시공하고 중앙 관리실 MDF 이전의 광케이블 공사와 중앙관리실 LAN시설 등의 공사는 통신 전문업체로 하여금, 입주자 별도 부담금으로 시공하고 있다. (컨소시엄 구성) 최근 아파트 분양열기 고조로 건설회사 마다 "초고속 정보통신 아파트"인증 1등급이라고 선전 및 분양광고 중인데 실제는 "1등급"이 아니고 "2등급" 또는 "3등급"인 경우가 있어, 정부가 목표하는 각 가정당 10Mbps, 개인당 2Mbps 고속정보통신 서비스는 실현성에 문제점이 있다. 정부의 인증심사 기준에 중앙관리실 장비 등에 대한 것은 심사기준에 누락되어 있고 또 사생활 정보보호를 위한 대응기술, 시스템 준비 정도까지 포함하여 종합적으로 평가한 뒤 인증을 부여하여야 한다는 것이 본인의 연구 초점이다. 사이버 아파트란 광통신을 주축으로 영상과 음성, 데이터를 자유자재로 전송 처리하는 초고속정보통신망을 이용하는 것으로 LAN 장비를 이용하여 각 세대간 통신은 물론 누구나 인터넷을 사용할 수 있는 기능이 있는 설계된 아파트를 말한다. 사이버 아파트의 네트워크에는 금융, 홈쇼핑, 예약, 지역정보, 관공서, 의료서비스, 레저 생활정보 등 차별화된 콘텐츠 확보가 필요하다. 본 연구의 핵심은 사이버 아파트의 현 실태와 문제점, 정부의 인증심사 기준의 미비점과 문제점, 사이버 아파트의 기능, 구성요소, 시스템 구축, 서버활용도, 장비들에 관한 것과 그리고 정부의 사이버 아파트 육성정책, 정보보호 대책과 관련업체들의 동향 등을 연구하여 요약 정리하였다.

  • PDF

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.