• Title/Summary/Keyword: Human security

Search Result 1,193, Processing Time 0.026 seconds

A Study of Incentive Problems of Welfare State (복지국가의 인센티브 문제에 관한 연구)

  • Cheon, Byung You
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.69-96
    • /
    • 2013
  • This paper is to critically review the economic reasoning of non-sustainability of welfare state due to its intrinsic incentive problems and to see how the nordic welfare state responds to them. The welfare state as a political design of state to pursue equality has social insurance as its main economic function. It survives market failure of private insurance to contribute to human capital investment and industrial restructuring. The universal tax-financed welfare state, however, has the problem of tragedy of commons such as reduced work incentive and work ethics. But, the existing nordic welfare state overcomes it through employment-focused policy arrangements, maintenance of work ethics and benefits moral, incentive mechanism of wage-compression, public educational investment and its complementation with social security. The Nordic model shows that problems of incentive and moral are not about those of theory and reasoning, but about their reality which policies and institutions could respond to.

Transnational Labor Migration in Southeast Asia and Regional Governance: In Search of Good Governance (동남아시아의 이주노동과 지역 거버넌스)

  • Choi, Horim
    • The Southeast Asian review
    • /
    • v.20 no.2
    • /
    • pp.135-178
    • /
    • 2010
  • This study is to seek alternatives for regional governance related to transnational labor migration issues in Southeast Asia. This study examined the present situation and trends of labor migration in the region, reviewed involved transnational issues, and identified the current issues of governance to seek alternatives for regional governance. The increase in cross-border labor migration is no doubt a sign of growth and dynamism of the region and greater integration of their economies. But it also poses complex policy and management issues as well as transnational issues over such as unequal economic profits, illegal migration, human rights, and social security issues. In this reality, regional governance is a very important theme and the efforts to manage their migration inherently involve fundamental conflict and tension between related countries and regions. However, politics and governance of transnational migrant workers in Southeast Asia are still pursued at the national level. To resolve these issues, it is urgently required to secure not only collaboration between the parties concerned but also governance at the regional level. Findings of this study are: First, although labor migration has been a relatively long-time transnational issue, the history of addressing the issue at the regional governance is very short and still inceptive. Second, given its size, labor migration in Southeast Asia requires effective regional governance but no breakthrough was possible due to the conflict of interests between origin and destination countries and the conflict of logic between the labor market and the state. Third, the issue of labor migration is an important element for the formation of economic and socio-cultural communities the ASEAN countries have pursued. Fourth, it is urgently needed to seek alternatives for good and effective regional governance as a key to resolving these issues over migrant workers in Southeast Asia.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Analysis of the financial products for supporting financing of small and medium-sized construction companies (중소건설기업의 자금조달 지원을 위한 금융상품 분석)

  • Lee, Chijoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.4
    • /
    • pp.36-46
    • /
    • 2022
  • It takes a relatively long time for construction companies that lack the ability to finance to adapt to construction policy in the construction industry. However, financial institutions rarely provide financial products to construction companies, particularly small and medium-sized construction companies, because their security capacity and credit rating are low. This study investigates the financial products needed for small and medium construction companies to adapt to policy changes. The demand of small and medium construction companies for financial products is analyzed by experts' advise and survey. And, when the investigated financial products for the construction industry are introduced, the legal systems in need of revision are analyzed. Based on the analyzed demand and the number of legal systems needing revision, the priority for the introduction of financial products to the construction industry is analyzed. Among the financial products investigated, the priority of "Expert consultation, such as accountant, tax accountant, lawyer, etc." is the highest. In future studies, the criteria and method of financial product development for high-priority financial products could be researched.

A Study on the Current Status and Responses System of Child Abuse

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, child abuse cases such as the "16-month death of adopted children" have occurred one after another in our society and have emerged as a serious social problem. Child abuse not only significantly violates children's human rights, but also leaves scars on the child's body and sometimes threatens their lives. As a result, laws related to child abuse have been revised several times and related systems have been reorganized to protect the affected children safely and grow healthy, but child abuse cases continue to occur. Therefore, it is urgent to come up with effective measures to prevent child abuse crimes and protect affected children. Therefore, this study examines the concept and related laws of child abuse, the current status of child abuse, and suggests countermeasures to effectively respond to child abuse compared to the US child abuse legislation and child protection system.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

Object Recognition Using Convolutional Neural Network in military CCTV (합성곱 신경망을 활용한 군사용 CCTV 객체 인식)

  • Ahn, Jin Woo;Kim, Dohyung;Kim, Jaeoh
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • There is a critical need for AI assistance in guard operations of Army base perimeters, which is exacerbated by changes in the national defense and security environment such as force reduction. In addition, the possibility for human error inherent to perimeter guard operations attests to the need for an innovative revamp of current systems. The purpose of this study is to propose a real-time object detection AI tailored to military CCTV surveillance with three unique characteristics. First, training data suitable for situations in which relatively small objects must be recognized is used due to the characteristics of military CCTV. Second, we utilize a data augmentation algorithm suited for military context applied in the data preparation step. Third, a noise reduction algorithm is applied to account for military-specific situations, such as camouflaged targets and unfavorable weather conditions. The proposed system has been field-tested in a real-world setting, and its performance has been verified.

Analysis of Chemical Compounds of Gaseous and Particulate Pollutants from the Open Burning of Agricultural HDPE Film Waste

  • Kim, Tae-Han;Choi, Boo-Hun;Kook, Joongjin
    • Journal of People, Plants, and Environment
    • /
    • v.24 no.6
    • /
    • pp.585-593
    • /
    • 2021
  • Background and objective: Illegal open-air incineration, which is criticized as a leading source of air pollutants among agricultural activities, currently requires constant effort and attention. Countries around the world have been undertaking studies on the emission of heavy metal substances in fine dust discharged during the incineration process. A precise analytical method is required to examine the harmful effects of particulate pollutants on the human body. Methods: In order to simulate open-air incineration, the infrastructure needed for incineration tests complying with the United States Environmental Protection Agency (EPA) Method 5G was built, and a large-area analysis was conducted on particulate pollutants through automated scanning electron microscopy (SEM)-energy-dispersive X-ray spectroscopy (EDS). For the test specimen, high-density polyethylene (HDPE) waste collected by the DangJin Office located in Choongcheongnam-do was used. To increase the identifiability of the analyzed particles, the incineration experiment was conducted in an incinerator three times after dividing the film waste into 200 g specimens. Results: Among the metal particulate matters detected in the HDPE waste incineration test, transition metals included C (20.8-37.1 wt%) and O (33.7-37.9 wt%). As for other chemical matters, the analysis showed that metal particulate matters such as metalloids, alkali metals, alkaline earth metals, and transition metals reacted to C and C-O. Si, a representative metalloid, was detected at 14.8-20.8 wt%, showing the highest weight ratio except for C and O. Conclusion: In this study, the detection of metal chemicals in incinerated particulate matters was effectively confirmed through SEM-EDS. The results of this study verified that HDPE waste adsorbs metal chemicals originating from soil due to its own properties and deterioration, and that when incinerated, it emits particulate matters containing transition metals and other metals that contribute to the excessive production and reduction of reactive oxygen species.

A Study on the IoT-based Blockchain Education Model (사물인터넷 기반 블록체인 교육모델에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.4
    • /
    • pp.77-83
    • /
    • 2021
  • In the 4th industrial revolution, research on various new technologies is being actively conducted. Among the new technologies of the 4th industrial revolution, interest in blockchain is very high. A lot of research on this kind of block chain is being actively conducted, centered on graduate schools. It is not easy for a university to operate a dedicated blockchain curriculum centered on undergraduate students. In such a situation, a variety of new blockchain ecosystems have been created to revitalize the blockchain-related industry, and many developments are being made with a lot of interest and effort. In this research, we intend to propose a university curriculum model for blockchain, which is important in the 4th industrial revolution. Regarding the blockchain education model, we propose a related blockchain education model focusing on the contents of operating an industry-oriented education course through the human resource nurturing process, and various blockchain education will be activated to achieve the blockchain industry development.