• Title/Summary/Keyword: 사회적 위협

Search Result 670, Processing Time 0.032 seconds

Feasibility Study for the Reconstruction of Kwanghee Middll School Building (서울 광희중학교 재개발계획 연구요약)

  • Min, Chang-Kee
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.3 no.3
    • /
    • pp.41-57
    • /
    • 1996
  • 본 연구는 광희중학교 학구내에서 재개발로 인하여 증가되는 인구수을 예측하여 장래 중학교 학생수를 예측하였다. 2016까지 학급당 학생수를 37명으로 하고 36학급 규모의 학교를 추구한다면 중학교는 적어도 1개 더 건축하여야만 재개발로 늘어나는 제1학군의 학생수를 수용할 수있을 것음을 분석하였다. 또, 교과과정을 분석한 결과 도덕 2.5교실, 국어 6교실, 사회 5교실, 수학 5교실, 과학 5교실, 체육 4교실, 음악 2교실, 미술 2교실, 가정 1.5교실, 기술 3교실, 영어 5.5교실, 한문 1교실, 컴퓨터 1교실로 분석되어 이용율이 88%가 되었다. 본 연구는 광희중학교 구체적 건축계획에 앞서 계획의 모델을 설정하여 이를 토대로 계획에 임하였다. 광희중학교 주변의 접근성, 교통 조건, 소음 상태, 지역사회인의 이용, 전망 등의 환경 분석을 토대로 4개의 죠닝(Zonning)안을 제시하여 평가한 후 가장 바람직한 안을 선정하였다. 이를 토대로 브록(Block)프랜을 5개 작성하여 평가후 1개 안을 채택하여 구체적 평면 계획안을 작성하였다. 36학급 37명 학생수를 기준으로 교과교실형으로 계획하였으며 특별 교실형의 학습도 가능하게 계획하였다. 교수, 학습의 복합화에 대처하여 칸막이를 이동 가능한 형태로 계획하였으며, 일반 교과도 컴퓨터를 이용한 수업이 가능하게 정보 코너를 설치하였다. 지역사회인에게 열린 교실이 되게 계획하였고 개별 학습이 가능한 구조로 계획하교 기자재의 선진화를 대비한 학습 환경의 제고도 고려하였다. 본 연구의 입면 형상은 주변 건물과 조화되게 수평적 요소가 강조되는 형상이 되도록 계획하며 고층의 아파트의 위협을 상쇄시키기 위하여 지붕이 있는 구조로 계획하여 지역사회에서 중심임을 강조하도록 계획하였다.

  • PDF

Analysis of seasonal environmental ecological flow at Han River tributary vulnerability points (한강 지류 취약지점에서의 계절별 환경생태유량 분석)

  • Yeon jung Noh;Seong joon Kim;Eun mi Hong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.146-146
    • /
    • 2023
  • 우리나라의 하천은 도시의 급격한 산업화와 공업화로 인해 이수, 치수 목적을 중심으로 관리되어왔다. 그러나 최근 기후변화의 가속화와 댐과 같은 인공 구조물로 인해 하천의 수질 및 흐름이 위협받으면서 하천 환경개선에 대한 문제가 사회적으로 대두되고 있다. 하천의 생태기능은 하천에서 살아가는 각종 생물의 서식 조건을 유지함으로써 하천이 환경적으로 건강한 상태를 유지하도록 하는데 중요한 역할을 한다. 따라서 하천 환경개선을 위해서는 하천 생태기능 유지를 위한 최적 유량을 확보해야 한다. 일반적으로 하천의 생태기능을 보존하는데 필요한 최적 유량에 대한 평가에는 USGS(United States Geological Survey)에서 개발한 어류에 대한 유량과 서식지 가용성사이의 관계를 바탕으로 하는 물리적 서식처 모형 (Pysical HABitat SIMulation, PHABSIM)이 널리 사용되고 있다. PHABSIM은 가중가용면적(Weighted Useable Area, WUA)과 유량의 관계곡선을 산출하여 생태유량을 산정할 수 있게 한다. 본 연구에서는 최근 10년 동안 어류 건강성 평가에서 낮은 등급을 받은 탄천 대왕교 지점을 대상으로 PHABSIM을 이용한 어류의 계절별 최적 생태유량을 산정했다. 연구에 사용된 유량자료는 2012부터 2021년까지의 데이터가 사용되었다. 탄천의 대표 어종으로는 각 하천에서 우점종으로 선정된 Zacco platypus가 사용되었다. 각 연도별 그리고 계절별 하천 유량의 변화에 따른 환경생태유량 분석을 통해 제시된 각 하천의 최적 환경유지유량에 대한 결과는 한강권역 환경생태유량 산정 및 하천 관리를 위한 기초자료로 활용할 수 있을 것이다.

  • PDF

A Critical Approach on Family Support, Social Security, and its Direction: Focusing on Old Parents and Children from Divorced Families (가족부양 쟁점에 관한 일고찰: 노인과 이혼가족 아동을 중심으로)

  • Song, Da-Young
    • Korean Journal of Social Welfare
    • /
    • v.57 no.2
    • /
    • pp.143-164
    • /
    • 2005
  • The study is to analyze support-related issues, particularly associated with elderly and children care, which have been a fundamental agenda of family welfare policy. We are expected for societal-level controversy on the relationship of family support and social security in the near future because of rapid increase in ageing and divorce rate. Accordingly, we need to establish social consensus on the extent to which both family support system and social support system are responsible for the life maintenance of the elderly and the children from divorced family. We also clarify the various characteristics(including scope, degree, period of time, and need/manageability) of support provided by family members. Considering the changes of family structure and population composition, the policy of supporting the old and children should go for social responsibility. Findings show that civil law and social welfare law have unclear application on the relationship between family support and social security, and contents in family support. In particular, public assistance law strongly emphasizes the principle of family support while social insurance laws provide only limited and insufficient family maintenance. The suggestions of further study on support-related issues are given in the rapidly changing society and the increasing economic instability.

  • PDF

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

A Study of the British Armed Forces Policy Utilizing Female Personnel during the War on Terror (테러와의 전쟁 시기 영국군의 여성인력 활용정책 연구)

  • Cho, Sang Keun;Kim, In Chan;Hong, Myung Sook;Yu, Sun Young;Chun, So Min;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.203-208
    • /
    • 2022
  • The U.K. during the war on terrorism, the number of military serviceable resources decreased and the volunteer recruitment rate decreased due to the decline in the birth rate, but faced a situation in which complex security threats from IS and Russia gradually increased. As one of the measures to overcome these challenges, the British military promoted a policy to break down existing social conservatism and assign female personnel to close combat positions. The British military formed a consensus within the military through discovery of female military use cases, longitudinal studies, and combat experiments, and then conducted strategic communication to form a social consensus and collect public opinions. In addition, to improve the reliability of the policy, established a combat fitness evaluation system that any combatant who performs close combat should pass. In Korea, amid accelerating competition for hegemony between the U.S. and China, security threats are increasing due to a decrease in military serviceable resources caused by population cliffs. Therefore, the case of the British military will give us considerable implications while also helping to provide the direction necessary for establishing future women's workforce policies.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

The Mutual Assistance System and Cooperation between South Korea, the U.S. and China for the North Korean Nuclear Issue and Unification of the Korean Peninsula (북핵과 한반도 통일에 대한 한·미·중 3국 공조체제와 협력)

  • Kim, Joo-Sam
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.71-96
    • /
    • 2017
  • This study speculates on responses to the nuclear threats of North Korea and mutual assistance and cooperation between South Korea, the U.S. and China for the unification of the Korean Peninsula. As for the North Koreas nuclear issue and unification of the Korean Peninsula, South Korea is the subject of national division, the U.S. is a responsible country in international issues and does not have diplomatic ties with North Korea. China is a traditional socialist nation and a supporter of North Korea. As North Korea's strategic weapons including nuclear weapons and ballistic missiles are international issues, to defend against Kim Jung-Eun's unexpected acts, the three countries should actively cooperate with each other and develop countermeasures. However, with respect to the road map of the North Koreas issue, there are subtle differences between the U.S. and China in recognition of and sanctions against North Korea as a resolution of the U..N. Security Council. The U.S. has continued a deterrence policy and sanctions against North Korea based on joint threats between South Korea and the U.S. while China has showed a negative position in the process of solving the North Korean nuclear issue because of the unstable security derived from the U.S. 's intervention in the Korean peninsula. North Korea should change its diplomatic policy in a more concrete way towards world peace although it has continued trade of strategic weapons with Middle Eastern countries to maintain its political system. For example, to restart the summit talks and open multilateral security channels. Although the issue of unification of the Korean peninsula should be resolved by South and North Korea themselves, it is strange that South and North Korea depend on the logic of powerful countries for the resolution of a national problem. As for North Koreas nuclear and the Unification issues, peaceful solutions presented by South Korea seem more persuasive than the solution presented by North Korea which did not secure any international support. However, South Korea, the U.S. and China need to develop uni-directional two-tract strategies for sanctions against North Korea and talks with North Korea for peace on the Korean peninsula, and should continue to support the economic independence of North Korea.

Determinants of Secondary Traumatic Stress among Public Social Welfare Specialists (사회복지전담공무원의 이차적 외상스트레스 결정 요인)

  • Yang, Jung-Bin;Kim, Doe-Yoon;Ryu, Soon-Ok;Kim, Ja-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.115-125
    • /
    • 2015
  • This study was to identify major risk factors associated with secondary traumatic stress in a sample of 654 public social welfare specialists. Findings indicated that 69.0% of the subjects experienced secondary traumatic stress, and 36.9% of them were in a high-risk group. Multiple regression analysis showed that the risk of the secondary traumatic stress was associated with gender, work hours, physical violence and threats from clients, coping strategies, and vocational self-efficacy. Based on these results, several interventions for preventing the incidence of secondary traumatic stress among public social welfare specialists are suggested as the follows: construction of secure job environment, development of educational programs for improving vocational self-efficacy and coping skills, and implementation of mental health screening system on a regular basis to prevent the outbreak of mental disease among the workers.