• Title/Summary/Keyword: Mandate

Search Result 125, Processing Time 0.033 seconds

The Study of Transitional Justice in El Salvador (발전전략으로서의 과거청산 - 엘살바도르 이행기 정의의 특수성 사례 분석 -)

  • Noh, Yong-Seok
    • Iberoamérica
    • /
    • v.13 no.1
    • /
    • pp.41-67
    • /
    • 2011
  • El Salvador had suffered some 75,000 casualties, mostly civilian, from violent civil conflict(1980-92). In 1992, after negotiations, the government and FMLN signed a historic comprehensive peace accord which brought an end to the war and instituted wide-reaching political and social reforms. Many scholars call it as Transitional Justice in El Salvador. Transitional Justice in El salvador has had two identifiable stages. In the First stage, institutional reforms, such as DDR(disarmament, demobilization, reintegration), and a truth commission were implemented. The second phase corresponds to the period subsequent to the truth commission report, with the failure to implement the commission's recommendations, including those related to reparations and justice. This essay explain how was transitional justice in El salvador different from the other cases, and what was the purpose of extraordinary transitional justice in El Salvador. In detail, the first section of this essay examines the history of the civil war and peace process in El Salvador, and then explores the relationships between cold war and transitional justice in El Salvador. Finally, this essay suggests that truth commission's mandate which investigate 'serious acts of violence that have occurred since 1980' was very important role to accomplish peace and transitional justice in El Salvador.

Critical Assessment of Programme-Based Conflict Resolution Model Applied to Multiple Stakeholders Within The Context of Industrialized Building Production and Life Cycle Supply Chain System

  • Tanaka, Koji
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.551-562
    • /
    • 2022
  • The building production system has been analysed by the dichotomy "employer-contractor" relationship, which failed to take into account of the role and function of multiple stakeholders within the life-cycle supply chain. This is further observed in the current conflict resolution model, which, in my argument, struggles to contribute to industrialize the building production and achieve better efficiency and effectiveness as expected. The purpose of this paper is to critically assess the issues of current programme-based conflict resolution model, and discuss alternative models how they can be modelled and applied to the construction projects. The conclusions of findings are; First, the current model is framed around the contracts and dispute resolutions based on the legal concept of "claimant and respondent" where one party(s) advances a claim once and the other(s) objects, as such it fails to reflect the nature of construction projects where multiple stakeholders are involved concurrently and for a long period of life-cycle of buildings. Second, an alternative is "Six-stakeholders model" which represents the multiple stakeholders and clarifies the flow of obligation-liability-monetary relationships among participants for a long period of life-cycle of buildings. Further, with reference to both historical and recent cases, a reflection and insight into pros and cons of programming method is added, especially as to why this method is considered to have become a mandate of the modern construction management, and how academics and practitioners should deal with it more cautiously and prudently.

  • PDF

A study on the Development of BIM-based Quality Pre-checking System in Architecture Design Phase

  • Shin, Jihye;Choi, Jungsik;Kim, Inhan
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.284-288
    • /
    • 2015
  • Recently, the mandate on utilizing BIM implemented by public institutions of many countries has great impact on the significantly increasing practices of BIM. The improvement of work efficiency and productivity, which is occurred by BIM adoption, depends on the consistency and accuracy of data. To maximize the benefit of BIM, the interests in BIM data quality have been enlarging all over the world. The BIM data quality pre-check, which is conducted by designer in the design phase, offers opportunities for quality improvement by continuously assessing BIM data. However, BIM quality pre-check is being conducted under arbitrary interpretation of users because of the absence of specific review factors and assessment methods for checking BIM quality. The purpose of this study is to establish an automated BIM quality pre-checking system to improve BIM design quality effectively and efficiently. It could be expected to meet the owner's requirements and to minimize the cost and time occurred additionally from revising and reproducing data by constructing consistency and accuracy of it.

  • PDF

Comparison of Teacher's and Students' Evaluations on OSCE Performance among College Nursing Students (객관화된 구조화 임상시험의 학생평가와 교수자 평가 간의 차이 비교 및 영향 요인)

  • Iikura, Atsumi;Suh, Eunyoung
    • Perspectives in Nursing Science
    • /
    • v.11 no.2
    • /
    • pp.153-161
    • /
    • 2014
  • Purpose: This study was aimed to compare and contrast the evaluation scores on students OSCE performance between the instructors and students according to the Bloom's taxonomy. Methods: A total of sixty six students in a nursing college in Seoul, Korea and four instructors were recruited in the study. The 28 sophomore students were assigned to an OSCE on intravenous injection, whereas 38 junior students on tracheostomy care. Knowledge levels were measured by the students using the researcher developed knowledge questionnaires, and the attitudes and skills by the students and instructors by the modified clinical performance checklists. The data were analyzed by SPSS 22.0 program. Results: For knowledge, the higher GPA of the previous semester was only significant factor of higher knowledge scores. There were statistically significant differences in scores of total (t=-2.740, p=.008) and skill (t=-2.528, p=0.014), but not in attitude between the instructors and students' evaluations. The students evaluated their skill scores significantly higher than those of the instructors. For knowledge, the higher GPA of the previous semester was the only significant factor of higher knowledge scores. In attitude scores, the students in higher grade significantly overestimated themselves (t=3.076, p=.003). Conclusion: Clinical performance assessment requires methodological validity and reliability for student to attain necessary clinical skills properly and efficiently. The findings of this study mandate various assessment methods for nursing simulation evaluations to be valid.

Authentication Protocol based on Credential for Implantable Medical Device (체내 삽입장치를 위한 위임장 기반의 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.259-264
    • /
    • 2014
  • Body insertion due to the recent development of sensor technology, the device is attached patients to receive medical services from anywhere, anytime environment is changing. Body insertion devices for the hospital, the patient's vital information attached personnel (doctors, nurses, pharmacists, etc.) to pass, however, when a problem occurs, a patient's information to a third party that can be exploited easily exposed. In this paper, we proposed signature authentication protocols mandate based on the patient's power of attorney from the center of the u-Healthcare services, hospital officials FormHelper third party disguised as a patient, the hospital patient information easily obtained from the officials to prevent. The proposed protocol, the patient's sensitive information to a third party, do not expose the patient's sensitive information to the random number generated by the u-Healthcare service centers and patients hash signature key to encrypt sensitive information of patients. From third parties to maintain synchronization between the patients and the hospital personnel in order to prevent patient information from being exploited illegally by the patient's vital information leakage can be prevented.

The Health Hazard Evaluation Program by NIOSH (NIOSH의 건강유해도 평가 프로그램)

  • Jeong, Jee Yeon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.10 no.1
    • /
    • pp.147-159
    • /
    • 2000
  • The NIOSH health hazard evaluation program (HHE program) was created in response to the mandate to determine the toxic effect and potential health hazard of workplace exposure, which is found in Occupational Safety and Health Act of 1970 and the Federal Mine Safety and Health Act of 1977, A primary benefit of HHE program is its ability to provide current health hazard data to employers and employees, which assists them in identifying solutions to occupational health and safety problems in their workplaces, The HHE program also stimulates research in the development and review of sampling methods and diagnostic tests and may prompt additional exposure assesment efforts and toxicological and epidemiological studies. HHE projects also provide human exposure-toxicity data that are used to asses the validity of existing occupational health standards and to support criteria for new standards of recommendation, The HHE request is classified into four categories: 1) category 1: As a administratively invalid, 2) category 2: These are valid requests for which a site visit is not essential to an appropriate response, 3) Category 3 : These are valid requests for which a site visit is necessary for an adequate evaluation, 4) These are valid request which present a complex problem or an opportunity for research, To carry out HHE program one or methods of investigation might be used: 1) direct observation and evaluation of production processes and employee work practices 2) employees exposure level and air contamination level 3) medical test or physical examinations of employees 4) private, confidential interviews with employees 5) review of employer's record of injuries and illness, employee exposure data, medical tests and job histories. After investigation and analysing the data, NIOSH issues a final report, giving finding and recommendation.

  • PDF

Current Status and Issues of Data Management Plan in Korea (데이터 관리 계획의 국내 현황 및 과제)

  • Choi, Myung-seok;Lee, Sanghwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.220-229
    • /
    • 2020
  • With the recent development of digital technology, the research paradigm is evolving towards data-driven. National management and utilization of research data is a key element not only to enhance research transparency and efficiency, but also to prepare for a data-driven society. Policies and infrastructure for sharing and utilization of research data from publicly-funded research are being actively promoted worldwide. In Korea, related regulations were recently revised to mandate to submit a data management plan (DMP) when proposing a national R&D project. In order to effectively implement the sustainable DMP system, researchers need various support. In addition, guidelines and implementation procedures are essential for management and utilization of research data at the national or institutional level. In this paper, we provide an overview of the data management plan, examine the current status and issues in Korea, and suggest a template and checklists of data management plan, and an implementation procedure at research institutes.

Strategic Approaches and the Role of Naval Forces to Counter Increasing Maritime Threats (해양안보 위협 확산에 따른 한국 해군의 역할 확대방안)

  • Park, Chang-Kwoun
    • Strategy21
    • /
    • s.31
    • /
    • pp.220-250
    • /
    • 2013
  • South Korean national security strategy should be developed to effectively handle and counter increasing maritime threats and challenges. There are three major maritime threats South Korea faces today; maritime disputes on the EEZ boundary and Dokdo islet issues, North Korean threats, and international maritime security. Maritime disputes in the region are getting intensified and turned into a military confrontation after 2010. Now regional countries confront each other with military and police forces and use economic leverage to coerce the others. They are very eager to create advantageous de facto situations to legitimize their territorial claims. North Korean threat is also increasing in the sea as we witnessed in the Cheonan incident and Yeonpyoung shelling in 2010. North Korea resorts to local provocations and nuclear threats to coerce South Korea in which it may enjoy asymmetric advantages. The NLL area of the west sea would be a main hot spot that North Korea may continue to make a local provocation. Also, South Korean national economy is heavily dependent upon foreign trade and national strategic resources such as oil are all imported. Without an assurance on the safety of sea routes, these economic activities cannot be maintained and expanded. This paper argues that South Korea should make national maritime strategy and enhance the strength of naval forces. As a middle power, its national security strategy needs to consider all the threats and challenges not only from North Korea but also to maritime security. This is not a matter of choice but a mandate for national survival and prosperity. This paper discusses the importance of maritime security, changing characteristics of maritime threats and challenges, regional maritime disputes and its threat to South Korea's security, and South Korea's future security strategy and ways to enhance the role of naval forces. Our national maritime strategy needs to show middle and long term policy directions on how we will protect our maritime interests. Especially, it is important to build proper naval might to carry out all the roles and missions required to the military.

  • PDF

The Changing Dynamics of Young Shanghai Ladies' Fashion and Aesthetic Styles from 1949 to 2000 (1949년 이후 중국 여성복 변화와 디자인 특성 -20대 상하이 상해(上海)여성을 중심으로-)

  • Wang, Zhuozhuo;Lee, Youn-Hee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.13 no.4
    • /
    • pp.15-28
    • /
    • 2011
  • This study will focus on research and analysis covering the period of time since the creation of the People's Republic of China to current day China, with an emphasis on 20-something year-old women living in Shanghai. In conducting this research, historical evidence of fashion was derived from books, photographs, and Internet resources pertaining to the specific periods of interest. Furthermore, each set of data has been organized in approximately decade-long segments that best reflect the transformation of Chinese fashion from 1949 to 2000. As a result of the countrywide emphasis placed on revitalization of the newly created Chinese state during the period of 1949 to 1965, detail to fashion was largely ignored, in preference to the successful upstart of a working economic foundation. This neglect of fashion is evident by the scarcity of new and daring styles during this period. The following the period of 1966 to 1977 ushered in a cultural revolution that was aptly demonstrated in the changing fashion tastes. When compared with the previous period, the blandness of clothing, authorized by the Chinese government clearly reflected the rules and regulations strictly enforced by a government mandate of conformity and obedience. These orthodox changes were so drastic, that women wearing these clothes could hardly be differentiated from men in the same style wear. After Mao Ze Dong's death in 1976 and the end of the sternest period of the Chinese Revolution, a new era of Chinese culture and fashion was made possible by a more lax and tolerant government. During the later palt of the seventies through the eighties, this new governmental policy fostered more openness and self-expression, both of which led to a newfound interest in expressing one's desires and personality through the clothes he or she chose to wear.

  • PDF

Analyzing the Factors Affecting the Successful Deployment of the Open Source Based Institutional Repositories (오픈액세스기반 기관리포지터리 성공에 미치는 요인 분석)

  • Hwang, Hye-Kyong;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.35-58
    • /
    • 2009
  • One of the main goals of providing open access is to vitalize the exchange of academic information by allowing access to the scholarly research outputs for everyone without the legal, financial, and technical barriers. We regard the use of the institutional repository as an open access enabler. In this study, we tried to make the factors, which enable the successful deployment of the institutional repository, explicit. We utilized literature review and case studies to generate the potential success factors for the institutional repository deployment. We verified the factors by having in-depth interviews with the subject matter experts. The resulting factors were organized as organizational, political, and technical ones. The organizational factors included the strong open access support by the organization heads. Under the policy factors, a number of issues such as selection of the core contents, minimum quality control, protection of the copyrights, forming supporting groups through active advertising, long-term preservation, incentive, and mandate, were included. The technical factors included easy submission, support for interoperability, and support for the publication activities.