• Title/Summary/Keyword: 정보보호실태조사

Search Result 78, Processing Time 0.022 seconds

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

An Analysis of Growth Conditions of old Trees in Yangdong Villages (양동마을의 노거수 생육실태 분석)

  • Kim, Young-Hun;Deng, Bei-Jia;You, Ju-Han
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.38 no.2
    • /
    • pp.95-107
    • /
    • 2020
  • The purpose of this study is to provide the basic data by analyzing and analysing the Growth Conditions of old Trees in Yangdong village. This study investigated about the conducted on tree information, soil information, and tree health. The result are as follows. The trees information in Yangdong Village consists of Juniperus chinensis, Salix chaenomeloides, Salix pseudolasiogyne, Celtis sinensis, Zelkova serrata, Gleditsia japonica, and Gleditsia sinensis trees, The range of height was 4.0~17.0m, and the diameter was 0.51~1.34m, Juniperus chinensis trees of No.17 was most large. In the results of soil analysis, there showed that acidity was pH4.1~6.3, hardness of 5~48mm, organic matter content of 21.2~29.1g/kg, electrical conductivity(EC) of 0.34~1.76dS/m, available P2O5 of 79.8~451.6mg/kg, exchangeable K of 0.22~1.71cmol+/kg, exchangeable Ca of 4.98~7.44cmol+/kg, exchangeable Mg of 0.67~2.19cmol+/kg, exchangeable Na of 0.19~1.04cmol+/kg and cation exchange capacity(C.E.C) of 7.23~13.02cmol+/kg. As a result, the highest number of tree health levels is 8 of 11trees of Celtis sinensis, 2 of 7trees of Zelkova serrata, and 3 of Gleditsia sinensis, and 13 of 30 trees of health levels, The Older trees with high infection, spoil and hollowed part were the remaining trees except for the healthy part. Relatively, more than half of the number of targets is infected, decay, and the hollowed site, and it is necessary to perform surgery on the damaged area. In addition, preservation and protection measures should be implemented by supplying root nutrients for trees, controlling nutrients in the body to prevent secondary and tertiary damages that cause the infection site to metastasize to the health site, In order to continually monitor the trees, measures to improve the location environment and management of the trees should be sought.

Infection Control in Pulmonary Function Laboratories in Domestic Hospitals (국내 의료기관의 폐기능검사실에서 감염관리 실태조사)

  • Nan-Hee LEE;Suhng Wook KIM
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.3
    • /
    • pp.143-150
    • /
    • 2023
  • The global outbreak of COVID-19 has underscored the pressing need for robust infection control practices in pulmonary function laboratories (PFL). However, the existing guidelines and regulatory frameworks provided by relevant authorities in the country have revealed certain deficiencies in effectively addressing this significant public health crisis. This study surveyed the infection control regulations, disposable item usage, ventilation facilities, spatial separation, and the configuration of entrance doors in 51 domestic hospital facilities from Oct 1, 2021, to Nov 2, 2021. The survey findings revealed that while there was a relatively satisfactory adherence to airborne, droplet, and contact precautions with adequate awareness and utilization of personal protective equipment, the environmental disinfection practices exhibited a suboptimal performance rate of 39.22% per patient. Depending on the specific survey domains, substantial variations were observed in the utilization of disposable items (81.05%), ventilation systems (45.75%), dedicated testing spaces (80.39%), separation of administrative areas (15.69%), and the installation of automated doors (19.61%). This study not only highlights the paramount importance of infection control in PFLs within domestic medical institutions but also provides foundational data for developing and enhancing standardized guidelines that align with international benchmarks for infection control in these settings.

Diagnosis of Real Condition and Distribution of Protected Trees in Changwon-si, Korea (창원시 보호수의 분포현황과 실태진단)

  • You, Ju-Han;Park, Kyung-Hun;Lee, Young-Han
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.1
    • /
    • pp.59-70
    • /
    • 2011
  • The purpose of this study is to present raw data to systematically and rationally manage the protected trees located in Changwon-si, Korea. This study investigated about the present condition and the information of location, individual, management, health and soil. The results are as follows. The protected trees were located in 26 spots, and species of trees were 9 taxa; Zelkova serrata, Celtis sinensis, Aphananthe aspera, Ginkgo biloba, Carpinus tschonoskii, Pinus densiflora for. multicaulis, Quercus variabilis, Pinus densiflora and Salix glandulosa. In protected tree types, shade trees were the most, and the majority of theirs were 200 years or more in age. The range of altitude was 14~173m, and the number of trees located in flat fields was the most. For location types, village and field and mountain were presented in the order and, in land use, land for building was the most. The range of height was 8.0~30.0m, 0.6~5.1m in crown height, 240~700cm in diameter of breast and 210~800cm in diameter of root. In case of crown area, Zelkova serrata of No.5 was most large. The status boards were mostly installed except No.23 and No.26. The sites with fence were 9 spots, and the site with stonework were 14 spots. The sites with the support beam were 5 spots, and most sites were not covered up with soil. The materials of bottom were soil, gravel and vegetation in the order. The range of withering branch rate was 0~40%, and peeled bark rate was 0~60%. The sites made holes were 23 spots, and the hole size of Aphananthe aspera of No.12 was the largest. The sites disturbed by human trampling were 7 spots, the sites by disease and insects of 2 spots, the sites by injury of 23 spots and the sites by exposed roots of 13 spots. In the results of soil analysis, there showed that acidity was pH 4.5~8.0, organic matter content of 3.5~69.8g/kg, electrical conductivity(EC) of 0.11~2.87dS/m, available $P_2O_5$ of 3.0~490.6mg/kg, exchangeable K of 0.10~1.05cmol+/kg, exchangeable Ca of 1.41~16.45cmol+/kg, exchangeable Mg of 0.37~1.96cmol+/kg, exchangeable Na of 0.25~2.41cmol+/kg and cation exchange capacity(C.E.C) of 8.35~26.55cmol+/kg.

An Exploratory Investigation of Archival Reference Services in the National Archives of Korea (국가기록원의 기록제공서비스에 관한 탐색적 연구)

  • Seol, Moon-Won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.3
    • /
    • pp.103-124
    • /
    • 2022
  • This study aims to suggest the use-based policies for archival reference service by investigating the actual archival uses and services of the National Archives of Korea (NAK). Considering that there is little information on the overall archival reference service by NAK, an exploratory research method is adopted to understand the current status and issues of the service. In this study, the use of archival records in NAK is investigated from statistical data, and service cases by record type are collected through interviews with archival service professionals of NAK. Then, the success and risk factors of the archival reference service are analyzed in three categories of human resources (reference archivists' competency), tools (finding aids), and records (appropriateness and sufficiency). Based on these analyses, archival reference service policy directions are proposed to strengthen the two different archival roles as "arsenal of rights protection" and "academic information provider."

A study on invention.intellectual property education content reflection status and needs analysis in secondary vocational education (중등단계 직업교육에서의 발명.지식재산 교육내용 반영 실태 및 요구 분석 연구)

  • Lee, Byung-Wook;Lee, Chan-Joo;Lee, Sang-Hyun
    • 대한공업교육학회지
    • /
    • v.39 no.2
    • /
    • pp.1-18
    • /
    • 2014
  • This study took existing invention intellectual property related textbooks being utilized in secondary vocational education, analyzed the formation status of 'key learning elements' reflection ratio and drew optimum key learning elements formation ratio by invention intellectual property education content required in secondary vocational education in the future. For this, the study task was set up as 'what kind and how much of invention intellectual property key learning elements are in the invention intellectual property textbook education content now and what is the desirable ratio of each key learning elements in the future'. To resolve this task, 3 specialists analyzed the invention intellectual property education content reflection status and optimum reflection ratio by invention intellectual property education content required in the future is suggested by Delphi survey. The results of this study are as following. First, the result of analysis on invention intellectual property key learning elements included in the invention patent recognition books being utilized in secondary vocational education was that the books included all key learning elements; however, some textbooks have the trend of concentrating in D area (problem-solving activities). Second, the result of analysis on the reflection ratio by invention intellectual property education content area in the invention patent recognition books being utilized in secondary vocational education was that there was the trend in most textbooks that they concentrate in intellectual property creation area; while some textbooks deal with intellectual property protection area and intellectual property utilization area. Regarding by achievement type, knowledge area was main in all textbooks. Meanwhile, function area is dealt in invention patent basic, invention and problem-solving and design textbooks. Attitude area is not dealt or is dealt insufficiently in most textbooks. Third, the optimum reflection ratio of invention intellectual property education key learning elements required in secondary vocational education in the future as obtained by specialists' delphi survey was that it is necessary to decrease D (problem-solving activities) 17.7% area, E(invention fusion knowledge) 2.9% area, K(patent application) 6.9% and L(patent information investigation) area 9.6%. Regarding the optimum reflection ratio of invention intellectual property education content, it is suggested that the invention literacy area 3.1%, intellectual property creation area 4.5% and intellectual property protection area 10.6% would be decreased; while intellectual property utilization area 17.7% would be increased. Regarding optimum reflection ratio of achievement type, it is suggested that knowledge area 52% would be decreased; while function area 32.3% and attitude area 19.6% would be increased.

An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure (정부의 정보 보안 대책 법제화의 사전 효과성 분석 방법)

  • Shim, Woohyun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.241-256
    • /
    • 2015
  • In order to ensure that all firms are cyber-secure, many governments have started to enforce the implementation of various security measures on firms. Prior to the implementation, however, it is vague whether government enforced security measures will be effective for mitigating cyber-security risks. By applying a method for estimating the effectiveness of a mandatory seatbelt law in reducing fatalities from motor vehicle accidents, this study develops an ex ante evaluation method that can approximate the effectiveness of a government enforced security measure in reducing country-wide or industry-wide cyber-security risks. Using data obtained from the Korean Internet and Security Agency, this study then explores how to employ the developed method to assess the effectiveness of a specific security measure in mitigating cyber-security risks, if enforced by the government, and compares the effectiveness of various security measures. The comparison shows that compulsory security training has the highest effectiveness.

Privacy Situation and Countermeasures of Financial Apps based on the Android operating system (모바일 앱 개인정보 침해현황 및 대응방안 (금융, 안드로이드 운영체제 중심으로))

  • Kim, Bo;Lim, Jong-In;Jo, Yong-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.267-272
    • /
    • 2014
  • Customers who register at mobile banking service through startphone has 40Mil in first quarter of 2014, which was increased 8.5%(3.6Mil) compare to figure from end of year 2013. Average 1 trillion 627.6billion won is dealing through smartphone banking in daily and three for increased psychological bullying caused by malignant code which change normality to malignant. The results of the analysis current state of affairs of personal information collection management authority required in finance smartphone app service and also recommend solution for protecting finance consumers plans to minimized collecting personal information in smartphone finance app service.

A Study on the Tree Surgery Problem and Protection Measures in Monumental Old Trees (천연기념물 노거수 외과수술 문제점 및 보존 관리방안에 관한 연구)

  • Jung, Jong Soo
    • Korean Journal of Heritage: History & Science
    • /
    • v.42 no.1
    • /
    • pp.122-142
    • /
    • 2009
  • This study explored all domestic and international theories for maintenance and health enhancement of an old and big tree, and carried out the anatomical survey of the operation part of the tree toward he current status of domestic surgery and the perception survey of an expert group, and drew out following conclusion through the process of suggesting its reform plan. First, as a result of analyzing the correlation of the 67 subject trees with their ages, growth status. surroundings, it revealed that they were closely related to positional characteristic, damage size, whereas were little related to materials by fillers. Second, the size of the affected part was the most frequent at the bough sheared part under $0.09m^2$, and the hollow size by position(part) was the biggest at 'root + stem' starting from the behind of the main root and stem As a result of analyzing the correlation, the same result was elicited at the group with low correlation. Third, the problem was serious in charging the fillers (especially urethane) in the big hollow or exposed root produced at the behind of the root and stem part, or surface-processing it. The benefit by charging the hollow part was analyzed as not so much. Fourth, the surface-processing of fillers currently used (artificial bark) is mainly 'epoxy+woven fabric+cork', but it is not flexible, so it has brought forth problems of frequent cracks and cracked surface at the joint part with the treetextured part. Fifth, the correlation with the external status of the operated part was very high with the closeness, surface condition, formation of adhesive tissue and internal survey result. Sixth, the most influential thing on flushing by the wrong management of an old and big tree was banking, and a wrong pruning was the source of the ground part damage. In pruning a small bough can easily recover itself from its damage as its formation of adhesive tissue when it is cut by a standard method. Seventh, the parameters affecting the times of related business handling of an old and big tree are 'the need of the conscious reform of the manager and related business'. Eighth, a reform plan in an institutional aspect can include the arrangement of the law and organization of the old and big tree management and preservation at an institutional aspect. This study for preparing a reform plan through the status survey of the designated old and big tree, has a limit inducing a reform plan based on the status survey through individual research, and a weak point suggesting grounds by any statistical data. This can be complemented by subsequent studies.

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.