• Title/Summary/Keyword: Information security

Search Result 17,490, Processing Time 0.044 seconds

A Study on the Career Decision-Making Patterns of Fisheries High School Students (수산고등학교(水産高等學校) 학생(學生)들의 직업결정형태(職業決定形態)에 관한 연구(硏究))

  • Park, Kwang-Chun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.4 no.1
    • /
    • pp.16-29
    • /
    • 1992
  • 1. Purpose of the study: This study was to investigate and analyse the career decision making patterns of students, which would enhance vocational guidance activities for the students. The specific purposes of the study are as follows. 1) To find how much the fisheries high school students are satisfied with the school. 2) To find out the factors which would influence the fisheries high school students in their career decision making. 3) To find out the person who plays the most important role in the career decision making of the students 4) To find out the patterns of behavior taken by the fisheries high school students in their career decision making. 2. Hypotheses: The following hypotheses were tested for this study. 1) There would be significant differences in the extent of school-satisfaction, depending on the class level and major. 2) There would be significant differences in the value criterion with which the fisheries high school students make decisions on their careers, depending on the grades, majors, and the levels of school-satisfaction. 3) There would be significant differences in the human factors which affect their decision-making on their career, depending on the class levels, majors, and the levels of school satisfaction. 4) There would be significant differences in the patterns of behavior they take when they make decisions on their careers depending on the grades, majors and the levels of school satisfaction. 3. Methods of the study: For the verification of the above hypotheses, a questionaire was developed by the researcher, and the questionaire was answered by the total 440 students from three fisheries high schools, located in the rural and urban areas, out of 8 fisheries high schools in Korea. The questionaire was composed of two major parts: school-satisfaction (10 items) and career decision making patterns (39 items). The career decision-making patterns include 16 value criterion items, 10 human category items, and 13 behavior category items. 4. Results of the study: 1) School satisfaction; There was no significant difference in school satisfaction depending on the class level and major. 2) Value criteria; a) Almost of the fisheries high school students think that the potential for advancement, job security, and salary are important factors for their job. b) The seafarer-students rated the salary, prestige of the occupation and leadership to be important than the nonseafarer-students. The nonseafarer-students rated the stabilization of their livelihood and opportunity to use their creative ideas than the seafarer-students. c) The students unsatisfied with their school emphasize the working environment, variety of work duties and leisure more than the satisfied ones. 3) Human factors: a) The fisheries high school students are affected most by their homeroom teachers, major teachers and their parents, but they are less influenced by their counselor. b) The seniors are more affected by their friends or classmates than the freshmen, and especially seafarer-students are more affected by major teachers. c) The persons, who are working in the occupation they are interested in, exert more influence on unsatisfied students than class-teachers do. 4) Behavior patterns; a) Most of them want test their abilities. b) The nonseafarer-students and seniors tend to depend on their own intuitions. c) The seafarer-students, the freshmen, and the satisfied with their school tend to discuss with other persons, and the unsatisfied tend to be influenced by the information that they collect for themselves.

  • PDF

Directions to Fisheries Education for Achieving UN Sustainable Development Goals (SDGs) (유엔 지속가능발전 목표(SDG)를 위한 수산교육 방향)

  • KANG, Beodeul;ZHANG, Chang Ik
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.2
    • /
    • pp.453-465
    • /
    • 2017
  • UN adopted the 2030 Agenda for Sustainable Development and the Sustainable Development Goals (SDGs) in 2015, a set of 17 objectives with 169 targets expected to guide actions over the next 15 years (2016-2030). One goal expressly focuses on the oceans, that is, SDG 14 'Conserve and sustainably use the oceans, seas and marine resources for sustainable development'. More than 30% of fish stocks worldwide were classified by FAO(2016) as overfished. Globally, world capture fisheries are near the ocean's productive capacity with catches on the order of 80 million metric tons. Aquaculture production is increasing rapidly and is expected to continue to increase, but aquaculture encounters some environmental challenges, including potential pollution, competition with wild fishery resources, potential contamination of gene pools, disease problems, and loss of habitat. Accordingly, there have been a variety of world organization and conferences stressing the importance of the implementation of the ecosystem-based fisheries management(EBFM) to overcome these problems. Annual catch of Korean fisheries have shown continuously declining patterns since late 1990s. Most fish stocks are currently known to be over-exploited, and some stocks are depleted due to the increase in fishing intensity and over-capitalization of fishing fleets. Other reasons for the depletion are land reclamations and coastal pollution, which destroy spawning and nursery grounds along the coastal regions. Aquaculture production is also increasing rapidly in Korea. However, several important issues such as gene pool and interaction with capture fisheries should be considered. The EBFM approach should use the best available information coupled with a reasonable application of the precautionary approach. The EBFM has global relevance, and so the real challenge will be to develop and use reliable, robust and cost-effective means of assessing and monitoring the status of ecosystems and their resources, and rapid means of detecting any undesirable and excessive impacts that threaten sustainable use. Future fisheries education should take into account UN's SDGs, which were adopted to achieve the global 2030 agenda. However, there are some difficulties in the current fisheries education system in Korea. First, the current education organizations are limited within the old frame of traditional fisheries sciences. Second, the fisheries education is currently lack of the future-oriented education system and of customized schools or departments. Third, the on-going fisheries education has been based upon few educational policies which are sufficiently relevant to holistic SDGs of the global standard. Accordingly, directions to modern fisheries education for achieving SDGs would be, first, the transition of fisheries education structure into the future-oriented and customized education system. Second, fisheries education needs to shift to the new paradigm, which combines traditional fisheries science education with related fields such as oceanography and environmental sciences to adopt the concept of EBFM. Lastly, fisheries education should accompany relevant policies for effectively achieving SDGs.

A Study on the role of port operation organizations for the development of a region port (지역항만 발전을 위한 항만운영기관의 역할에 관한 연구)

  • Kwon, Se-Min;Pak, Ji-Yeong;Jung, Hyun-Jae;Wang, Ying;Yeo, Gi-Tae
    • Journal of Navigation and Port Research
    • /
    • v.35 no.5
    • /
    • pp.439-444
    • /
    • 2011
  • This study is aimed to extract the key role of port operation organizations for the development of region ports and identify the operating efficiency priorities of three ports such as Busan, Incheon and UIsan port operated by PA(port authority). The Factor Analysis(FA) and Fuzzy Method were used as the analysis methodes. As an important role of port authority and regional maritime affairs & port office, thirteen sub-evaluation factors and four top-level evaluation factors were selected using the FA. Among the top-level evaluation factors i.e. 'port security, information management', service for regional society and customers', 'port marketing' and 'customer attraction', the most important factor was identified as 'port marketing'. The total port efficiency was evaluated using these factors and Fuzzy Method. As a result, Busan ranked 1st, followed by Incheon and Ulsan.

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

An Authentication and Handoff Mechanism using AAA and HMIPv6 on NEMO Environment (이동 네트워크(NEMO)에서 HMIPv6를 적용한 AAA 인증 방안 연구)

  • Choi, Kyung;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.165-182
    • /
    • 2009
  • Mobile IPv6 spends considerable bandwidth considering that its signal volume is proportional to the mobile and also it should be strengthened to support the binding signal volume, the traffic, and effective mobility. So, the study in NEMO(Network Mobility), an extended version of Mobile IPv6, has been conducted. NEMO provides its mobility by putting several mobiles and more than one portable router into one unit called as mobile network. Because nodes access Internet via the portable router at this time, it receives transparency without any additional work and that much reduces binding signal while solving binding storm. By supporting mobility, NEMO is able to have various mobile structures which realize several networks hierarchically and it is necessary to improve its safety and security by authenticating among the upper networks or the lower ones while moving. Also, it is extremely required to begin a study in the device to improve efficiency accompanied with mobility, which is executed by the fast hand-off as well as the safe authentication. For those reasons, this paper not only classifies various NEMO mobile scenarios into 7 ways, but also provides AAA authentication of each scenario, the authentication through the safety authentication and fast handoff authentication using F+HMIPv6 and the way to reduce both signaling volume and packet delays efficiently during the handoff.

A study on career competency, task and job satisfaction of dental hygienists - Focusing on public officials, public institution workers, and researchers (치과위생사 취업 역량, 업무, 직무만족에 관한 연구 - 공무원·공기업 취업자·연구원 중심으로)

  • Jeong, So-Hyeon;Nam, Sang-Hee;Park, Ji-Hyeon;Shin, Eun-Ji;Oh, Na-Won;Yu, Ha-Rim;Kim, SeolHee
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.477-488
    • /
    • 2018
  • Objectives: The purpose of this study was to investigate career competency, tasks, and job satisfaction of public servants, public institutions, and researchers. Methods: The survey was conducted about career competency, job satisfaction, and satisfaction on work life. Next, they interviewed on the characteristics of each job by two or three dimensions. The following conclusions were obtained from July to August 2017. Results: Career competencies were GPA with 3.87, 818 points of TOEIC score, and ITQ certification. Public servants required the information on literacy skills for employment and job performance, while civil servants need more than one year of clinical experience in the dental hospital. The non-commissioned officer needed a written test and fitness training. The health insurance review and assessment center required more than one year of experience from general hospital or medical institutions. Researchers required a research career, language skill, and professors required research and teaching experiences with clinical experience more than three years. The main job tasks were as follows; for public servants, they were official document processing and community projects. For the civilian workers and military/noncommissioned officers, they were medical assistant and administrative works. The employees of the health insurance review and assessment service are examining the medical expenses and the medical examination, the researchers are experimenting, researching and writing articles, and the teaching staff are lecturing and conducting individual research. Conclusions: The results of job satisfaction survey showed that occupational satisfaction was the highest in civil servants, researchers, and teaching professions. Job security was the highest in health workers and health inspectors' evaluation centers, and time vacancy was the highest in civilian workers and military/noncommissioned officers. If you want to work in such an institution, you should prepare elements that match your basic literacy and job specific characteristics. And we should try to increase the satisfaction of work even after work.

The Research about Role Area of RT in Digital Environment - Centers on PACS Workplace -

  • Jung, Young-Tae;Park, Bum-Jin;Son, Gi-Gyeong;Jung, Jae-Ho;Kang, Hee-Doo
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.1
    • /
    • pp.13-20
    • /
    • 2011
  • Now a days in our society, occupation boundaries have become blurred, and come into the limelight in the prior occupation or miss about new workplace. Medical area is no exception also, So we face urgent problem about protecting and spreading RT work-sphere simultaneously. This research allow to identify on RT role area of digital environment that is obscure profession-realm specially, and open up a new field hereafter. We examined present RT role area of digital environment in the more than thirty medical facility(general or university hospital) through questionnaire/visit survey from PACS administrator. Survey sentence comprises total 29 sentence over all main quadrisection-(eX. hospital formation & treatment state and PACS team composition & organization and PACS team workplace and PACS team daily workload), We performed comparative analysis in general contents perspectively. further more, divided main 5 section based on upper analysis and then manufactured output in consideration of each medical facility's operation state. There are comparative problem of hospital policy, So we maintained information security of each facility exhaustively. First, we separated a survey output into main 5 section as follows-(eX. PACS server & maintenance manage, Client/interlock manage, PACS data conversion, 3D reconstruction, PACS data im/export)-that received by 35 medical facility. And then manufactured output with comparative analysis about RT role area each section, general IT managing team about medical environment was out of existence that fill up with RT manpower in the surveyed medical facility consequently. What is worse, hospitals that entirely fill up with another worker were 3 place amazingly. Our specific statistic results show, the respondents was 63% that agree with reorganization of formation base on independence team, and supplement of the personnel average -continuous with upper agreement simply-was about 2.64. Further more, if reorganization break out with only RT manpower, quota TO will increase by geometric progression. Protecting and spreading role workplace is much accounted of the our inevitable project surely and more than 95% PACS administrator's have confidence in this proposition unconditionally. Henceforth, look forward to meeting the RT vision of many-sided multiplayer, based on acquire a specialized IT knowledge actively and open up a new work-field with frontier spirit.

  • PDF

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

Design of Divisible Electronic Cash based on Double Hash Chain (이중해쉬체인에 기반한 분할 가능 전자화폐의 설계)

  • 용승림;이은경;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.408-416
    • /
    • 2003
  • An electronic cash system has to provide the security, to prevent the double spending and to support the divisibility of electronic cash for the easy of use. Divisible electronic cash system allows an electronic cash to be divided into subdivisions. Each subdivision is worth any desired value, but all values must add up to the original cash value. Divisible scheme brings some advantages. It reduces to make the change and also there is no necessity that a customer must withdraw a cash of the desired value whenever transactions occur. In this paper, we present an electronic cash protocol which provides the divisibility based on the double hash chain technique. Electronic cash is constructed in the form of coins. Coins, generated by the double hush chain, have different denominations. The divisibility based on the double hash chain technique. Electronic cash is constructed in the form of coins. Coins, generated by the double hash chain, have different denominations. The divisibility of an electronic cash is satisfied by the payment certificate, which is a pair of bank´s proxy signature received from the bank. When a customer pays the coin of subdivision, the fairness of that coin is certified by a customer´s signing instead of a bank. Although the proposed method does not guarantee user´s anonymity, it generates coins which cannot be forged, and the customer can use an electronic cash conveniently and efficiently with its divisibility.