• Title/Summary/Keyword: 정보보호 서비스

Search Result 2,646, Processing Time 0.03 seconds

A Study on the Objective Opinion of Private Investigation Service (민간조사제도 도입 반대 의견에 대한 고찰)

  • Jeng, Il-Seok;Park, Jun-Seok;Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.465-484
    • /
    • 2007
  • Our society's modernization created many opportunities for us to need a private investigation service system. Variation of international environment due to joining in the OECD, opportunity of individual legal, collect evidence during judgement, prevention of damage criminal, security of business in company, free trade economy's system etc and don't need to enumerate how important of introduction of private investigation service system. In addition to there are lots of objection opinions, such as possibility of person's private life, invade of lawyer's area, confliction with investigation team, gap of wealth and poverty that make preponderance of information. So this research can be considerate from objective opinion, and can obtain conclusion just like below. First, private detective agencies that encroach on the individual rights will naturally deteriorate after the implementation of private investigation service system. Through this, the probability of civil rights encroachment will be lower, and for this to happen there needs to be a thorough maintenance of the system. Secondly, mutually beneficial solution should be found not by a conflict between two sides. Detective business sector should not cause social confusion from conflicts with other investigation organization such as police, or investigators, rather, it must get on the demand of the diversified citizen and maintain the diverse sector inter-cooperate right, and to do that law and institution must be made for the base. Thirdly, investigation used depending on the gap between wealth and poverty does not mean the actualization of the rights and interests of the citizen. If the duty of investigation sector is to find the evidence and collect or manufacture of the evidence, then the problems which the nation can't handle will be more enlarged and then finally end up with strengthening the capability of national public security demand.

  • PDF

A Basic Study on the Establishment of Designated Area for Conservation plan of Traditional Landscape - Focus on the Designation Status of Linear Scenic Sites - (전통경관 보존계획을 위한 지정구역 설정에 대한 기초연구 - 선형(線形) 명승의 지정 현황을 중심으로 -)

  • Lee, Chang-Hun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.38 no.1
    • /
    • pp.67-76
    • /
    • 2020
  • This study aims to elicit criteria regarding reassessment and designation of linear scenic sites henceforth. The results are as follows; First, based on the documents from the Cultural Properties Protection Committee of Korea, 23 out of 113 scenic sites in Korea were drawn, and their linear characteristics were categorized into four types including valleys, paths, rivers, and ridges. The linear scenic sites provide certain features in terms of sequence and direction, which results in the similar utilization among the sites which share the linear similarity. Second, the 23 sites mentioned above were intensely examined on the basis of six criteria for linear scenic sites through FGI, focus group interview. The criteria consist of six elements involving core resource(12), lot number(8), unclear(8), management path(5), ridge(4), basin(3). Third, the Cultural Heritage Administration has prioritized core resource since 2010, when designating a scenic site, whereas it tended to consider lot number as priority prior to 2010. It is thought that the authority gave consideration to issues related to private ownership of property in the scenic sites and the purpose of designation. Fourth, scenic sites are generally designated in accordance with the boundary of core resource, and in most cases, there are buffer zones alongside the core resource.

Nursing Students' Attitudes toward Abortion and Perceptions of Euthanasia and Good death (간호대학생의 낙태에 대한 태도와 안락사 및 좋은 죽음에 대한 인식)

  • Kim, Kyung sook
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.68-76
    • /
    • 2021
  • This study was attempted to understand the relationship between the attitudes toward abortion, euthanasia, and the level of perception of good death among nursing college students and related factors. The data were collected by using structured questionnaires and the subjects were selected in C and G city. The research method was a descriptive research study, and the mean, standard deviation, frequency analysis, and Pearson's correlation coefficients were analyzed for the variables. The results of this study are as follows. The degree of support for the abortion opposition was 2.51±.56 (score range 1-4), and the opposition to abortion was superior to the approval..The perception of euthanasia was 3.06±.47 points (4 point scale), which was positively recognized at a higher level than the middle, and the good death perception was 2.97±.47 points (4 point scale), which was moderate. 97.1% of the respondents said that they had abortion decisions, and 5.7% of the university students experienced abortion. The attitude toward abortion showed negative correlation with the attitude toward euthanasia (r=-.374, p<.001), showing that the more supportive the anti-abortion, the more positive the attitude toward euthanasia. Therefore, it is necessary to educate the subjects to protect and respect the human rights of patients based on the dignity of life and humanistic thinking while providing nursing services.

A Study on the Moderating Effects of Social Support and Stress Coping Behaviors in between Parenting Stress and Depression of Grandparents of Grandparents and Grandchildren Family (조손가족 조부모의 양육스트레스와 우울 간 사회적 지지와 대처행동의 조절효과)

  • Song, Yoo-Mee;Lee, Seon-Ja
    • 한국노년학
    • /
    • v.31 no.3
    • /
    • pp.795-811
    • /
    • 2011
  • Recently, an interest on how to moderate parenting stress of grandparents is rising according to rising depression of grandparents of grandparents and grandchildren family(GGF) because of parenting stress So, this study tried to analyze moderating effects by setting social support and stress coping behaviors as moderator variable in order to know how much parenting stress of grandparents would influence their depression. For this purpose, we selected 369 cases of grandparents who were being provided social welfare service and to 334 cases out of them, did multigroup analysis using hierarchical regression analysis and structural equation model under spss Vor. 19.0 program. Followings are the results. First, the more parenting stress was high, the more depression high. But when social support was high, parenting stress low. And the more parenting stress was high, faith dependence, negative emotional expression and passive evasion as stress coping behaviors also high while problem reestablishment low. Second, emotional support, information support, and material support as social support had moderating effects in which parenting stress influenced depression while appraisal support had not. Third, faith dependence and low passive evasion as stress coping behaviors had moderating effects in influence of parenting stress to depression while problem reestablishment has not. On the one hand, emotional expression was meaningless in explaining moderating effects in connection with parenting stress. Through these, we draw a social welfare practical implication that could lift moderating effect of social support and stress coping behavior in between parenting stress and depression of grandparents of grandparents and grandchildren Family.

Research on Training and Implementation of Deep Learning Models for Web Page Analysis (웹페이지 분석을 위한 딥러닝 모델 학습과 구현에 관한 연구)

  • Jung Hwan Kim;Jae Won Cho;Jin San Kim;Han Jin Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.517-524
    • /
    • 2024
  • This study aims to train and implement a deep learning model for the fusion of website creation and artificial intelligence, in the era known as the AI revolution following the launch of the ChatGPT service. The deep learning model was trained using 3,000 collected web page images, processed based on a system of component and layout classification. This process was divided into three stages. First, prior research on AI models was reviewed to select the most appropriate algorithm for the model we intended to implement. Second, suitable web page and paragraph images were collected, categorized, and processed. Third, the deep learning model was trained, and a serving interface was integrated to verify the actual outcomes of the model. This implemented model will be used to detect multiple paragraphs on a web page, analyzing the number of lines, elements, and features in each paragraph, and deriving meaningful data based on the classification system. This process is expected to evolve, enabling more precise analysis of web pages. Furthermore, it is anticipated that the development of precise analysis techniques will lay the groundwork for research into AI's capability to automatically generate perfect web pages.

A Study on the Timing and Method of the Final Price of Air Ticket in Computerised Booking System (인터넷 항공권 예약시스템에서의 '최종가격' 표시시기와 방법 - 2015년 1월 15일 EU사법재판소 C-573/13 판결을 중심으로 -)

  • Sur, Ji-Min
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.327-353
    • /
    • 2017
  • The issue submitted to the Court of Justice on the merits of case C---573/13 originated from a claim brought in the context of a dispute between Air Berlin and the German Federal Union of Consumer Organisations and Associations. The challenge concerned the way in which air fares were displayed in Air Berlin's computerised booking system. The system was organised in such a way that, after selecting a date and a departure airport, one would find all possible flight connections in a summary table. However, the final price of the ticket was displayed only for the clicked connection, and not for all connections, thus preventing customers from being able to compare such price with the prices of other connections. The German Federal Union took the view that this practice did not meet the requirements laid down by Article 23 of Regulation (EC) No. 1008/2008, which requires transparency in the prices set for air services. This led the German State to bring an injunctive action to cause Air Berlin to discontinue said practice. The claim was upheld at both the application and appeal stage of the relevant proceedings. Subsequently, Air Berlin submitted the matter to the German Federal High Court, which decided to stay the proceedings and ask for a preliminary ruling from the Court of Justice as to 1. whether Article 23 of Regulation (EC) No. 1008/2008 must be interpreted as meaning that, during the computerised booking process, the final price to be paid must be indicated at all times when prices of air services are shown, including when they are shown for the first time; and 2. whether, during the computerised booking process, the final price must be indicated only for the air service specifically selected by the customer or for each air service shown. In a nutshell, the Court, by the here---discussed judgment determined that Article 23 of Regulation (EC) No. 1008/2008 must be interpreted as meaning that, in the context of a computerised air ticket booking system, the final price to be paid must be indicated not only for the air service specifically selected by the customer, but also for each air service in respect of which the fare is shown. Clearly the above judgment will place air companies under an obligation to update and adjust (when needed) their computerised ticket booking and payment systems, in consideration of the primary need for consumers to be aware at all times of the actual price payable for a ticket and be able to compare the price of the service selected with the prices for other air services in respect of which the fare is shown.

  • PDF

A Study on Women's Casino Security Employees (여성 카지노 시큐리티 종사원에 관한 연구)

  • Kim, Hyeong-seok
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.135-158
    • /
    • 2020
  • In casinos, security personnel who manage the safety of customers and employees play a very important role. In particular, there is a high percentage of female employees in casinos, and because the ratio of female and male employees is similar, the probability of female customers or female employees experiencing accidents may be similar to or higher than that of males. Women's security agents who handle women's case accidents can provide female customers and employees with a security service that only women can do. However, most of the agents doing security work at casinos are male, and the proportion of women is very low. Therefore, this research is about employees who are currently working as women in casinos and conducted qualitative research to find out about various experiences they experienced while working in the casino. A total of five study participants were interviewed three times to analyze and categorize the data collected. The first question is the professor's recommendation, his personal information search and his acquaintance's recommendation. The second question, the factors behind the necessary skills at work, are various athletic skills, good physical conditions and foreign language skills. In the third question, the satisfaction factors of the task are the scarcity value of the work, the satisfaction of the pay, the suitability of the individual and the expectation of the future, and the unsatisfactory factors of the work are the risk of the work, the stress on the customer, the discrimination against the sex, the gaze around, the tiredness of the shift work. In the fourth question, factors on the need for female casino security agents are providing differentiated services to female customers, protecting female employees and providing opportunities for women in related majors. The results of this study were interviewed by an expert of more than 20 years in the casino security business, and female casino security agents said that since it is a necessary requirement, they should seek a direction for development through institutional and cognitive improvement.

Changes in the Behavior of Healthcare Organizations Following the Introduction of Drug Utilization Review Evaluation Indicators in the Healthcare Quality Evaluation Grant Initiative (의료질평가지원금 제도의 의약품안전사용서비스 평가지표 도입에 따른 의료기관의 행태 변화)

  • Hyeon-Jeong Kim;Ki-Bong Yoo;Young-Joo Won;Han-Sol Jang;Kwang-Soo Lee
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.178-184
    • /
    • 2024
  • Background: This study aimed to determine the effectiveness of drug utilization review (DUR) evaluation indicators on safe drug use by comparing the changes in DUR inspection rates and drug duplication prescription prevention rates between the pre- and post-implementation of the DUR evaluation indicators of the Healthcare Quality Evaluation Grant Initiative. Methods: This study used DUR data from the Health Insurance Review and Assessment Service in 2018 (pre-implementation) and the evaluation results of the Healthcare Quality Evaluation Grant Initiative in 2023 (post-implementation). The dependent variables were the DUR evaluation indicators, including DUR inspection rate and drug duplicate prescription prevention rate. The independent variable was the implementation of the DUR evaluation indicators, and the control variables included medical institution characteristics such as type, establishment classification, location, DUR billing software company, and number of beds. Results: The results of the analysis of the difference in the prevention rate of drug duplicate prescriptions between the pre- and post-implementation of the DUR evaluation indicators of the Healthcare Quality Evaluation Grant Initiative showed that the prevention rate of drug duplicate prescriptions increased statistically significantly after the implementation of the DUR evaluation indicators. Conclusion: The policy implications of this study are as follows: First, ongoing evaluation of DUR systems is needed. Second, it is necessary to establish a collaborative partnership between healthcare organizations that utilize DUR system information and the organizations that manage it.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF