• Title/Summary/Keyword: 사회적 위협

Search Result 670, Processing Time 0.025 seconds

The Case Study of Bangladesh for International Cooperation on the Vulnerable Region of Natural Hazard (자연재해 증가 지역의 국제협력 지원 방안을 위한 방글라데시 사례 연구)

  • Lee, Jawon
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.340-351
    • /
    • 2013
  • International society has been making a lively discussion about natural disaster by climate change to mitigate natural hazard centering around intra-government association. This study dealt with a strategic mitigation and technical adaptation to support a habitual natural disaster region such as Bangladesh in terms of international cooperation for assistance to protect against the natural hazard. The land-cover on scale of one third of Bangladesh is situated lower than sea level that causes habitual flooding accident which gets increasing in the strengthen every single year. Most of people lives around exterior sea coast being faced with disaster of abnormal storm forming every three year cycle. Especially, the socio-economic status of the people in the coast is usually very low, and it need to get help from international cooperation aid. Therefor, the case study for the vulnerability of natural disaster in Bangladesh on geographical analysis is meaningful to join the international cooperation taking a part of role on technical support and education for adaptation of the natural disaster.

  • PDF

The danger and vulnerability of eavesdropping by using loud-speakers (스피커를 이용한 도청 위험에 대한 연구)

  • Lee, Seung Joon;Ha, Young Mok;Jo, Hyun Ju;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1157-1167
    • /
    • 2013
  • The development of electronic devices has recently led to many problems such as personal information rape and leakage of business information. Conventional loud-speakers have been generally used to output devices. It can be, however, operated as a micro-phone which was abused as a means for eavesdropping since the speaker and microphone have basically the equivalent structure. Most importantly, the general peoples are not aware of the approaching danger about using speaker as microphone. And, traditional eavesdropping detection equipment does not check the attack. In this paper, we demonstrate that there is a serious danger and vulnerability in using loud-speakers since they can be used as eavesdropping devices.

The Study on a Security Safeguard Plan for SCADA Infrastructure (SCADA 시설에 대한 보안강화 방안에 관한 연구)

  • Chung, Yoon-Jung
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2006
  • The control system is accomplishing very important role in our life currently as the national critical Infrastructure and large scale industry plant. We manage SCADA system to manage generally the control system interconnected with the information system. The operating system of SCADA is changing also to the well-known OS like Windows or UNIX for offer various convenience and facility to the user. We offered the reason why such change of the system makes so that it is exposed to cyber terror. In the traditional SCADA system is managed safely by an isolated network system physically. It is the trend to increase gradually though a cyber terror possibility is thinner on a control system than a information system but the cyber terror gives a nation or community wide damage influence of large scale if it happens. Therefore this paper presents a security safeguard plan about SCADA system and helps prepare systematic security strategy and enhance the security level implement.

  • PDF

Study on Subsurface Collapse of Road Surface and Cavity Search in Urban Area (도심지 노면하부 지반함몰 및 공동탐사 사례 연구)

  • Chae, Hwi-Young
    • Tunnel and Underground Space
    • /
    • v.27 no.6
    • /
    • pp.387-392
    • /
    • 2017
  • Recently, road cave-ins, also referred to as ground sinking, have become a problem in urban environments. Public utility facilities such as sewage pipelines, communications pipes, gas pipes, power cables, and other types of underground structures are installed below the roads. It was reported that cave-ins are caused by the aging and lack of proper maintenance of underground facilities, as well as by construction problems. A road cave-in is first initiated by the formation of cavities typically induced by the breakage of underground pipelines. The cavities then grow and reach the base of the pavement. The traffic load applied at the surface of the roads causes an abrupt plastic deformation. This type of accident can be considered as a type of disaster. A road cave-in can threaten both human safety and the economy. It may even result in the loss of human life. In the city of Seoul, efforts to prevent damage before cave-ins occur have been prioritized, through a method of discovering and repairing joints through the 3D GPR survey.

Analysis on the tendency of international terrorism against Koreans occurred in overseas countries (해외에서 발생한 우리국민의 국제테러리즘 피해사례 경향분석)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.69-74
    • /
    • 2015
  • Korea has established diplomatic relations with 190 countries in the world. It opened its diplomatic offices in 113 countries. Korea raised its status in international society through multinational force peace activities, national defense cooperation activity and UN peace maintenance activity for the maintenance of world peace. But there have been vio lent crimes by terrorist organizations and armed groups that try to achieve their political, religious and ideological go als greatly damaging Koreans working in overseas countries. This research studied the tendency of international terr orism against Koreans. The suggestion and conclusion are as follows. First, the study shows that armed groups and extremists have threatened and attacked Koreans in overseas countries. But there aren't enough personnel who can i mmediately and correctly analyze and respond the threats and attacks. So it is urgent to raise experts continually an d develop manuals to respond the attacks. Next, the damaging targets in overseas countries have been changed from hard targets to soft targets. There could be a limit in the restriction of basic rights of people by governmental agenc ies. So it is necessary for people to show mature civic awareness not going to a tourism-prohibited area.

Conservation and Vegetation Structure of Euchresta japonica (Leguminosae) in Jeju Island (제주도 만년콩(콩과) 자생지의 식생구조와 보전 방안)

  • Song, Gwan-Pil;Jang, Chang-Gee;Kang, Shin-Ho
    • Korean Journal of Plant Resources
    • /
    • v.25 no.1
    • /
    • pp.89-95
    • /
    • 2012
  • This study was conducted to provide basic information for conservation and restoration through investigation of vegetation structure on the Euchresta japonica Hook. f. ex Regel (Korean endangered species) in Mt. Halla in Jeju Island. Very few individuals were discontinuously distributed and restricted at 220 m above sea level, very steep slope ($40-50^{\circ}$), rocky area of north face of Donneko Valley. For investigation of environmental condition, we established $10{\times}20\;m$ quadrat and one control $20{\times}20\;m$ quadrat in the habitats. Thirty three species were found at habitat under 10-16 m Castanopsis sieboldii tree layer (70-80%). The principal causes of threat which were investigated in this study are competition among companies, very steep slopes, artificial management of valley. For restoration and conservation of habitats, it is needed to suitable plans.

Alcohol Status and Related Factors of Drinking Problems among Residents at Permanent Rental Apartments (영구임대아파트 지역주민의 음주실태와 음주문제 관련요인)

  • Lee, Youn-Ju;Kim, Hee-Kyung;Lee, Mihyoung;Yoo, Jin-Hee;Park, Sang-Joo;Yeu, Ki-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1227-1239
    • /
    • 2015
  • The purpose of this study was to identify alcohol status and related factors of drinking problems among Residents at Permanent Rental Apartments in Incheon. Data was collected from 20 August 2012 to 28 September 2012, and the 663 subjects were analyzed using SPSS 18.0. The data was analyzed by using descriptive statistics, chi-square test and logistic regression. As a result of survey, alcohol consumption was low, but prevalence of alcohol was high. From the logistic regression analysis, age(less than 40), unmarried, drinking reason for habituation, insomnia, anxiety, unemployed and interpersonal relationships were associated with in drinking problems of the residents of permanent rental apartments. Considering of these variables, the future research is necessary to provide an individual approach based on problem drinking level as well as to provide a proactive approach and policy development for of permanent rental apartment residents.

Methodology of Extraction of Crime Vulnerable Areas Through Grid-based Analysis (격자망분석을 통한 범죄발생 취약지역 추출 기법)

  • Park, Jin Yi;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.4
    • /
    • pp.221-229
    • /
    • 2015
  • The urban crimes that threat individual's safety are parts of the serious social problems. However. the information of crime in Korea has only been provided by forms of hot spots around place of crime, or forms of crime statistics without positional information. Those could not provide enough information to users in identifying the vulnerable areas for substantive crimes. Therefore, this study suggested a methodology of extraction in criminal vulnerable areas by using the spatial information, the statistical information and the public sector information. The crime vulnerable areas were extracted through the grid-based spatial analysis and the overlapping analysis from each of the information. In fact, the extracted areas were able to provide detailed vulnerability information than the traditional hot spot-based crime information. Following the study, the extracted results in crime vulnerable areas have displayed highly coincide with Korea safety map, provided by national disaster management institute, which regards to be able to provide crime risk rating in terms of administrative business in future.

The Impact of Real Estate Value Changes on Retirement Preparation : Focusing on Private Pensions (부동산의 가격변화가 노후준비에 미치는 영향 : 사적연금을 중심으로)

  • Kim, Dae Hwan;Lee, Dong Hyun
    • Korea Real Estate Review
    • /
    • v.28 no.3
    • /
    • pp.53-64
    • /
    • 2018
  • OECD countries have been stimulating private pensions instead of public pensions because the financial stability of public pensions has been threatened by the aging population. Korea, which has the fastest aging population in the world, has been following the recommended policies of major countries. Unlike major economies, however, most of Korea's household assets are composed of real estate assets. Due to the economic and social importance of real estate assets in Korea, the wealth effect of real estate has been used as a major tool in macroeconomic policy. This study analyzed the effect of real estate value changes on the contribution of private pensions (personal pension + retirement pension). Utilizing a two-way, fixed effect model with the balanced panel data of the National Survey of Tax and Benefit, empirical results presented that the private pension contribution increased by 0.171% when the value of real estate increased by 1%. Thus, real estate value changes were analyzed as positive for retirement preparation through private pension. These results suggested that if the real estate market would shrink in the future, consumption would decrease, and the degree of preparation for retirement might be smaller.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.