• Title/Summary/Keyword: BREACH

Search Result 427, Processing Time 0.028 seconds

Twenty-Five Years of Physical Punishment Research: What Have We Learned?

  • Durrant, Joan E.;Ensom, Ron
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.28 no.1
    • /
    • pp.20-24
    • /
    • 2017
  • Over the past quarter century, research on physical punishment has proliferated. Almost without exception, these studies have identified physical punishment as a risk factor in children's behavioral, emotional, cognitive and brain development. At the same time, the United Nations has established that physical punishment constitutes a breach of children's basic human rights to protection and dignity. Together, research findings and human rights standards have propelled profound global change. To date, 51 countries have prohibited all physical punishment of children. In this article, we review the literature on physical punishment within its historical context, and provide recommendations for health professionals working with families.

System Insecurity - Firewalls

  • Ryu, Youngtae
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2000.05a
    • /
    • pp.171-175
    • /
    • 2000
  • The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Encryption is another form of firewall protection which is being incorporated along with other firewall methods. Before choosing a firewall architecture, a company must have the right mind set about the threat. The future will see more integration of firewall technologies and the increased use of standards in the industry. It must also determine what are the possible consequences of a breach in security and then develop a system to counter the threat. Additionally, new firewall technologies will address the potential dangers associated with the use of Java applets and Active X-controls on the Internet.

  • PDF

Two Presentation Ways of Complex Numbers Consulting History and Intellectual Interest (수학사와 지적 흥미를 고려한 복소수의 두 가지 제시 방법)

  • Lee, Gi Don;Choi, Younggi
    • Journal for History of Mathematics
    • /
    • v.26 no.4
    • /
    • pp.259-275
    • /
    • 2013
  • It has been proposed since modern times that we need to consult the history of mathematics in teaching mathematics, and some modifications of this principle were made recently by Lakatos, Freudenthal, and Brousseau. It may be necessary to have a direction which we consult when modifying the history of mathematics for students. In this article, we analyse the elements of the cognitive interest in Hamilton's discovery of the quaternions and in the history of discovery of imaginary numbers, and we investigate the effects of these elements on attention of the students of nowadays. These works may give a direction to the historic-genetic principle in teaching mathematics.

A Study about Civil Liability of Live Fish Transportation Contract (활어 수송과 계약 체결상의 민사 책임에 관한 연구)

  • Park, Subong;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.26 no.5
    • /
    • pp.959-965
    • /
    • 2014
  • Transporting of live fish requires subcontract with an independent contractor. During the transporting of live fish, civil liability problems can be caused by damage of fish. Before transporting of live fish, responsibility of negligence and tort liability were arisen, after transporting of live fish, default on an obligation was arisen. To avoid this problems, it is important to put a bond on each other and live fish transporting contract can be made a legal contract. Also, transporting of live fish must be made safe, after transporting, and discharge of obligation, perfect transaction is achieved.

Construction of Contract and Application of Law (계약의 반석과 법의 적용)

  • 김철수
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.2
    • /
    • pp.107-119
    • /
    • 1993
  • When the breach of contract is at issue between the contracting parties, the decision of the contents of obligation has an important meaning. The contents of obligation is decided by the construction of cont-ract. Therefore, the construction of contract has very important meaning for the decision of the contents of obligation. And the Civil Law of Korea includes provisions to settle disputes related to contract, and most of these provisions have the nature of voluntary law. And when there is no intention of the contracting parties, or it is not clear, the voluntary law comes into application(Civil code art. 105). Ultimately, voluntary law not only becomes the standard of the construction of the contract, but also it is applied as the law to settle dispute. Thus, it needs to clear what is the relation between the construc-tion of contract and the application of law. Therefore, this paper aims to clarify the relationship between the construction of contract and the appli-cation of law.

  • PDF

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.5_6
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

Bilateral Subdural Hematoma due to an Unnoticed Dural Tear during Spine Surgery

  • Jung, Youn-Young;Ju, Chng-Il;Kim, Seok-Won
    • Journal of Korean Neurosurgical Society
    • /
    • v.47 no.4
    • /
    • pp.316-318
    • /
    • 2010
  • We report a rare case of intracranial hypotension that was complicated by a subdural hematoma following spine surgery. Intraoperatively, we did not notice any breach of the dura. However, the patient continued to have fluid leakage from the inferior edge of the lumbar incision. During revision surgery, a small dural tear was identified and repaired. It is likely that a small dural tear was overlooked or the dura was weakened during the initial operation and caused a subdural hematoma associated with intracranial hypotension.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Drop Effects of Flood Peak due to Levee Breach (제방붕괴로 인한 홍수위 저하 특성분석)

  • Yoon, Kwang-Seok;Kim, Su-Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.1312-1316
    • /
    • 2007
  • 계획규모를 초과하는 이상홍수 발생시 피해를 최소화하기 위해서는 유역종합적인 대응계획이 필요하다. 최근 집중호우가 발생하는 빈도가 높아지고, 이에 따라 계획홍수량을 상회하는 홍수유출 가능성이 높아지면서 효율적인 홍수대응방안에 대한 연구가 활발해지고 있다. 저류지 설치는 이러한 홍수대응방안 중에 하나로 구조적인 설계방법에 대한 실험적 연구가 진행되고 있고, 저류지 규모 및 설치 위치에 대한 홍수량 저감 효과가 검토되고 있다. 본 연구에서는 저류시스템에 의한 저류효과 분석을 위하여 실제 발생한 홍수사상에 의해 외수침수가 발생했던 사례에 대해 수치모의를 통해 검토하였다. 2006년 7월 태풍 에위니아 내습시 월류에 의한 제방붕괴로 인해 침수피해가 다수 발생했던 남강 수계를 대상으로 하였으며, 홍수사상 기간 동안의 대상유역의 홍수량 및 제내지 유입량을 추정한 결과를 이용하여 첨두홍수위를 추정하고 제방붕괴가 발생하지 않은 경우에 대한 홍수위를 산정하여 제방붕괴로 인한 홍수위 저하특성을 분석하였다.

  • PDF

Experimental Study on Influence of Levee Breach Depth on Flood Wave Propagation in Inundation Area (제방붕괴깊이 조건에 따른 제내지 범람홍수파 거동 실험)

  • Yoon, Kwang-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.899-903
    • /
    • 2007
  • 본 연구에서는 제방붕괴에 의한 제내지 홍수파 거동 해석의 일환으로 제방붕괴시 제방의 붕괴깊이에 따른 제내지에서의 홍수파의 거동 양상을 수리실험을 통하여 고찰하였다. 다양한 제방붕괴폭과 초기하도수위 및 제방붕괴고 조건에 대해 범람홍수파의 전파속도와 제내지에서의 최대수심의 변화를 실험을 통하여 관찰하였다. 범람홍수파 선단(wave-front)의 이동속도는 동일한 하도수위조건에서는 붕괴고가 높을수록 감소하는 것으로 나타나 제방붕괴시 월류수심 $H_w$가 범람홍수파 전파속도에 영향을 준다는 것을 알 수 있었다. 모든 실험조건에서 최대수심은 일정한 경향을 띠고 있음을 알 수 있었다. 제방인근 지점에서 최대수심이 가장 크게 나타났고, 붕괴부로부터 일정 지점이 지나면 수위가 급격히 감소하여 거리에 관계없이 일정한 최대수심을 유지하는 것을 알 수 있었다. 동일 수위조건이라면 제방붕괴고가 낮을수록 제내지로 유입되는 유량이 증가하여 초기에 제방붕괴부 주위에서 수심이 높아지는 것으로 분석할 수 있다. 실험결과를 이용하여 범람홍수파의 전파속도와 최대수심을 산정하는 식을 무차원변수를 이용하여 제시하였다.

  • PDF