• Title/Summary/Keyword: 중앙행정기관

Search Result 154, Processing Time 0.028 seconds

국가 최대 전문교육훈련기관의 냉난방시설 ESCO사업으로 환골탈태

  • 에너지절약전문기업협회
    • The Magazine for Energy Service Companies
    • /
    • s.18
    • /
    • pp.18-21
    • /
    • 2002
  • 국가전문행정연수원은 지난해 8월부터 올 6월까지 약 10개월에 걸쳐 기존의 노후화된 증기난방 보일러와 개별 냉방기를 흡수식 냉온수기를 통한 중앙집중식 냉난방으로 전환하는 ESCO사업을 실시해 막대한 에너지 절감 효과를 보고 있다. 총 4개 건물을 대상으로 진행된 이번 냉난방 ESCO사업은 총 사업금액이 6억2천여만원에 이르며 연간 절감되는 에너지절감금액이 약 1억4천4백만원 정도여서 앞으로 5년 10개월에 걸쳐 모든 투자비가 회수될 예정이다.

  • PDF

New Labour's Joined-Up Government and Social Service Reform (신노동당의 연계정부(joined-up government)와 사회서비스 개혁)

  • Lim, Sang Hun
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.131-150
    • /
    • 2018
  • As policy areas are widened and more complicated, policy coordination becomes a challenge to the public administration. New Labour's promotion of the joined-up government was a holistic attempt to redress the fragmentation of the government in social policy. It promoted the joined-up activities by setting up joining-up units and agencies at the core of the government, the Prime-Minister's Office and the Cabinet office, and between the public, private and voluntary sectors. The joined-up government was criticised as being hierarchical and fragmented, and as confusing the line of accountability. Policy coordination has growing importance in Korea, and the experiences of the joined-up government will have implications on more coordinated promotion of social policy.

A Method for Calculating Exposure Risks of Privacy Information based on Website Structures (웹사이트의 구조를 고려한 개인정보 노출 위험도 계산 기법)

  • Lee, Sue Kyoung;Son, Jin Sik;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • This research proposes a method that aims to evaluate the risk levels of websites based on exposure risks of privacy information. The proposed method considers two aspects as follows. First, we define the risk levels of each privacy information according to its own inherent risk. Second, we calculate the visiting probability of a webpage to measure the expected of the actual exposure of privacy information on that webpage. In this research, we implemented an system to prove that automatically collects websites and calculates their risk levels. For the experiments, we used a real world dataset consisting of a total of websites for 4 categories such as university, bank, central government agency, and education. The experiment results show that the websites in the bank category are relatively well managed, while the others are needed to cope with the exposure of privacy information. Finally, the proposed method in this research is expected to be further utilized in establishing a priority-based approach to alleviate of the privacy information exposure problems.

A Study on the Open Meeting System : Focused on the Central Administrative Organization Designated Meeting (회의공개제도 운영에 관한 연구 중앙행정기관 지정회의를 중심으로)

  • Choi, Jeong Min;Kim, You-seung
    • The Korean Journal of Archival Studies
    • /
    • no.55
    • /
    • pp.307-334
    • /
    • 2018
  • This study analyzes the status of the designated administrative meetings of the central administrative agencies, including the number of meetings, the presence of written minutes, and the form of minutes. The implications based on the analysis are as follows. First, there were meetings that were not held, and written meetings were held. The standards for determining the designated meetings should be established. Second, when only a written meeting was held, the minutes were not made because these were not written separately. A written meeting can be held, if it is necessary. However, there is still a need to keep a detailed record similar to minutes in such cases. Third, among the minute types, a written record of the points of the meeting is preferred. Even if the meeting is closed for proper reasons, making a transcript and a record in addition to writing the points must be settled. Finally, specific standards for the procedures and reasons why meetings and minutes should be closed should be established. It is necessary to change the paradigm from the viewpoint of production and management to the viewpoint of disclosure and sharing through the improvement of standards and procedures related to designated meetings and designated meeting minutes.

Searching for Laws and Systems to Revitalize Private Archives (민간 아카이브 활성화를 위한 법·제도 모색)

  • Sohn, Dong You
    • The Korean Journal of Archival Studies
    • /
    • no.69
    • /
    • pp.7-33
    • /
    • 2021
  • From the beginning of the enactment and implementation of the Public Records Management Act, there has been a steady discussion on the establishment of local archives. Local archives include not only administrative records of local governments, but also private archives such as containing the lives of residents. Along with the academic discussion, there have been movements for local autonomy and decentralization. Currently, interest and discussion on private archiving are in the historical flow. In addition, private archiving has become a social concern because of the establishment of systems such as the Public Records Management Act and the Information Disclosure Act, the establishment of a digital environment, and the spread of the meaning and value of village community activities. There are several government agencies related to private archiving, and the grounds for performing their work are different, and there are many central administrative agencies to which they belong. Therefore, I propose that the National Archives take the lead and form a 'Consortium of Private archives Management Institutions'. The organization should promote first, cooperation of collection information and archives, second, coordination of tasks and functions between institutions, and third, establishment of a nationwide private archives management system. Now is our chance. Instead of reacting on an ad hoc basis, respond systematically with a long-term perspective.

A Study on development of evaluation indicators on the Managed Security Service(MSS) (보안관제 업무에 대한 평가지표 개발 연구)

  • Lee, Hyundo;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1133-1143
    • /
    • 2012
  • Currently, Many Cyber Security Centers(CSC) are established and being operated in our country. But, in the absence of indicators to evaluate activities of the Managed Security Service(MSS), We can't identify the CSC's level of overall job performance. Therefore, we can't derive strengths and weaknesses from the CSC. From these reasons, The purpose of this research is to develop an objective indicator to evaluate activities of the MSS. I studied both international and domestic Information Security Management System(ISMS) as related standards(ISO/IEC 27001, G-ISMS). Moreover, I analysed the NIST Computer Security Incident Handing Guide and the Incident Management Capability Metrics(IMCM) of Carnegie Mellon Software Engineering Institute(SEI). The implications for this analysis and domestic hands-on experience are reflected in the research. So I developed 10 evaluation domains and 62 detail evaluation items. This research will contribute to our understanding the level of the CSC's job performance.

A study on improving the organizational structure of traffic safety facilities operation using a delphi technique (델파이 조사에 의한 교통안전시설 관련업무체계 개선방안)

  • 손의영
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.1
    • /
    • pp.53-65
    • /
    • 1999
  • This paper attempts to find an improved organizational structure for operating the traffic safety facilities. Currently, police is in charge of the facilities while the local government is in charge of its budget. By doing so, many inefficiencies and problems occur in these things. A delphi technique is used to survey these inefficiencies. Problems, and improved role and organization by three expert groups in local government, police and university The survey results are analyzed by each expert group as well as by the total group. The multidimensional scaling technique is also used. The most preferable answer is to newly establish a traffic experts' agency under the local government. The second preferable answer is to set the current traffic police under the control of the local government.

  • PDF

A Study on Public Order Right Based on Analysis of the Administrative Disposition Results Against the Personal Information Protection Act Violation (개인정보 보호법 위반에 따른 행정처분 결과 분석을 통한 공표명령권 도입 연구 395)

  • Jeon, Ju Hyun;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.395-402
    • /
    • 2022
  • In case of violation of the Personal Information Protection Act, administrative dispositions will be taken according to the legal standards, and the results will be announced. However, the current method has limitations in its effectiveness as repeated administrative dispositions are increasing despite the announcement by the disclosure system of the Personal Information Protection Act. In this paper, we deploy the introduction of the 'public announcement commandment' against violators by analyzing the administrative disposition results according to the violation of the Personal Information Protection Act. It is able to strengthen the existing disclosure system for self-disclose violations by providing easy recognition to the people about the fact of violation itself against the Personal Information Protection Act. Furthermore, we analyze major industries through the industry groups and violations of laws that were subject to publication, and data published on the results of administrative dispositions for violation of the Personal Information Protection Act. Finally, we propose the legal basis for the 'public announcement commandment' which allows the violator to publish by oneself for the announcement of the fact that the corrective action has been taken.

A study on the evaluation and improvement of web accessibility and usability of Korea government department websites (국내 중앙행정기관 웹사이트의 접근성과 사용성 평가 및 개선방안 연구)

  • Moon, Tae-Eun;Moon, Hyung-Nam
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.786-793
    • /
    • 2008
  • This research is carried out being divided into a first evaluation and second evaluation. A Study is carried out on first, the accessibility compliance level of Korea government department websites and second, whether the site which complies well with web accessibility increases web usability for users through a web usability evaluation. The evaluation result, web sites which comply well with the web accessibility guidelines were observed to increase web usability for both normal and disabled people but web sites which do not comply well were observed to lower the web usability making the web sites unavailable or inconvenient to use. Therefore, it can be concluded that there is a very close interrelationship between web accessibility and usability and thus compliance with web accessibility is not an option but a mandatory requirement.

  • PDF

Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It (행정전자서명 암호체계 기술 현황 분석 및 고도화 방향)

  • Younghoon Jung;Dongyoung Roh;Bonwook Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.13-31
    • /
    • 2023
  • Korean Government-PKI (GPKI) is a public-key infrastructure which provides authentication and security functions for information system used by central government, local governments, and public institutions of the Republic of Korea to provide their own administrative and public services. The current cryptosystem of GPKI was established in the early 2000s, and more than ten years have passed since the last improvement in 2010. Over the past decade or so, the information security, including cryptography, has undergone many changes and will continue to face many changes. Therefore, for the sustainable security of GPKI, it is necessary to review the security of the cryptosystem at this point. In this paper, we analyze the current status and the security of technologies and standards used in the system. We identify cryptographic algorithms with degraded security, international standards which are obsoleted or updated, and cryptographic parameters that should be revised for the high security level. And based on this, we make several suggestions on the reorganization of cryptographic algorithms and related technologies for the security enhancement of GPKI.