• Title/Summary/Keyword: 한정된 권한

Search Result 21, Processing Time 0.03 seconds

A Study on the Direction for Revision of the Assembly and Demonstration Act - 'around the Article 6 and Article 8 of 2016 Revised Assembly and Demonstration Act' - (집회 및 시위에 관한 법률 개정 방향에 관한 연구 - '2016 개정 집시법 제6조·제8조를 중심으로 -)

  • Cho, Se-hee
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.39-63
    • /
    • 2016
  • After its decision of 'constitutional nonconformity' about a night assembly on September 24th, 2009, then the Korean Constitutional Court decided the 'limited violation of constitution' saying, 'Even a night demonstration should be allowed to be held up to the midnight' on March 27th, 20104. Since such a decision, the revision of Assembly and Demonstration Act has not been done, and the revised act is currently pending on the National Assembly on October, 2016. Amid the controversy about the 'Legislative Deficiency', some articles of the Assembly and Demonstration Act are revised and created like the imposition of the fine about a ghost assembly and the notice duty of fact to hold an assembly, the police superintendent's recommendation about the assembly place and partitioned assembly holding by time in order to protect the people's basic rights and convenience. However, this revised bill of Assembly & Demonstration Act limits the duty of assembly withdrawal report only to overlapping assemblies and a police superintendent can only recommend about the partition of assembly place and time, but has not a certain authority to forcibly enforce, so it is expected that the recommendation will be eventually ended to a formal procedure. And as this revised act has no punishment article concerning the violation of the notice duty within 1 hour before holding an assembly in this revised act, so there is a problem that the police can't force an assembly to follow the article. This study proposed some political suggestions concerning the articles to be supplemented and corrected in the Assembly & Demonstration Act after analyzing its articles around its 2016 revised Act. The Assembly & Demonstration Act has several problems to be continually corrected and supplemented further including the matter of 'Night Assembly & Demonstration' which is in the condition of 'Legislative Deficiency' since 2009.

  • PDF

A Study on the Utilization of Private Security for Preventing School Violence (학교폭력 예방을 위한 민간경비의 활용방안)

  • Jung, Eui-Lom
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.387-411
    • /
    • 2014
  • School violence is now considered not only as a problem for a victim and a offender themselves, but also as a social problem that requires responsibilities of school, home, society, and even nation. Crimes and risk factors are various inside and outside of school. In terms of solving those problems, this study examines the actual condition of school violence among students. In addition, it is considered what efforts are conducted by police to establish a safe school environment and the problems that derive from it. Futhermore, this study aims to discuss the ways of using the private security with regard to dealing with school violence. In this society, the expectation of security service from the police is increased as time passed. However, police has limited resources, thus it is beyond their practice. Policing has changed from being monopolized by government to cooperating with various security agents. Community is not considered as the subject for enforcing the law anymore, but as the cooperator for effective policing. With regard to the limitation of police force, using the private security is an effective alternative. Therefore, it is required that private security should be assigned legal authority and shared information with schools in order to patrol the blind spot. Finally, school violence prevention efforts should be conducted by applying physical and electronic security.

  • PDF

A Foreign Serials Overlap Study for Collaborative Collection Development (협력형 자원개발을 위한 해외학술지 중복 연구)

  • Hwang, Hye-Kyong;Kim, Soon-Young;Lee, Hye-Jin
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.131-161
    • /
    • 2008
  • Recently electronic journal articles prevail throughout researchers because of the development of internet and electronic publishing technology. It is caused by limited collection development budget, lack of physical storage space for printed journals in libraries, and the user convenience of web services. But from the view of ownership, electronic journals can be unfavorable to information users or libraries who cannot have the permanent right to access all the subscribed journals. Actually the libraries only have right to access journals for subscription periods in using electronic journals. So the users and libraries are willing to purchase printed journals in spite of high cost. As an basis for collaborative collection development and sharing preservation of Korean libraries for the foreign journals, the data analysis is carried out for the journals collection in terms of regional distribution, overlapping status, and journal subject. And the considerables are discussed for collaborative strategic collection development, which means the reduction of overlapped subscription and maximization of utilization in a national standpoint.

The Effect of PMO Functions on IT Project Performance (PMO 기능이 프로젝트 성과에 미치는 영향)

  • Kim, Jong-Ki;Yoon, Ok-Soo
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.129-159
    • /
    • 2011
  • 본 연구의 목적은 PMO의 기능들이 프로젝트 성과에 미치는 직접 효과와 프로젝트 관리 프로세스의 수행을 통한 간접 효과를 PLS 경로모형을 통해 파악하는데 있다. 또한, PMO 역량 및 최고 경영진의 지원에 따른 프로젝트 성과의 차이의 상호 효과 및 그 효과의 크기를 찾고자 한다. 본 연구에서는 방법론 제공, 행정적 지원, 교육 및 훈련, 자원 관리, 지식 관리를 통하여 형성되는 PMO기능과 통합, 범위, 시간, 비용, 품질, HR, 커뮤니케이션, 위험, 자원조달 등을 통하여 형성되는 프로젝트 관리과정을 측정하기 위하여 2차 요인 모형(second-order construct model)으로 연구 모형을 검증하였다. 본 연구에서 각 1차 요인(first-order construct)은 반영지표를 이용하여 분석 하였으며, 2차 요인은 조형지표를 이용하여 분석하였기에, 반영지표와 조형지표가 모두 포함되어있는 모형 분석에 용이한 자료처리 도구인 PLS를 이용하였다. 본 연구의 설문대상은 PMO의 지원 하에서 프로젝트를 수행해 본 경험이 있는 프로젝트관리자나 프로젝트 리더와 같은 전문가 집단으로 한정하여 온라인 설문조사를 실시하였다. 분석 결과, PMO 기능 및 프로젝트 관리과정 모두 프로젝트 성과에 유의한 영향을 미치는 것으로 확인되었다. 또한 PMO기능을 수행할 때, PMO역량에 따라 프로젝트 성과에 유의한 차이가 존재함이 확인되었다. 따라서 경영진들은 프로젝트 수행 시 프로젝트 성과에 긍정적 영향을 미치는 PMO의 설립을 적극적으로 검토해야 한다. 또한 PMO의 역량에 따라 프로젝트 성과에 차이가 발생하므로 프로젝트를 관리하는 PMO에 충분한 권한을 부여하고 경영진의 지원을 신속하게 함으로써 프로젝트를 성공적으로 수행할 수 있을 것이다.

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

A Study on the Governance of Urban Regeneration Projects at Waterfront Areas in Korea (한국 수변공간 도시재생사업의 거버넌스 연구)

  • Lee, Yoo Kyung;Lee, Seung Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.26-26
    • /
    • 2019
  • 본 연구는 2016년부터 2017년까지 한국 정부가 선정한 다수의 도시재생사업 중 수변공간 관련 사업을 선별하여 세부내용을 살펴보고 수변공간 도시재생사업의 거버넌스 특성을 분석한다. 도시재생사업에서 거버넌스는 사업의 성패를 가르는 핵심 요소로 대두되고 있다. 특히, 협업을 통한 민간 커뮤니티의 역할과 주민참여는 더욱 중요한 비중을 갖게 되었다. 본 연구는 Tallon(2013)의 도시재생 거버넌스 네 가지 형태-관주도(top-down), 주민주도(bottom-up), 시장주도(market-led), 지주주도(property-led) 재생을 기준으로 도시재생사업 활성화계획의 세부내용을 분석한다. 향후 도시재생사업의 추진 및 시행단계에서 거버넌스의 역할이 제대로 작동할 수 있도록 시사점을 제공하고자 한다. 연구의 공간적 범위를 수변공간을 한정하여 분석한 결과 총 20개의 도시재생사업이 도심 내 하천변과 해안가를 활용하여 추진되고 있었다. 구체적인 사업의 형태로는 (1) 생태하천복원, (2) 역사문화자원을 연계한 수변관광지 개발, (3) 수변네트워크 녹지 산책로 조성 (4) 항구 기반 수변도시개발 및 도심재생, (5) 섬의 이점을 활용한 수변경관사업, (6) 조선업 침체지역재생 등이 있었다. 한국의 수변공간 도시재생사업은 가장 일반적인 도시재생방식인 '관주도'로 진행되고 있었다. 그러나 지역의 권한과 역할을 강화하고자 하는 노력은 우선시되고 있었다. 또한, 관계부처 및 공공기관과의 파트너십 구축을 통한 도시재생사업의 효과성 향상을 도모하고 있었다. 특히, 부산시 영도구와 경상남도 통영시의 도시재생사업에서 협업의 노력이 두드러지게 나타났다. '마을만들기'와 같은 주민주도의 도시재생방식은 '주민참여협의체'를 통하여 일부 반영되고 있었다. 예를 들어, 서울시 도봉 노원구, 인천시 부평구, 경상남도 김해시, 부산시 영도구 등이 해당한다. 그러나 구체적인 실천 방안을 통한 주민주도 도시재생 거버넌스를 구축하는데는 부족함을 보였다. 더불어 민간투자를 유치하는 시장주도의 도시재생 접근은 찾아볼 수 없었다. 도시재생사업의 장기적이고 통합적인 특성을 고려했을 때, 안정적인 도시재생사업 추진을 위한 재원 마련에 대한 지속적인 노력이 요구된다.

  • PDF

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

A study on The Problems and Improvement Measures of The Capital Gain Tax (양도소득세의 문제점과 개선방안에 관한 연구)

  • Kim, Beom-Jin;Jeon, Jung-Wook
    • Korean Business Review
    • /
    • v.19 no.2
    • /
    • pp.1-21
    • /
    • 2006
  • The purpose of this study is to analysis of the policy and problems of the capital gain tax. So this study identified the problems in the tax system and the method, suggested some ideas that can be useful for reforming the current capital gain tax system. The followings are the concise of some ideas. First, government should adopt the housing market stabilization policy in the long-term period, not in the short-term period which depend on the financial market and the part of home supply. Second, determining the capital gains tax should be transferred to actual market prices system rather than based on the standard assessed prices by government through the nations. By doing so, the desired principles of taxation come true such as principle of taxation on economic substance, principle of taxation on solid foundation and principle of taxation on tax paying ability. Third, transaction taxes should be minimized in the aborting the property speculations and the stabilizing the actual market prices. Fourth, the system of non tax to the owners of 'one family, one house' should be excluded to the tune of principle of tax equity. By doing so, tax payers could be induced to pay taxes on a timely basis not commit to wrong doings. In conclusion, anti-speculation policy should be progressed in such a comprehensive and sustained way as to wipe out the psychology of expectation about the transfer gain's incomes.

  • PDF

Legal Issues Regarding the Launch Vechicle by DPRK : the Scope and Limit of the UN Security Council Resolution (북한의 발사체발사에 따른 법적 쟁점 : UN 안전보장이사회 결의의 성격과 한계)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.1
    • /
    • pp.145-167
    • /
    • 2016
  • UN Security Council is entitled to power for determining the existence of the threat to the peace. Specifying the provisions adopted in accordance with the chapter 7 of the UN Charter, its resolution is deemed as document confirming its decision about the threat to the peace. In general, resolutions adopted by the Security Council acting under Chapter VII of the Charter, are considered binding, in accordance with Article 25 of the Charter. Regarding to the terms of the Resolutions to be interpreted, the word "decide" is used as to the suspension of the ballistic missile program, the word "demand" is used as to the stopping of the the launch of ballistic missile, and the word "demand" is used as to return to the missile test moratorium. These provisions may be deemed to determining specific obligations to be imposed upon the States in accordance with the 1967 Outer Space Treaty. On the other hand, the Resolutions may be limited to the decision, not leading to a sort of international legislation, the main purpose of which is to provide a legal basis for international sanctions against Northe Korea. North Korea missile test case has reminded us of continuing discussion about whether the decision of the Security Council lacks the legislative authority due to its decision process. Furthermore, having regard to the outer space and space activities, the outer space law regime would be not compatible with the Security Council decision process in that the former presupposes the agreement among all States parties, while the latter based upon the agreement between Council member States. Therefore, it is premature to consider the Security Council decision as becoming the lex specialis of the space law regime.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.