• Title/Summary/Keyword: 신원관리

Search Result 211, Processing Time 0.022 seconds

A Study on the Improvement of the Employee Stock Ownership Plans (우리사주제의 개선에 대한 연구)

  • Kwon, Yong-man;Shin, Won-chul
    • Journal of Venture Innovation
    • /
    • v.3 no.2
    • /
    • pp.95-109
    • /
    • 2020
  • The source of value-added creation in modern times has been transformed from material to man's value-added generating power, and ownership of the means of production has been converted from a particular landlord, capitalist to a person with value-added capacity, and a system of capital participation is needed beyond the profit-sharing system or performance incentive system in which workers of an enterprise participate in simple profits if they significantly increase the added value of the company. It is also necessary to introduce our private stock system as a means of addressing the problem of capital bias and for the stable development of capitalism. The purpose of Employee Stock Ownership Plans is to improve the economic and social status of workers and promote labor-management cooperation by allowing workers to acquire and hold shares of the stock company in which the employee ownership association is established through the employee ownership association, but the reality is that our stock ownership system has failed to achieve its purpose due to insufficient protection against the employee. In terms of welfare, the acquisition of our company shares should include active government support for the welfare of workers' ownership on a social welfare level rather than on the logic of the capital market, and in terms of investment, it would not be appropriate to apply the regulation for investor protection to see workers' acquisition of our company shares as 'investment' in the view of workers' willingness to own shares on the stock market. Therefore, as a way to support and deregulate employee's stock acquisition, 1. Expanding direct support, such as tax support, 2. As employee's stock ownership association is being discussed as a division's nature, it is less effective in terms of various management, not investment, and 3. Those who own stocks with 1% of the company's shares and 300 million won in face value will be classified as major shareholders. As a way to reduce the risk of management of our company owners and cooperative funds, As a measure to reduce the risk of management of our company owners and cooperative funds, only our employee shareholders' association shall manage the fund in a long-term deposit, and even though our employee's stock is managed by the association or company after the end of the deposit period, the management of each employee shall be allowed and In terms of improving the utilization of our company's stock and fund, 1. Employee's stockholders are prohibited from lending during the deposit period, but it is necessary to improve profitability by allowing them to borrow under strict restrictions, 2. It is necessary to make the use of the employee's welfare funds available for the preservation of losses, and to stipulate the redemption obligations of unlisted companies in order to improve the redemption system of our company.

The Response Correction Function of TL Dosimeter for Shallow Dose Assessment in Tl-204 Beta Fields (Tl-204 베타선장에서의 피부선량평가를 위한 열형광선량계의 베타보정함수)

  • Lee, Sang-Yoon;Kim, Jang-Lyul;Seo, Kyung-Won
    • Nuclear Engineering and Technology
    • /
    • v.26 no.3
    • /
    • pp.381-388
    • /
    • 1994
  • Recently, the American National Standards Institute (ANSI) had made some changes in the radiation sources specified from those in the original performance test criteria ANSI N13. 11-1983. In case or beta category, in addition to the high-energy $^{90}$ Sr/$^{90}$ Y beta source, the $^{204}$ Tl source was added because many workplaces have significant levels of lower energy betas. In this study, the performance or the Teledyne PB-3 personnel dosimetry system in the fields of $^{204}$ Tl and $^{90}$ Sr/ $^{90}$ Y beta was investigated using the PTB beta secondary standard sources. The new beta correction function of PB-3 personnel dosimetry system for $^{204}$ Tl beta was also developed in this response experiment. The results show that the Teledyne PB-3 personnel dosimetry system is very effective for $^{90}$ Sr/ $^{90}$ Y beta dose assessment. In case of $^{204}$ Tl beta radiation, however, the results of simple performance test indicated that the use of beta correction factor(=2.088) which was recommanded by manufacturer may result in unexpectable overestimation of delivered dose by about 60%, while the use of developed beta correction function could measure the delivered doses in errors of 15%.

  • PDF

Temple Forest Vegetation Structure of Cultural Heritage Site in Mt. Gyeryongsan National Park - Focused on Donghaksa, Gapsa and Sinwonsa - (계룡산국립공원 공원문화유산지구 사찰림의 식생구조)

  • Song, Ju-Hyeon;Kwon, Soon-Sun;Kim, Ho-Jin;Lee, Jeong-Eun;Yun, I-Seul;Siswo, Siswo;Kim, Hyun-Seop;Yun, Chung-Weon
    • Korean Journal of Environment and Ecology
    • /
    • v.33 no.6
    • /
    • pp.722-733
    • /
    • 2019
  • This study was carried out to provide basic information for the ecological preservation management of temple forest (Donghaksa, Gapsa, Sinwonsa) by investigating the ecological characteristics of vegetation structure of the Cultural Heritage Site in Mt. Gyeryongsan National Park based on the Braun-Blanquet vegetation survey method from September 2018 to May 2019. As a result of hierarchical cluster analysis, the forest vegetation was classified into 3 vegetation units (Zelkova serrata - Akebia quinata - Kerria japonica community, VU1; Quercus serrata - Callicarpa japonica - Carpinus cordata community, VU2; and Pinus densiflora - Prunus sargentii - Fraxinus sieboldiana community, VU3). The indicator species of each vegetation unit were 12 taxa, 8 taxa, and 6 taxa, respectively. The result of the importance value analysis showed that Z. serrata had the highest importance value in all vegetation units, and the result of the species diversity analysis showed that the species diversity of VU3 was 0.939, which was relatively higher than other vegetation units. The result of the CCA of correlation between vegetation units and abiotic environmental factors showed that VU2 had a negative correlation with altitude, and biotic environmental factors had no significant correlation with vegetation units.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

CoRapport: Proactive Display Application Supporting Presentation of Various Social Web Contents in Physical Spaces (CoRapport: 실세계에서 다양한 소셜 웹 콘텐츠 표현을 지원하는 능동형 디스플레이 애플리케이션)

  • Lee, Tae-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.127-139
    • /
    • 2010
  • The concept of Web 2.0, which means that internet users are producers and also consumers is evolved according to the development of web service technology. In the Web 2.0 space, the enormous amount of web contents are produced using many social web services. Proactive display system supports various types of users's web contents. Unfortunately, private web contents sharing facility is imperfect to date. In this paper, we develop a proactive display application which identifies people, displaying their social contents such as blogs and open cafes through wide display devices or multi-media players in physical spaces. For this, we develop a social contents presentation server where users can register their profiles and information on the social contents to be shared through the developed application. Also, we develop a social contents presentation client that proactively identifies the user in close proximity and displays the user's social contents through an intuitive user interface in physical spaces. In addition, we develop an on-the-spot feedback service which supports posting various types of replies and an on-the-spot scrap service which specifies direct sharing of the contents through the intuitive user interface.

The Change and Transformation of Namsan(Mt.) Parks in Early Modern Seoul (변화와 변용으로 본 근대기 서울 남산의 공원)

  • Park, Hee-Soung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.4
    • /
    • pp.124-139
    • /
    • 2015
  • Unlike other mountains in Korea, Seoul Namsan(南山), which is one of the landmarks that represent the country's capital city, is perceived as a city park. This article aims to study the process that Namsan became a park and the transformation of its place in Korean Emperor and Japanese colonial period. The serial changes in Namsan, in early modern era, mean that is associated with the colonial urbanization and the rule of space by Japan. The stages of Waeseongdae Park(倭城臺公園), Gyeongseong Park(京城公園) and Hanyang Park(漢陽公園) under the leadership of Japan, due to the extension of Japan's power, Namsan has became the park. Here, the park has become a strategic tool of other's occupying Hanseongbu(漢城府), a capital city. The process that Namsan became a park dose not mean making the space for recreation and rest, but is an excuse for using the land. Since then, Namsan's parks barely fulfilled its original function as park as it was transformed into a shrine, Gyeongseong Jinjya(京城神社), for Japanese warriors or was incurred upon by Joseon Singung(朝鮮神宮), which was established as a facility to govern Korea, sometimes is gradually and sometimes is mercilessly. The fact, transplantation of Japanese culture and replacement as ruler space, is another aspect of occupying and govern place. In other words, while the process that Namsan became a park is the way of establishing Japanese force, the transformation of its place show a colonial rule as an aspect of space. Meanwhile, in spite of transformation to shrine, Namsan became accepted as a park for a long time, because of the forest of Namsan. Japan managed forest as a sacred place. It is also a result of the Japanese rule of space.

A Study on Spam Regulation (스팸규제에 관한 연구)

  • Baek, Yun-Chul
    • Journal of Information Management
    • /
    • v.38 no.4
    • /
    • pp.48-67
    • /
    • 2007
  • The economic burden which our society has to take exceeds the benefit that it becomes by the free circulation of information. Problems such as inconvenience or inequality between people can also occur since the regulation task of spam e-mail or SMS is imposed on two organs; the Department of Information and Communication and Free Trade Commission. The dualization of regulation separates related laws, which makes exception according to the $\ulcorner$Law on Information Communication Usage and Information Protection$\lrcorner$ or poses double regulation toward the same case. The spam prevention activity at free hands of information communication network provider such as portal site or mobile communication has many limitations along with comparison and analysis of spam regulations abroad. Therefore, examinations on legal obligation such as service restriction, identification and technical measure to spam prevention is needed. This study focuses on making the scope of spam regulation clear by considering the domestic related laws and the general environment of industry, on enacting law which regulates spam including advertisement and on deducting essential facts in enacting or modifying related laws and thus, deducting the form and contents of spam regulation law which is most decent in our domestic environment.

Comparison of the CO2 Emission Estimation Methods in a LNG Power Plant Based on the Mass Balance Approach (물질수지 방법을 고려한 액화천연가스 발전소에서의 온실기체 배출량 산정 방법 비교)

  • Kim, Hee-Jin;Yeo, Min Ju;Kim, Yong Pyo;Jang, Geon Woo;Shin, Won Geun;Lee, Myung Hwoon;Choi, Hyung Wook
    • Journal of Climate Change Research
    • /
    • v.4 no.3
    • /
    • pp.235-244
    • /
    • 2013
  • Carbon dioxide emission estimation methods consist of four tiers according to the IPCC guideline. In this study, estimated results by tier 3 and tier 4 were compared with the theoretically calculated $CO_2$ emissions based on the mass balance approach for a gas fired power plant between March and May 2011. It was found that the relative differences were upto 17% between the measured emissions by tier 4 and theoretically estimated emissions, while the results of tier 3 were similar to those from theoretically estimated ones. The comparisons suggested the possibility of misestimation due to replacing missing, abnormal, or invalid data in continuous emissions monitoring system. When using only the data without those missing, abnormal, or invalid data, the relative differences decreased somewhat but still showed consistent differences depending on the stack. It is suggested that this differences might be due to the accuracy of the measurement instruments for the tier 4, especially, for the flow rate measurement instrument.

The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password (삭제된 공인인증서의 복구 및 개인키 암호화 패스워드의 검출)

  • Choi, Youn-Sung;Lee, Young-Gyo;Lee, Yun-Ho;Park, Sang-Joon;Yang, Hyung-Kyu;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.41-55
    • /
    • 2007
  • The certificate is used to confirm and prove the user's identity in online finance and stocks business. A user's public key is stored in the certificate(for e.g., SignCert.der) and the private key, corresponding to public key, is stored in the private key file(for e.g., SignPri.key) after encryption using the password that he/she created for security. In this paper, we show that the certificate, deleted by the commercial certificate software, can be recovered without limitation using the commercial forensic tools. In addition, we explain the problem that the private key encryption password can be detected using the SignCert.der and the SignPri.key in off-line and propose the countermeasure about the problem.