Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.
Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.
Journal of the Korean Society of Marine Environment & Safety
/
v.24
no.4
/
pp.422-429
/
2018
To make students recognize the danger of fire smoke that may occur in ships and to improve the response capability, spaces for safety educ ation were built inside the training ship, and scenarios were developed. This study is an analysis of the movement characteristics of the students acquire d under each scenario. Followings are the summary of the analysis results. In the non-smoke environments, there was no difference in the velocity of escape movement between the case of without block on the familiar route and the case of with unexpected block. However, when the indoor was filled with smoke, the visibility became very low because of the smoke density and the average velocity was 62.5 % slower than the case where it was not. Regardless of the scenarios, the average equivalent velocity on the complex path was faster than the simple straight path, and the standard deviation was smaller. Under the smoke-fullfilled environment, although the relative velocity probability distributions of the complex passage and the entire passag e are very similar, the inter-individual fluctuation of the relative velocity ratio of the complex passage to that of the entire passage was very large. On the other hand, equivalent velocity could be expressed by the logarithmic function of the visibility. Also, as the tension of the students increased, the equivalent velocities were accelerated on all scenarios.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.21
no.5
/
pp.103-111
/
2021
The purpose of this study is to study a method for preventing collisions of multiple drones in controlled airspace. As a result of the study, it was proved that it is appropriate as a method to control drone collisions after setting accurate information on the ROI (Region of Interest) area estimated based on the expected drone path and time in the control system as a method to avoid drone collision. As a result of the empirical analysis, the diameter of the flight path of the operating drone should be selected to reduce the risk of collision, and the change in the departure time and operating speed of the operating drone did not act as an influencing factor in the collision. In addition, it has been demonstrated that providing flight priority is one of the appropriate methods as a countermeasure to avoid collisions. For collision avoidance methods, not only drone sensor-based collision avoidance, but also collision avoidance can be doubled by monitoring and predicting collisions in the control system and performing real-time control. This study is meaningful in that it provided an idea for a method for preventing collisions of multiple drones in controlled airspace and conducted practical tests. This helps to solve the problem of collisions that occur when multiple drones of different types are operating based on the control system. This study will contribute to the development of related industries by preventing accidents caused by drone collisions and providing a safe drone operation environment.
Journal of the Korea Academia-Industrial cooperation Society
/
v.22
no.4
/
pp.25-36
/
2021
This study analyzed the causes of flood accidents, such as isolation and lost footing accidents in Dorimcheon, to provide legal and institutional improvements. For cause analysis, Field Investigation, Stakeholder Interview, Report, manual, Law et al. Review, Analysis of water level change characteristics, automatic alarm issuance standard level analysis, and evacuation time according to river control were evaluated. Dorimcheon has the characteristics of a typical urban river, which is disadvantageous in terms of water control. In addition, the risk of flood accidents is high because the section where fatal accidents occur forms sharply curved channels. Tripping and isolation accidents occur in the floodplain watch and evacuation stage, which is the stage before the flood watch and warning is issued. Because floodplain evacuation is issued only when the water level rises to the floodplain, an immediate response according to the rainfall forecast is essential. Furthermore, considering that the rate of water level rise is up to 2.62 cm/min in Sillimgyo 3 and Gwanakdorimgyo, sufficient evacuation time is not secured after the floodplain watch is issued. Considering that fatal accidents occurred 0.46 m below the standard water level for the flood watch, complete control is very important, such as blocking the entry of rivers to prevent accidents. Based on these results, four improvement measures were suggested, and it is expected to contribute to the prevention of Tripping and Isolation Accidents occurring in rivers.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.20
no.2
/
pp.95-111
/
2021
As the population decreases in an aging society, the average age of drivers increases. Accordingly, the elderly at high risk of being in an accident need autonomous-driving vehicles. In order to secure driving safety on the road, several technologies to respond to various obstacles are required in those vehicles. Among them, technology is required to recognize static obstacles, such as poor road conditions, as well as dynamic obstacles, such as vehicles, bicycles, and people, that may be encountered while driving. In this study, we propose a deep neural network algorithm capable of simultaneously detecting these two types of obstacle. For this algorithm, we used 1,418 road images and produced annotation data that marks seven categories of dynamic obstacles and labels images to indicate road damage. As a result of training, dynamic obstacles were detected with an average accuracy of 46.22%, and road surface damage was detected with a mean intersection over union of 74.71%. In addition, the average elapsed time required to process a single image is 89ms, and this algorithm is suitable for personal mobility vehicles that are slower than ordinary vehicles. In the future, it is expected that driving safety with personal mobility vehicles will be improved by utilizing technology that detects road obstacles.
Journal of the Korea Academia-Industrial cooperation Society
/
v.22
no.4
/
pp.338-344
/
2021
Elements that threaten domestic security, such as diplomatic changes in the four major powers surrounding the Korean Peninsula and restrictions on supply and demand of parts due to COVID-19, are constantly increasing. The importance of localizing weapon systems has grown to respond proactively to the threat. As localization is not conducted evenly by the field, it is necessary to change the criteria for selecting localization targets. Establishing standards for selecting targets is difficult due to a lack of research to identify targets. This paper emphasized that the smooth supply of parts from overseas should be examined to identify targets for localization. If suppliers are not distributed evenly in the market, there is a risk of potential supply problems. CRk and HHI, representing the market structure, were proposed as indicators for evaluating the degree of smoothness quantitatively. Among them, CRk is used in Korea to check the market concentration, but there is a limit in the subjectivity of the evaluator, so it cannot be applied without a separate study on the market structure. Therefore, HHI should be applied.
This study has examined how the welfare system has changed as it has passed through the most controversial period in Korean modern history. The welfare system has changed in a way that adapts to the need for export-led economic growth. Industrialization centered on light industry, which started in the mid-1960s, absorbed the labor force that existed in the rural areas and commodified them, thereby creating a momentum for Korean society to get out of poverty. However, the public de-commodification, ie social security system, adapted to the commodification of the labor force has been institutionalized only in a very limited area and people. Indeed, the de-commodification system was confined to the area directly linked to the reproduction of the labor force. Even so, the target was very limited in the abundance of labor in rural areas. Compulsory medical insurance was rejected because of corporate burden, and industrial accidents insurance was introduced centering on large-scale workplaces. As the Korean economy began to move from the light industry to the heavy industry in the 1970s, the commodificated labor force changed from a low skilled labor force to a skilled male labor force. It is at this time that dual structures have begun to be created between workers employed in export-oriented large enterprises and workers employed in domestic-oriented SMEs. Therefore, the system of de-commodification that supports the reproduction of labor power in response to social risks has also been institutionalized centering on large-scale workplaces.
Kim, Myung-Eun;Kim, Cheonyong;Yim, Yongbin;Kim, Sang-Ha;Son, Young-Sung
KIPS Transactions on Computer and Communication Systems
/
v.7
no.12
/
pp.301-312
/
2018
In industrial wireless sensor networks, the continuous object detection such as fire or toxic gas detection is one of major applications. A continuous object occurs at a specific point and then diffuses over a wide area. Therefore, many studies have focused on accurately detecting a continuous object and delivering data to a static sink with an energy-efficient way. Recently, some applications such as fire suppression require mobile sinks to provide real-time response. However, the sink mobility support in continuous object detection brings challenging issues. The existing approaches supporting sink mobility are designed for individual object detection, so they establish one-to-one communication between a source and a mobile sink for location update. But these approaches are not appropriate for a continuous object detection since a mobile sink should establish one-to-many communication with all sources. The one-to-many communication increases energy consumption and thus shortens the network lifetime. In this paper, we propose the origin-centric communication scheme to support sink mobility in a continuous object detection. Simulation results verify that the proposed scheme surpasses all the other work in terms of energy consumption.
Journal of the Korean Applied Science and Technology
/
v.35
no.4
/
pp.1185-1196
/
2018
The purpose of this study was to investigate the effects of 12-week aquarobics exercise on blood lipids, atherogenic index, and liver functions in elderly women. The subjects for the study were 25 healthy elderly women volunteers, aged 65 to 80 years, composed of the aquarobics exercise group (n=13) and control group (n=12). Twice a week for 60 minutes for 12 weeks. The exercise intensity was set to RPE 11-12 for 1 week to 4 weeks, RPE 13-14 for 5 week to 8 weeks and RPE 15-16 for 9 week to 12 weeks respectively. The test data were analyzed by two-way repeated measures ANOVA, paired t-test, and independent t-test. The alpha level of .05 was set for all tests of significance. The results of the study in the aquarobics exercise group were as follows; LDL-C (p<.05), AST (p<.05) had significantly decreased, with TC (p<.01), TG (p<.05), LDL-C (p<.05), LDL-C/HDL-C (p<.05), TG/HDL-C (p<.05), AST (p<.001) significantly lower than control group. Consequently, these findings suggest that regular aquarobics exercise will be effective for preventiy the metabolic syndrome and cardiovascular health in elderly women.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.