• Title/Summary/Keyword: Managed Security

Search Result 277, Processing Time 0.024 seconds

A Study on the History of Housing Unit Maintenance in an Apartment Building for Sustainable Performance (공동주택 단위주거 성능유지항목 도출을 위한 시설물 보수이력 분석)

  • Kang, Ji-Yeon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.222-223
    • /
    • 2022
  • The purpose of the study is to derive maintenance items in dwelling unit of apartment after the liability period for defect security. In according with the Apartment Housing Management, the managers of apartment maintain facilities in public and develop a long-term repair plan. However, Apartment unit housing is a private area and is managed facilities individually by residents or owners. As the facility ages, it is necessary to derive items in dwelling unit of apartment that need to maintain performance. Therefore, this paper analyzed the history of repairing facilities through complaints about rental housing units.

  • PDF

Reclamation of Desert with Regular Application of Waste Water

  • Rajan Raj Pandey
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.4
    • /
    • pp.15-31
    • /
    • 2024
  • Deserts around the world mostly do not have plants and are ever- expanding their area each year. There is shortage of food and prevalent hunger around the world mostly in the African countries that have desert. The waste water is not properly managed in those places and it causes disease outbreaks. So, the problems of desertification, waste water management and hunger have to be addressed by the world community. This thesis work tries to explore a possibility of reclamation of deserts with regular application of waste water. The results obtained from a four months long test are very encouraging and it can be easily concluded that the deserts can be reclaimed by application of waste water and it will relieve the desert community from the burden of costly treatment of waste water as well. In turn, they will, to some extent, get rid of water borne diseases and the reclaimed land could be used in future to produce more food to feed the hungry community- positively impacting directly to food security of the focused community.

Web Resources Based Collection Development for Digital Libraries (디지털 도서관의 웹자원 기반 장서개발)

  • Lee, Jee-Yeon;Kim, Sung-Un
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.111-127
    • /
    • 2003
  • Web-based information resources should be managed and used methodically in the same manner as the paper-based resources are managed and used. It is necessitated by the prevalence of web-based delivery of a variety of information. To develop a web-based digital collection, it is critical to establish a set of standardized evaluation criteria for web-resources. The evaluation criteria needs to include authority, trustworthy, reliability, functionality, relatedness, accessibility, structure, design, user support, and security related matters. However, it is also necessary to have certain flexibility to either emphasize or include particular evaluation criteria to reflect varying characteristics of the web resources especially for the purpose of developing an effective digital collection. In addition, it is essential to review the evaluation criteria with respect to value, demand, duplication prevention, and intellectual property, which are relevant to the web-based digital collection development. Finally, various strategies were suggested as means to develop more effective web-based digital resource collection. These strategies include organizing a selection committee to ensure the objectivity and consistency in web-resource evaluation; developing a model for web-based digital resource collection; sharing new standards, protocols, markups, and metadata with other digital libraries; and developing user-centered digital resource collection.

The assessment of Seoul City school sheriff system and developmental expansion plan - Around the righteousness proof of the security industry law application - (서울시 학교보안관 제도의 평가와 발전적 확대방안 - 경비업법 적용의 당위성 논증을 중심으로 -)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.163-191
    • /
    • 2011
  • Recently, the problems in school violence did not stop on the crime between the members at the school and which developed into the invasion crime of the school caused by outsiders. The school is no more the safety zone from the crime. Particularly, in the case of the elementary school, because there are nearly no people who oppose to the outside attacker and can control this, it is the place where it is vulnerable to the invasion crime. The Metropolis of Seoul implements the School Sheriff system within the jurisdiction bureau, in the public elementary school. However, actually the School Sheriff business is being managed, never applying a rule in the Security Industry Law with the main content, that is the Security Industry Law application is excluded. Because the jurisdiction on the contract of Seoul City and operating company are run, the various issues is caused. First, since it is not being considered as a security business, the commercial liability insurance for security company has no chance to applicate when the operation company and the School Sheriff have related damage generation. So the security for the indemnification of loss of the victim is weak. Second, The task of the School Sheriff is ruled just by in the individual contracts. But it is insufficient with this thing. The related duties are required some supplement like a general rule application including the obligation of the guard in the security industry law. Third, the education of the School Sheriff needs to connect with the educational programme in the security industry law. The related professional education specially needed for the prevention of school violence ought to be reserved compensation. Forth, the citizens still demand the strengthening of police patrol for the surroundings of a school in spite of the result of Seoul City's public survey. Therefore, the active relation of cooperation with the police needs to be supported legally and institutionally with the Security Industry Law application. Fifthly, the success of the School Sheriff business can be more guaranteed with the supervision of the legal and institutional device like a the Security Industry Law application or police and all sorts of administrative execution's and etc.

  • PDF

A study on Private Investigation System (Detective System) issues and policy alternative (민간조사제도(탐정제도) 쟁점 분석 및 정책적 대안)

  • Noh, Jin Geo;Jeang, Il Hong
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.61-71
    • /
    • 2016
  • In this study, Private investigation in South Korea, while gone through so far of politics, the process of social change, a positive feature, without evolve, insufficient growth and security services of the business burden of national judicial institutions, detective industry international of the negative vicious circle, such as the acquisition of drop and expedient information of competitiveness is continuously induced it is a reality. It is, therefore, to the proposal, such as the following. First, it must be able to use the term "detective". Secondly, in order to verify the validity of this system, after introducing the first private sphere, in accordance with the stepwise its necessity, it is desirable to extend the operational range of the public area. Third, to have a country of qualification to private research workers, will be managed directly from the country is ideal. Fourth, we must also seek plan to specialize the designated educational institution as a commissioned education institution to institution with a faculty and facilities that are specialized. Fifth, the National Police Agency must manage and supervise the private investigation business. Sixth, the legislative form to amend the current security law, as a kind of private security, must be introduced by adding a private trillion business. Therefore, in order to complement the limitation of such studies, additional subsequent research has if it is not carried out.

Analysis of Medical Expenses Structure for Patients on Percutaneous Coronary Intervention by Medical Security Type (의료보장형태에 따른 관상동맥중재술 환자의 진료비 구조분석)

  • Son, Mi-Kyung;Lee, Sok-Goo
    • Journal of agricultural medicine and community health
    • /
    • v.44 no.4
    • /
    • pp.195-208
    • /
    • 2019
  • Objectives: The purpose of this study was to analyze whether there are differences in medical expenses according to medical security type in the use of medical services with high disease burden such as coronary intervention. Methods: Chi-square test and covariance analysis(ANCOVA) were conducted to identify the differences in the characteristics and costs according to medical security type of 1,904 patients who underwent coronary intervention in a university hospital from 2011 to 2012. Hierarchical regression analysis was conducted to determine whether the cost affects medical expenses. Results: In the medical aid group, the proportion of women, those without a job, those without a spouse, and those who received hemodialysis was high, length of stay was high, patients using the emergency room and those who died was high. The medical aid patients were significantly higher in the non-benefit medical expenses, optional medical expenses, physician and admission, meals, medications and injections. National health insurance patients were significantly higher in procedure. The medical security type was found to be significant as a variable affecting the medical expenses. Conclusions: Provision of medical expenses should be managed in advance by providing prevention and education services for the vulnerable, and care services in the region should be provided to suppress the occurrence of medical expenses due to the increase in the number of days spent. In addition, it is necessary to support medical expenses to prevent unsatisfactory medical services from occurring for non-benefit and optional care.

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

Grid-Based Key Pre-Distribution for Factory Equipment Monitoring (공장 설비 모니터링을 위한 그리드 기반 키 선분배 기법)

  • Cho, YangHui;Park, JaePyo;Yang, SeungMin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.147-152
    • /
    • 2016
  • Wireless sensor networks that are easy to deploy and install are ideal for building a system that monitors the condition of the equipment in a factory environment where wiring is difficult. The ZigBee has characteristics of low price and low power compared with other wireless communication protocols and is suitable for a monitoring system requiring a plurality of nodes. ZigBee communication requires encryption security between devices because all protocol layers are based on OTM trusted by each other. In the communication between nodes, node authentication must be guaranteed and exposure of confidential information managed by each node should be minimized. The facilities of the factory are regular and stationary in distribution location. In order to protect the information gathered from the sensor in the factory environment and the actuator control information connected to the sensor node, we propose a cryptosystem based on the two - dimensional grid - based key distribution method similar to the distribution environment of the facility.

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.