• Title/Summary/Keyword: 정보 인권

Search Result 125, Processing Time 0.024 seconds

Latent Profile Analysis Method Application in the Job Satisfaction Types and Predictive Factors of Social Welfare Institution Workers (잠재프로파일 분석방법 적용을 통한 사회복지시설 종사자의 직무만족도 유형과 예측요인)

  • Hyoung-Ha Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.177-179
    • /
    • 2023
  • 본 연구에서는 사회복지시설 종사사의 직무만족도 유형을 살펴보고 유형별 예측변인과의 영향관계를 검증하였다. 이러한 연구목적을 검증하기 위해 보건복지부의 '사회복지시설 실태조사'(2014년) 데이터에서 직무만족도 변인에 모두 응답한 11,660명을 최종 분석하였다. 잠재프로파일 분석결과, 사회복지사의 직무만족도 유형은 4집단으로 나타나 '최상 직무만족도집단', '중상 직무만족도집단', '중간 직무만족도집단', '최하 직무만족도집단'으로 명명하였다. 다항로지스틱 분석결과, CLASS4(최상 직무만족도집단)를 준거집단으로 하여 CLASS1(최하 직무만족도집단)과 비교해 노동강도대비 보수수준 평가, 타직종대비 보수수준 평가, 시설안전도, 인권보장도를 높게 인식할수록 CLASS4(최상 직무만족도집단)에 속할 확률이 높아지는 것으로 나타났다. 다만, 이직의사는 낮을수록 CLASS4(최상 직무만족도집단)에 속할 확률이 높아지는 것으로 나타났다. CLASS4를 준거집단으로 하여 CLASS2집단, CLASS3집단도 비교분석 하였다.

  • PDF

A Study on the Impact of Social Workers' Job Satisfaction: Focusing on Individual and Organizational Factors (사회복지사의 직무만족도 영향에 관한 연구: 개인적 요인과 조직요인을 중심으로)

  • Hyoung-Ha Lee;Sun-Hi Kim;Hoang Thi-Hien;Yun-Gyeong Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.191-193
    • /
    • 2023
  • 본 연구에서는 사회복지시설에 근무하고 있는 사회복지사의 직무만족도에 영향을 미치는 개인적 요인과 조직요인의 주요변수를 검증하여 사회복지사의 직무만족도를 높일 수 있는 정책적, 실천적 방안을 모색하기 위해 진행되었다. 분석자료는 2017년 사회복지 종사자의 보수수준 및 근로여건 실태조사 패널데이터 중 사회복지사 자격증을 갖고 근무하고 있는 사회복지사 8,075명을 분석에 사용하였다. 분석결과, 첫째, 사회복지사의 직무만족도는 보통이상(3.40점)이었다. 둘째, 사회복지사의 직무만족도에 영향을 미치는 개인적 요인으로 성별, 연령대, 결혼지위, 이직의도로 나타났고, 조직요인으로 총 보수액, 노동강도 대비 보수수준, 인권보장정도, 시설안전도, 시설유형 변인이 유의미한 영향을 미치는 것으로 분석되었다.

  • PDF

New Social Movement in the Form of Cultural Practices: A Case Study of Dooriban Movement (문화적 실천으로서 사회운동의 변화: 두리반 운동을 중심으로)

  • Ok, Eun-Sil;Kim, Young-Chan
    • Korean journal of communication and information
    • /
    • v.63
    • /
    • pp.53-75
    • /
    • 2013
  • This study looks into Dooriban movement, which problematizes the ways in which social movements are carried out in everyday settings in modern Korea. Contrary to traditional social movements, Dooriban movement led by active/independent participants -who are locally situated and culturally sensitized- showed a new way of engaging with political power. Making use of qualitative methodology such as in-depth interviews and participant observation, this research examines the implications of emergent cultural practices that redefine and reconfigure the working mechanisms of social movements in Korea today.

  • PDF

Data Protection and Privacy over the Internet: Towards Development of an International Standard (온라인 정보보호 및 프라이버시에 관한 국제 표준 개발)

  • Zoo, Hanah;Lee, Heejin;Kwak, Jooyoung;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.57-69
    • /
    • 2013
  • Progresses in ICT make the processing and exchange of personal data across international borders often necessary and relatively easy. The challenge lies in protecting fundamental rights and freedoms of individuals, notably the right to privacy and the right to personal information, while encouraging the free and secure flow of information across borders for the continued expansion of online transactions. The key to establishing a functioning international solution for personal data protection is to strike a right balance between the two camps which currently dominate the debate - the advocates of individual privacy rights on one side exemplified by the EU, and the proponents of self-regulation and economic efficiency on the other, represented by the U.S. In the face of a growing tension between the two sides each equipped with their own ideals, a practical solution may lie in utilizing established institutions of standardization such as ISO and IEC as a ground upon which an agreement can take its root.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

Current Issues with the Big Data Utilization from a Humanities Perspective (인문학적 관점으로 본 빅데이터 활용을 위한 당면 문제)

  • Park, Eun-ha;Jeon, Jin-woo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.125-134
    • /
    • 2022
  • This study aims to critically discuss the problems that need to be solved from a humanities perspective in order to utilize big data. It identifies and discusses three research problems that may arise from collecting, processing, and using big data. First, it looks at the fake information circulating with regard to problems with the data itself, specifically looking at article-type advertisements and fake news related to politics. Second, discrimination by the algorithm was cited as a problem with big data processing and its results. This discrimination was seen while searching for engineers on the portal site. Finally, problems related to the invasion of personal related information were seen in three categories: the right to privacy, the right to self-determination of information, and the right to be forgotten. This study is meaningful in that it points out the problems facing in the aspect of big data utilization from the humanities perspective in the era of big data and discusses possible problems in the collection, processing, and use of big data, respectively.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

A Study on the Recognition of Handwritten Mixed Documents (필기체 혼합 문서 인식에 관한 연구)

  • 심동규;김인권;함영국;박래홍;이창범;김상중;윤병남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.1126-1139
    • /
    • 1994
  • This paper proposes an effective recognition system which recognizes the mixed document consisting of handwritten korean/alphanumeric texts and graphic images. In the preprocessing step, an input image is binarized by the proposed thresholding scheme, then graphic and character regions are separated by using connected components and chain codes. Separated Korean characters are merged based on partial recognition and their character types and sized. In the character recognition step, we use the branch and bound algorithm based on DP matching costs to recognize Korean characters. Also we recognize alphanumeric characters using several robust features. Finally we use a dictionary and information of a recognition step to correct wrong recognition results. Computer simulation with several test documents shows what the proposed algorithm recognized effectively handwritten mixed texts.

  • PDF

Phytoestrogen Extraction for Relaxation of Female Menopause Symptoms from Natural Products (천연물로부터 여성갱년기 증상완화를 위한 식물성 에스트로겐의 초음파 추출특성)

  • Lee, Seung Bum;Park, So Yeon;Jeon, Gil Song;Hong, In Kwon
    • Applied Chemistry for Engineering
    • /
    • v.27 no.2
    • /
    • pp.217-220
    • /
    • 2016
  • Phytoestrogens are one of quasi-estrogens which are not generated within the endocrine system, but consumed by intaking phytoestrogenic plants. Phytoestrogens, also called as "dietary estrogens", are various botanic chemical compound groups naturally occurring nonsteroidal plant compounds of spontaneous generation. Due to their structural similarities to estrogone, they may provide desirable health benefits for reducing the menopausal symptoms. In this paper, various phytoestrogens were extracted from sophora root, pomegranate and kudzu by ultrasonic extraction process. In this study, the amount of extracted phytoestrogens at various ultrasonic power strengths and extraction times were compared, which could be used as basic data in the study of biology and chemistry related to natural products.

A Study on the Private Investigator System in U.S.A. (미국의 탐정제도에 관한 연구)

  • Kang, Young-Sook;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.25-50
    • /
    • 2006
  • Private detectives and investigators offer many services, including executive, corporate, and celebrity protection; pre-employment verification; and individual background profiles. They also investigate computer crimes, personal injury cases, insurance claims and fraud, child custody and protection cases, missing persons cases, and premarital screening. This paper focuses on a private detective or investigator system in most developed U.S.A, but it is not easy to describe that system. Licensing requirements vary in U.S.A. Some States have few requirements, and many other States have stringent regulations. A growing number of States are enacting mandatory training programs for private detectives and investigators. Employment and need of private detectives and investigators is expected to grow faster than the average for all occupations. Thus, it is reasonable that korean government should permit private investigation service find the way to minimize the side effects of private investigation service instead of banning the service totally.

  • PDF