• Title/Summary/Keyword: 환경적 침해

Search Result 394, Processing Time 0.025 seconds

A Study on Legislation Related to Noise Countermeasures in Military Airfield (군용비행장 소음대책 관련 입법안에 대한 연구)

  • Kim, Yong-Hun;Hawng, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.355-384
    • /
    • 2017
  • In Korea, a Law on Airport Noise Prevention and Noise Control Area Support has been in effect since 2010. And also, airport noise measures project and residents support project conducted following the Law on Airport Noise Prevention and Noise Control Area Support. However, a Law on Airport Noise Prevention and Noise Control Area Support does not apply to military airfield. Many city residents already complain about military airport noise, but there are no countermeasures. They claim the noise from the military airfield is an intrusion on their lives, and some people brought a class action against the government. In the 20th National Assembly, some congressmen already proposed some legislations that aims to support residents adjacent to the military airfield. Nevertheless, relevant legislations are currently pending at the 20th National Assembly. Legislation preventing aircraft noise and providing support measures is essential to residents life who near by military airfield. At first, this study looked at legislations proposed by congressmen in the 20th National Assembly. And also, this study looked at A Law on the Improvement of Living Environment around the Defence Facilities of Japan. Based on this study, we did an analysis of the problem of legislation and proposed improvement suggestion. I hope so that this study could someday help congressmen make a legislation about military airfield noise. We hope the 20th National Assembly will pass the legislation finally to help the residents who near by military airfield relieve their pain by noise and restore their human dignity.

  • PDF

The Damage Assessment, Construction Point of Time and Deterioration Diagnosis and Conservation Maintenance of Stone Statues Around the Stone Pagoda in Mireuksaji Temple in Iksan (익산 미륵사지 석탑 석인상의 조영시기와 훼손도 진단 및 보존관리)

  • Lee, Dong-sik;Lee, Yeon-gyeong
    • Korean Journal of Heritage: History & Science
    • /
    • v.47 no.4
    • /
    • pp.74-91
    • /
    • 2014
  • The stone statues in the site of Mireuksaji Temple(Iksan, South Korea) were created after the stone pagoda was built in 639. They, transitional statues between animal sculptures and human shaped statues made from the late Goryeo dynasty until the early Joseon dynasty, were set up at the four corners of the stone pagoda by way of guardians. In the case of three statues, their surfaces were denudated and their iconographies have been indiscernible. However, the one in the southwest clearly shows its iconography. It is inferior in properties to the other three statues in the northwest, the northeast and the southeast respectively, but on the other hand its iconography has been well maintained. The reason is related to exposure to harmful environments; specifically, the retaining wall, built around the stone pagoda in the 17th century, had the southwest statue inside and could naturally worked as a buffer against harmful environments. As a result, for about 400 years there has been difference in weathering conditions between the three stone statues and the southwest statue, which brought denudation, the consequent indiscernibleness of iconography and biological invasion to the three statues, notwithstanding superior properties(northwest statue:$176kgf/cm^2$, northeast statue:$109kgf/cm^2$, southeast statue:$273kgf/cm^2$). In contrast, the southwest statue significantly shows its iconography with black contaminants and granule decomposition, despite inferior properties($133kgf/cm^2$). Defenseless exposure to external environment is not recommended for the stone statues, because it is hard to preserve the extant iconography. Herein lies the application of the data on microclimate around Mireuksaji Temple. As regards the weathering zone in which the stone statues are located, Conservation increases in acidity and frequency as years go by, Hereat, in the approach to the Conservation of stone statues, the first consideration needs to be morphological historicity rather than geographical location.

A Study on Human Resource Management Strategy of Foreign Shipping and Port Logistics Companies under the China's New Labor Contract Law - Focus on Contents and Countermeasures - (중국 신노동계약법 시행에 따른 외자 항만물류기업의 인적자원 관리전략에 관한 고찰: 주요 내용과 대응방안을 중심으로)

  • Han, Byoung-Sop;Kim, Byoung-Goo
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.43-69
    • /
    • 2008
  • The labor contract Law has been prepared as an important solution for social stability. After long disputes around the orientations of the law, On June 29, 2007, the new Chinese labor contract law is passed. This law reflects the changing labor relations because of economic reforms like restructuring of the state-owned enterprises and so on. This law contains more market-oriented clauses that are supplemented by corporatist scheme supported by trade unions than the first draft. This law emphasize labor's rights and interests to remove prior labor contract problem. So Chines government see this law as standard law to restructure social relationship and also require firms to corporate social responsibility. Therefore, implementation of the new Chinese labor contract law bring about increasing labor cost, infringement of autonomy for human resource management, rigidity of industrial relations. Under these situation, Korean shipping and port logistics companies need to introduce management system of minimized employment, prepare human resource management in response to long-term employment, maintain favor relationship with trade union, and set up counteiplan about risk of a labor dispute.

  • PDF

A research paper for e-government's role for public Big Data application (공공의 빅데이터 활용을 위한 전자정부 역할 연구)

  • Bae, Yong-guen;Cho, Young-Ju;Choung, Young-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2176-2183
    • /
    • 2017
  • The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.

Legal and Technical Issues of Using Location Information for Police Rescue (경찰 위치추적권 활용의 법적·기술적 문제와 개선방안)

  • Park, Kwang-Ju;Jang, Yun-Sik;Park, Ro-Seop
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.211-228
    • /
    • 2017
  • In May 2012, the police was empowered to electronically obtain location information of mobile devices from the telecommunication service provides for the purpose of rescue by the Act on the Protection, Use, ETC. of Location Information, after years of pressure with repeated serious violent crime outbreaks and controversy concerning the risk of breaching privacy. This study examines the environmental, legal, and technological challenges related to location tracking at the time of five years after the amendment of the law. The bottom line of police's locating power is to secure the lives of people in deadly emergent circumstance. Therefore, location tracking using given information should be swiftly proceeded after consideration and judgment of justification in timely manner to electronically request information to mobile carriers, and it is necessary to have somewhat flexibility of interpretation to be applied to diverse situation. In addition, location tracking technology should be continuously updated through cooperation with the stake-holders. Recognizing substantial problems in practice, we identified and explored the issues including obtaining prior consent for tracking the user's location in case of emergency, confirmation of emergency situation requiring police presence, qualification of legitimate requester, and limited applicability in various circumstances, which are required to reconsidered in conjunction with the personal information protection laws. Additional practical issues may include the expenses for information provision and other incentives to promote active cooperation by the telecom companies.

  • PDF

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

A Study on the International Discussion of Digital Trade Norms (디지털 무역규범의 국제적 논의에 관한 연구)

  • Hwang, Ji-Hyeon;Kim, Yong-Il
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • With the spread of digital trade, the share of digital trade under the global trade environment is increasing. However, since there is no international digital trade standard, the discussion to establish a new trade rule has important significance. Countries around the world are implementing digital trade policies in consideration of their own interests, but different regulatory policies are causing trade conflicts. In order to provide safeguards against personal information infringement due to the free movement of data across borders, major countries around the world have taken measures to localize data, and the EU has enacted GDPR. And the United States regards the imposition of the digital tax as a trade barrier, and some countries oppose the implementation of the digital tax for fear of negative impact on their countries. However, discussions on the global digital tax, centered on the OECD and the G20 are making progress. As it is highly likely that a digital tax agreement will be drawn up within this year, countermeasures must also be prepared. Therefore, this study presents implications for the future direction of Korea's trade policy by examining recent trends in digital trade norms and analyzing major issues in digital trade.

The Custom of Bride Wealth in Africa: The Context of Change and Reconstruction (아프리카의 신부대(bride wealth) 관습: 변화와 재구성의 맥락)

  • Seol, Byung-Soo
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.131-172
    • /
    • 2018
  • It is noted that nowadays, the bride wealth custom takes an extremely distorted form in African society. Such a phenomenon is a result that the male-dominant culture, Western religions, and capitalist economic system have been negatively combined into dynamic factors seen as bride wealth. This means that the concept of bride wealth has been incessantly reconstructed in the middle of clash and conflict of tradition and modernity. There is also little doubt that the practice is inextricably tangled with the common and current ways of livelihood, early marriage, polygyny, kinship/family structure, poverty, and migration labor. Bride wealth has become an increasingly commercialized element under a capitalist economic system. Accordingly, its traditional symbolism is seen to be subsequently weakening, whereas a tendency towards the reification of women is strengthening more in modern society that embraces modern customs bent on the protection of women's human rights. Its commercialization has produced a result, which instigates the noted violations of women's basic human rights, gender inequality, and promotion of domestic violence. The ways that people perceive bride wealth vary according to their own sex, generation, stratification, and ethnic background. Those people who negatively recognize bride wealth will increase with the deepening of its commercialization due to the influence of capitalism. Its color and effect will deepen and depend on how its agents correspond to socioeconomic changes. They will constantly reinterpret and reconstruct it within their own environments, but the basic human rights efforts are constantly under review by concerned individuals seeking to promote equality for women as a global effort.

A Mixed Method of Gap-jil Behavior in Educational Institutions : Focusing on abuse of authority (통합연구방법을 활용한 교육기관 내 갑질 행태에 관한 연구 : 권한남용을 중심으로)

  • Choi, Sung-Kwang;Choi, Ye-Na;Kim, Ok-Hee
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.243-254
    • /
    • 2021
  • This study analyzed the abuse of authority among the types of power abuse in educational institutions in order to create an educational climate in which democracy and equality are respected and to create a better education and an equal society. First, we analyzed the concept and cause of power abuse through literature research, and then explored the cases of members of educational institutions according to the type of abuse of authority through qualitative research to derive implications. As a result, abuse of authority within educational institutions were found as follows: additional work without consultation, transfer of duties, coercive and unilateral instructions using status, instructions violating laws and guidelines, private instructions for personal convenience, specific institutions, personal rights, and privacy. Based on this analysis, a policy was proposed. First, an agreed standard for abuse of authority, an institutional mechanism to mediate conflicts and complaints over abuse of authority, mandatory installation and legislation of the best decision body, active and transparent disclosure of information, and a shift to open and listening administration are needed. Second, analyzing and seeking ways to reduce overuse of authority in educational institutions will be the cornerstone for leading education's democracy and equality by creating a culture of mutual respect and communication among members of the organization. Hope that follow-up studies will be carried out and that the Gap-jil in educational institutions will be reduced to create a better educational environment.