• Title/Summary/Keyword: Concept of Protection

Search Result 528, Processing Time 0.026 seconds

Introduction to the Strategic Sampling Approaches to Construct Optimal Conceptual Model of a Contaminated Site (오염부지 최적 개념모델 수립을 위한 전략적 샘플링 기법 소개)

  • Park, Hyun Ji;Kim, Han-Suk;Yun, Seong-Taek;Jo, Ho Young;Kwon, Man Jae
    • Journal of Soil and Groundwater Environment
    • /
    • v.25 no.2_spc
    • /
    • pp.28-54
    • /
    • 2020
  • Even though a systematic sampling approach is very crucial in both the general and detailed investigation phases to produce the best conceptual site model for contaminated sites, the concept is not yet established in South Korea. The U.S. Environmental Protection Agency (EPA) issued the 'Strategic Sampling Approaches Technical guide' in 2018 to help environmental professionals choose which sampling approaches may be needed and most effective for given site conditions. The EPA guide broadly defines strategic sampling as the application of focused data collection across targeted areas of the conceptual site model (CSM) to provide the appropriate amount and type of information needed for decision-making. These strategic sampling approaches can prevent the essential data from missing, minimize the uncertainty of projects and secure the data which are necessary for the important site-decisions. Furthermore, these provide collaborative data sets through the life cycle phases of projects, which can generate more positive proofs on the site-decisions. The strategic sampling approaches can be divided by site conditions. This technical guide categorized it into eight conditions; High-resolution site characterization in unconsolidated environments, High-resolution site characterization in fractured sedimentary rock environments, Incremental sampling, Contaminant source definition, Passive groundwater sampling, Passive sampling for surface water and sediment, Groundwater to surface water interaction, and Vapor intrusion. This commentary paper introduces specific sampling methods based on site conditions when the strategic sampling approaches are applied.

A Study on the Concept Recognition Possibility of Ecorefugee

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.177-184
    • /
    • 2016
  • Since 1980s, 30 years has passed after issues on environmental refugee began to appear. However, why environmental refugee is not considered as refugee officially in international society? Above all, it seems that main point is the responsibility given to those developed countries if they, whom led the climate changes, officially acknowledge environmental refugee. The problem is that environmental refugee has no direct responsibility for causing climate changes. Actually. the responsibility should be granted to the developed and industrialized countries which caused climate changes. In accordance to the refugee protection system established under current international law, it is difficult to include them into refugee category and thus, they can hardly have enough support. It is urgently needed that new refugee treat which have the new standard and solution added to it shall be adopted. To allow new refugee treat to be effective it is compulsory to have constant and binding policy determination and willingness of execution from a united international organization. Of course, before this, countries should try to have common recognition on recognizing new refugee problem and its seriousness as well as solving those problems together. In reality, it is worth considering adoption of semi-forceable type of system as a more effective way, which allocates responsibility of accepting refugee by amount of carbon emitted. Also, as refugee issue has an important influence on mother company and the third countries, execution process of the system has to be defined clearly. For those permanent organizations, they should accurately define environmental factors making refugee and set standards to minimize possibility of abuse and misuse.

Creation Techniques of Ecological Park to Consider Urban Forest Ecosystem in Woomyeonsan Urban Nature Park, Seoul (서울시 우면산 도시자연공원내 도시림의 생태적 특성을 고려한 생태공원 조성기법)

  • Lee Kyong-Jae;Lee Soo-Dong;Jang Jong-Soo;An In-Su
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.33 no.4 s.111
    • /
    • pp.79-96
    • /
    • 2005
  • This study is to suggest the technique of ecological park to compatible mountain ecosystem near the urban in Woomyeonsan Urban Nature Park. It was proposed to differential technique from established ecological park focused on changing the cognition of nature, wetland ecosystem protection and restoration, and studying by served sound leisure program(nature observation and experience, etc.), in compatible mountain and urban forest near the Urban. Firstly, to achieve this aim, it was carried out delicated research and analysis that were the angle of inclination, trail, fauna, actual vegetation, bird and insect, and then to selected nature trail course and analysis capability through it.. In the basic concept and plan, firstly to make park aid mark and foundation mark, and then to establish the detail programs, nature observation program, management and organization program. This site where valley and mountain coexist was highly capable but whole site was very steep, so usable area is very narrow. To make Woomyeonsan nature ecological park escape from the established wetland type, ecological park and the park of event have to use nature material and introduce visitor. To establish it as the Nature Culture observation park and reflect on forest, valley of Woomyeonsan was divided into three display places; Nature ecosystem Zone, Meditation Zone, Nature Culture experience Zone and Nature Culture observation Center. For satisfying with ecological park aid mark and foundation mark, it was proposed to settle management plan for volunteer control and organization composition.

Measures to Secure the Habitability of Temporary Shelter for Shelter in Place in Nuclear Power Plant Accidents (원전 사고지역에서 실내대피를 위한 임시대피시설의 거주성 확보방안)

  • Jeongdong Kim;Chonghwa Eun
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.582-596
    • /
    • 2023
  • Purpose: This study aims to explore the ways to improve the security of temporary shelters in case of nuclear power plant accidents. Method: In this study, we mainly rely on the case studies on previous nuclear power plant accidents-Chernobyl, Fukushima, and Three Mile Island (TMI) cases. Result: The current radiation emergency response plans for nuclear power plant accidents center around the evacuation procedure. As a result, the concept of "shelter in place" has been understood as a means of assisting resident evacuation. However, based on the case studies, we find that encouraging shelter in place, rather than simply emphasizing evacuation, would help minimize unnecessary casualties, especially in case of the accidents rated greater than or equal to INES 5. To facilitate better shelter in place, we recommend utilize apartments as temporary shelters and suggest some possible improvements to ensure those apartments could be equipped with technologies for high radiation protection. Conclusion: To ensure better shelter in place, we recommend using apartments as temporary shelters, and we seek to supplement the function of apartments by using shielding, positive pressure, and sealing technologies.

Synthesis of Core-shell Copper nanowire with Reducible Copper Lactate Shell and its Application

  • Hwnag, Hyewon;Kim, Areum;Zhong, Zhaoyang;Kwon, Hyeokchan;Moon, Jooho
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.430.1-430.1
    • /
    • 2016
  • We present the concept of reducible fugitive material that conformally surrounds core Cu nanowire (NW) to fabricate transparent conducting electrode (TCE). Reducing atmosphere can corrodes/erodes the underlying/surrounding layers and might cause undesirable reactions such impurity doing and contamination, so that hydrogen-/forming gas based annealing is impractical to make device. In this regards, we introduce novel reducible shell conformally surrounding indivial CuNW to provide a protection against the oxidation when exposed to both air and solvent. Uniform copper lactate shell formation is readily achievable by injecting lactic acid to the CuNW dispersion as the acid reacts with the surface oxide/hydroxide or pure copper. Cu lactate shell prevents the core CuNW from the oxidation during the storage and/or film formation, so that the core-shell CuNW maintains without signficant oxidation for long time. Upon simple thermal annealing under vacuum or in nitrogen atmosphere, the Cu lactate shell is easily decomposed to pure Cu, providing an effective way to produce pure CuNW network TCE with typically sheet resistance of $19.8{\Omega}/sq$ and optical transmittance of 85.5% at 550 nm. Our reducible copper lactate core-shell Cu nanowires have the great advantage in fabrication of device such as composite transparent electrodes or solar cells.

  • PDF

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

Economic Valuation of the Right to be Forgotten (잊힐 권리의 경제적 가치 추정 연구)

  • Lee, Mi-Suk;Cho, Young-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.84-96
    • /
    • 2018
  • The right to be forgotten means the right of people to request information and communication providers to delete their information online. As the number of people asking for deletion of their past embarrassing or negative online activities is increasing, discussions are being raised on the introduction of the right to be forgotten in South Korea. However, previous research on the right to be forgotten mainly deals with the legal concept, with insufficient consideration of economic value. The main purpose of this research is to examine social perception towards the right to be forgotten and to estimate its economic value quantitatively. According to the results, there are concerns about disclosure of personal information, but with lack of awareness on the right to be forgotten. The monthly average amount that a person is willing to pay to be forgotten is 1,218 Korean won (11 US dollars) and the total economic value is estimated to be about 540 billion won (490 million dollars) per year in 2017. Especially, those who have experienced leakage of personal information put higher value to the right to be forgotten. These results can be useful for making decisions about the right to be forgotten in the future.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

A Comparative Analysis of Oversea Land Registration Systems - UK, Australia, USA, the Netherlands, France, Sweden - (외국의 최신 토지등록제도에 관한 비교연구 - 영국, 호주, 미국, 네덜란드, 프랑스, 스웨덴 -)

  • Park, Jung-Ho;Lim, Hyung-Taek;Kim, Sang-Min
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.81-102
    • /
    • 2022
  • This study reviewed the concept of land registration and analyzed the land registration system in UK, Australia, USA, the Netherlands, France and Sweden. Land registration is a process of registering physical information and rights related to land in the land register for protection and regulation of land rights, taxation and dispute resolution. The land registration systems in the six countries were mainly analyzed in terms of policy, land register, objects and systems. As a result, first, the establishment of the land registration master plan is of paramount importance for sustainable development of land registration systems. Second, land register needs to be improved for 4D land management and service. Third, reduction of period and improvement of work efficiency for the cadastral resurveying should be considered. Last, a plan to improve public services by linking the geospatial technology with the land registration system is need.