• Title/Summary/Keyword: 운영조직

Search Result 1,679, Processing Time 0.032 seconds

The Devices for Improvement against the Precedents about unfair Transactions in the Security Industries (경비업계에 있어서의 불공정거래의 사례 개선방안)

  • Kim, Tae-Wan
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.37-60
    • /
    • 2006
  • The area of security service has been maintaining the high growth curve annually by improving security consciousness from increase of the income and the progress of public services's level by the accomplishment in the info-communication field, recently the demand for unmanned security system is extended form commercial purposes into public offices and individual's houses. In addition to, the possible distance of offering services is scheduled to magnify. At the period when security company's influence has been becoming significant, the injustice transaction is the serious factor which obstructs the development of security companies. Therefore, it is urgent thing to devise counterplans to extirpate injustice transactions. There are the legalistic approaches of the breakthroughs against injustice transactions. One thing is settling the standard of the judgment and the other is renovating the provision of injustice transactions. Utilizing the principles of the fair competitions and importing self-obedience programs within the range of trade actions which is permitted by law, acted as the system approach. Moreover, there are such three things which can achieve mutual balances as establishing the range of the permitted action toward business corporations, applying spontaneously the fair competition principles and introducing the system of standard agreements. Gong further, this can establish order of security service areas and control them. Besides, it is possible for every organizations to make and operate the system appropriately by importing the self-observance system.

  • PDF

A discussion on the issues of human trafficking and global economy, HIV, and inhumanity: A case study of Nepal women (인신매매와 관련된 국제경제, HIV, 그리고 비인간적 문제들에 대한 담론: 네팔여성들에 대한 사례제시를 중심으로)

  • Jang, Duck-Hyung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.171-187
    • /
    • 2016
  • Human trafficking is a booming underground business and is the fastest growing and criminal activity in today's society. The use of coercion or fraud marks the territory of trafficking. Most people trafficked suffer constant threats, violence, and forced acts while imprisoned by their traffickers. Such human trafficking entails significant problems not only for the victims but also for the economies and community health. Large corporations overseas have also been known to partake in the sex slave industry. Another hidden cost to the global economy is the cost of law enforcement and anti-trafficking measures being implemented. Further, sex Trafficking carries many potential health consequences, one of the biggest risks is HIV infection. That means, sex trafficking is an engine of the global AIDS epidemic with one study portraying nearly fifty six percent of all sex slaves having HIV or AIDS. Therefore, many of people are being infected with HIV and many other diseases every day through contact with the sex slave industry costing millions to society and the global economy. in this study, the author presents a case study of trafficking against Nepalese women. Nepalese women being trafficked are found to have a high prevalence of HIV infection. In conclusion and discussion, a few of solutions needed to be addressed for controling human trafficking for sex slavery suggested.

  • PDF

Stakeholder Networks Supplying Rural Tourism in The Mekong Delta, Vietnam: The Case of Thoi Son Islet, Tien Giang Province (메콩델타지역 농촌관광의 공급자 네트워크: 티엔장성(省) 터이선 섬을 사례로)

  • Hoang, Chau Ngoc Minh;Kim, Doo-Chul
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.423-444
    • /
    • 2013
  • Tourism in Thoi Son Islet has been the advanced model for rural tourism in the Mekong Delta region since the 1990s. The continuously rising number of tourists, however, has also created problems that affect sustainable rural development. To understand these problems, this research analyzed how rural tourism has been operated through the methodology of a stakeholder network. After investigating the network among key stakeholders (Ho Chi Minh travel agencies (HCMTAs), local travel agencies (LTAs), and local residents, the result showed that in the current model, HCMTAs and LTAs have played the role of connectors, working as hubs to shift tourists (demand) to match local residents (supply), with the networking being dominated by signed contracts (formal networks). The networks between LTAs and local residents are both formal and informal. Inter- and intra-networks among local residents are dominated by informal networks of established working relationships based on networks of family, friends, and neighbors. Moreover, this research has found that there is no cooperating network among LTAs. Among owners of tourist sites was not also found cooperating network. The primary motivating factor for these stakeholders is price competition; this has led to a disproportionately small share of revenue for local stakeholders, with most tourism revenue going to HCMTAs. Additionally, because of the high competition among local stakeholders, this results in local stakeholders having little or no negotiating power when conducting business with HCMTAs. Meanwhile the Tien Giang Tourism Association is inefficient in fostering cooperation among local stakeholders to increase their negotiating power.

  • PDF

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

Service Life Assessment and Restrain Methods of Carbonation Attack on PC Outer Wall of LNG Storage Tanks (탄산염해에 대한 LNG 저장탱크 PC 외부벽체의 수명평가 및 억제방안)

  • Lee, Seung-Rim;Song, Il-Hyun;Kim, Han Sang
    • Journal of the Korean Institute of Gas
    • /
    • v.18 no.2
    • /
    • pp.73-80
    • /
    • 2014
  • The objective of this paper is to assess the service life and retrain methods of specimens, which were subjected to carbonation attack, obtained from mix proportion of Sam-cheok LNG storage tank under construction. As the results, accelerated-carbonation penetration depths of 7, 28, 56 ages indicated 4.45, 9.19, 13.37mm, and even considering for cover depths of steel of LNG storage tank under real operation, it was enough. In addition, with carbonation velocity coefficient calculated by carbonation penetration depths, the service life to design cover depth(70, 80, 90, 100mm) of PC outer tank of LNG storage tank was 779, 1017, 1287, 1589 years and 466, 609, 771, 951 years, respectively, considering the $CO_2$ concentration in air which account for the 0.03% and 0.05%. Also, the restrain methods to carbonation attack were feasible through controlling the factors affecting the changes of hydration products such as $Ca(OH)_2$, ion composition in pore solution and matter mobility of organization structures within hardened concrete.

Performance Prediction Model for Public-Private Partnership Projects Considering Stakeholders' Profitability (참여자별 수익성을 고려한 민간투자사업 성과예측 모델)

  • Yeo, Dong Hoon;Yu, Giwon;Lee, Kang-Wook;Han, Seung-Heon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.2
    • /
    • pp.471-480
    • /
    • 2015
  • The market of public-private partnership (PPP) projects has reduced from 9.4 trillion won in 2007 to 4.5 trillion won in 2012. However, the need of PPP projects is brought up by a massive down scale of government financial business. Previous studies regarding PPP projects mostly evaluate profitability from the financial perspective or analyze risk factors as a whole. Although PPP projects generally have complex structure involving diverse stakeholders, such as contractor, financial investor, and special purpose company (SPC) operators, existing studies have rarely considered the different viewpoints of PPP project stakeholders. Therefore, purpose of this study is to develop a structural equation model (SEM) considering the diverse stakeholders of PPP projects. To this end, the authors first reviewed the organizational structure of PPP projects. Next, the identification of the factors affecting project profitability are done via comprehensive literature reviews. After that, we conducted in-depth interviews and questionnaire surveys to reflect stakeholders' perspectives (contractors, financial investors, and SPC operators). As a result, a SEM model is developed to analyze direct and indirect effect on the PPP project performances. Finally, using the analysis results, relevant implications and directions for improvements are discussed. The prediction of the business performance of contractor, financial investor, and SPC operator is expect to be possible through the model developed and supports the strategy deduction that is appropriate for the participants.

The Hybrid Fault Tolerant Technique for Embedded System (임베디드 시스템을 위한 복합 결함 허용 기법)

  • Kook, Joong-Jin;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06b
    • /
    • pp.273-278
    • /
    • 2007
  • 검사점 및 복구 도구(Checkpointing & Recovery Facility)를 이용하여 임베디드 시스템에서 결함 허용(Fault Tolerance) 기법을 적용할 경우 쓰기 작업의 오버헤드로 인해 실용성이 크게 떨어지게 된다. 실시간 운영체제와 함께 어떠한 한계 상황에서 결함 허용 및 복구 도구가 오히려 시스템의 성능을 저하시키는 요인으로 작용하게 되면 이는 결국 쓸모없는 도구가 되어 사용되지 않을 것이다. 따라서 프로세스의 복구를 위해 저장하는 프로세스 이미지의 기록에 소요되는 시간을 크게 낮추어야만 비로소 검사점 도구가 그 진가를 발휘하게 될 수 있다. 본 논문에서는 NVSRAM(Non Volatile SRAM)을 검사점 및 복구 도구의 저장 장치로 활용함으로써 기존의 검사점 도구에서 성능을 저하시키는 주원인이었던 검사점 기록의 오버헤드를 개선하기 위한 연구를 수행하였다. 검사점 기록 시간을 줄이기 위한 방법으로 주 메모리에 저장된 프로세스의 복구와 관련된 데이터를 SRAM 특성을 갖는 비휘발성 저장 장치인 NVSRAM에 저장하여 디스크 접근에 소요되는 시간을 최소화시킴으로써 임베디드 시스템에서 실용적으로 사용 가능한 검사점 도구를 구현하였고, 이러한 연구의 결과를 검증하기 위해 기존 시스템에서 저장 장치로 사용되던 플래시 메모리, 주 메모리, 원격 메모리를 사용하는 경우의 성능과 NVSRAM을 활용할 때의 성능을 비교해 보았다. 본 연구에서 제안하는 결함 허용 도구는 실제 시스템에 적용하여 효과적인 성능을 발휘할 수 있을 것이며, 차세대 메모리를 이용한 결함 허용 도구의 연구에 기여를 할 수 있을 것으로 기대된다.ate첨가배지(添加培地)에서 가장 저조(低調)하였다. vitamin중(中)에서는 niacin과 thiamine첨가배지(添加培地)에서 근소(僅少)한 증가(增加)를 나타내었다.소시켜 항이뇨 및 Na 배설 감소를 초래하는 작용과, 둘째는 신경 경로를 통하지 않고, 아마도 humoral factor를 통하여 신세뇨관에서 Na 재흡수를 억제하는 작용이 복합적으로 나타내는 것을 알 수 있었다.으로 초래되는 복합적인 기전으로 추정되었다., 소형과와 기형과는 S-3에서 많이 나왔다. 이상 연구결과에서 입도분포가 1.2-5mm인 것이 바람직한 것으로 나타났다.omopolysaccharides로 확인되었다. EPS 생성량이 가장 좋은 Leu. kimchii GJ2의 평균 분자량은 360,606 Da이었으며, 나머지 두 균주에 대해서는 생성 EPS 형태와 점도의 차이로 미루어 보아 생성 EPS의 분자구조와 분자량이 서로 다른 것으로 판단하였다.TEX>개로 통계학적으로 유의한 차이가 없었다. Heat shock protein-70 (HSP70)과 neuronal nitric oxide synthase (nNOS)에 대한 면역조직화학검사에서 실험군 Cs2군의 신경세포가 대조군 12군에 비해 HSP70과 nNOS의 과발현을 보였으며, 이는 통계학적으로 유의한 차이를 보였다(p<0.05). nNOS와 HSP70의 발현은 강한 연관성을 보였고(상관계수 0.91, p=0.000), nNOS를 발현하는 세포가 동시에 HSP70도 발현함을 확인할 수 있었다. 결론: 우리는 cyclosporin A가 토끼의 25분간의 척수허혈에 대해 척수보호 효과가 있었으며 이는 HSP70의

  • PDF

A Study on Geographical Analysis of Natural Disaster and Disaster Risk Management in Vietnam (베트남 자연재해의 지리적 분석 및 재난위험관리에 관한 고찰)

  • Yoon, Cho-Rong;Yoo, Young-Min;Lee, Ha-Na;Lee, Ja-Won
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.476-476
    • /
    • 2011
  • 베트남은 자연재해로 인해 매년 평균 750명 이상의 사망자가 발생하고 있으며, 경제적인 피해 또한 한해 GDP의 1.5%에 달하고 있다. 저먼워치(Germanwatch)의 2010년 세계기후위험지수(Global Climate Risk Index, GCRI)의 전 지구적 기후재난에 관한 국가별 순위 조사에서 베트남은 4위에 기록되었다. 베트남의 자연재해는 상당 비중이 풍수해에 집중 되어 전체 재해의 86%를 차지하고 있고, 이는 대부분 해안 지대와 강 유역의 홍수 및 범람에서 비롯된 것이다. 베트남 전체인구의 약 70%가 상습적 홍수와 범람 발생 지역인 해안가에 거주하고 있어 재난에 예방 및 복구 관리에 대한 국가 차원의 방안이 시급한 실정이다. 본 연구에서는 과거 30년간의 풍수해 관련 재해에 대한 기록상 추이를 통해 공간적으로 재난에 취약한 지역적 분포를 살펴보고, 그 지역의 지리적 특성을 분석하여 재해에 관한 종합적 고찰을 하였다. 벨기에 루뱅대학 부설 재난역학연구센터(Centre for Research on the Epidemiology of Disasters, CRED)의 EM-DAT를 이용하여 과거 기록상의 개괄적인 재해양상에 관한 추이를 살펴본 결과 대부분의 재난은 풍수해에 집중이 되어 있음을 분석하였고, 베트남 풍수해조정기관인 홍수및폭풍조정중앙위원회(Central Committee for Flood and Storm Control, CCFSC)의 최근 30년간 풍수해에 관련된 통계 자료를 정리하여 상습적 재난 피해지역을 지도상에 표시하였다. 이 때 지구지도제작운영위원회(International Steering Committee for Global Mapping, ISCGM)의 D_WGS_1984 Datum을 바탕으로 한 베트남 shape file을 이용하여 풍수해에 따른 인명피해, 경제적 손실, 발생횟수 등에 관한 사항을 일반화 시켜 재난 취약지역을 지리적으로 분석하였다. Thanh hoa, Quang nam, Binh Dinn, Camau성이 풍수해와 관련된 재난에 취약하게 노출되어 있음을 도출하였다. 재난에 상대적으로 취약한 이들 지역에 대한 현재의 재난 관리는 어떻게 이루어지고 있는지에 관해 현재의 풍수해관리 사업단의 조직적 구조와 그 기능 및 역할을 살펴보고, 국제적 원조 사례를 분석하여 상습적으로 재난의 위험 지역에 대한 지속적인 관리와 복구를 어떻게 이루어 나갈 것인지에 대한 방안 및 제언에 관하여 논의하고자 한다. 베트남의 재난 관리에 관한 지리적인 종합 분석은 기존 양상의 재해에 대한 방안을 구축하는 데 대한 제언뿐만 아니라 기후변화와 관련된 재난을 예측하고 관리 방안을 설정하는 데 기초 자료를 제공할 수 있을 것이다.

  • PDF

An Analysis on the Optimal Level of the Maintenance Float Using Absorbing Markov Chain (흡수 마코프 체인을 활용한 적정 M/F 재고 수준에 관한 연구)

  • Kim, Yong;Yoon, Bong-Kyoo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.2
    • /
    • pp.163-174
    • /
    • 2008
  • The military is an organization where reliability and availability take much more importance than in any other organization. And, in line with a recent trend of putting emphasis on 'system readiness', not only functions but also availability of a weapon system has become one of achievement targets. In this regard, the military keeps spares for important facility and equipment, which is called as Maintenance Float (M/F), in order to enhance reliability and availability in case of an unforeseen event. The military has calculated yearly M/F requirements based on the number of equipment and utilization rate. However, this method of calculation has failed to meet the intended targets of reliability and availability due to lack of consideration on the characteristics of equipment malfunctions and maintenance unit's capability. In this research, we present an analysis model that can be used to determine an optimal M/F inventory level based on queuing and absorbed Markov chain theories. And, we applied the new analysis model to come out with an optimal volume of K-1 tank M/F for the OO division, which serves as counterattack military unit. In our view, this research is valuable because, while using more tractable methodology compared to previous research, we present a new analysis model that can describe decision making process on M/F level more satisfactorily.