• Title/Summary/Keyword: National Authority Data

Search Result 251, Processing Time 0.029 seconds

The Degree of Association between Traditional Markets and Related Major Factors in Korea

  • Jeong, Dong-Bin
    • Journal of Distribution Science
    • /
    • v.14 no.7
    • /
    • pp.5-14
    • /
    • 2016
  • Purpose - This paper studies if types of markets have an association with several variables such as occupation, district, sales, employee, administrative district by a lessor, area in rental building and so on. Three attributes of markets can be general commercial zones, central commercial zones and traditional markets. Furthermore, we can investigate the degree of association by calculating the numerical strength and visualizing their distances on two-dimensional plane, once the association exists between them. Research design, data, and methodology - This work is performed by the 2013 report presented with Small Businessmen Promotion Institute in Korea and used by a chi-squared test and correspondence analysis by using IBM SPSS 23.0. Results - The results show that types of markets, including traditional markets, have an association with variables considered in this paper, and we can obtain the detailed associations between attributes of corresponding variables by inspecting two-dimensional plane. Conclusions - This study suggests that government authority and local autonomy can make strategies to vitalize traditional markets and to get win-win relationships among several types of markets by looking over our findings.

A Study on Implementation Method of ECM-based Electronic Document Leakage Prevention System through Security Area Location Information Management (보안구역 위치정보 관리를 통한 ECM기반 전자문서유출방지 시스템 구현방안 연구)

  • Yoo, Gab-Sang;Cho, Seung-Yeon;Hwang, In-Tae
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • The current technology drain at small and medium-sized enterprises in Korea is very serious. According to the National Intelligence Service's survey data, 69 percent of technology leaks are made through employees of small and medium-sized enterprises. A document security system was introduced to compensate for the problem. However, small and medium-sized enterprises are not doing well due to their poor environment. Therefore, it proposes a document security system suitable for small businesses by developing a location information machine learning system that automatically creates a document security Green Zone through learning, and an ECM-based electronic document leakage prevention system that manages generated Green Zone information by reflecting it into the document authority system. And step by step, propose a universal solution through cloud services..

Relationship Between China's College Entrance Examination and High School Teaching-Learning

  • Ren, Zizhao
    • Research in Mathematical Education
    • /
    • v.2 no.2
    • /
    • pp.79-88
    • /
    • 1998
  • To investigate the relationship between the College Entrance Examination (CEE) exams and high school teaching-learning, we conducted a questionnaire survey and collected 2439 valid questionnaires with 16000 teachers involved. This paper discusses the topic with data gathered from the survey, and statistics on CEE examinations over the past few years. The following three questions will be addressed in detail: 1. As a talent selection test for colleges, can the CEE exams single out the elite students in high school? 2. Should the testing objectives of the CEE exams match the teaching objectives in high school so as to have a positive backwash effect on high school teaching and learning? 3. How do teachers assess the CEE exams from the angles of test structure, the functions of individual item types, reforms on test difficulties, and its actual checking effects?

  • PDF

Traffic Safety Analysis in Mombasa Channel: Integrating Ferry Crossings and Main Transit

  • Wamugi Juliet Wangui;Young-Soo Park;Sangwon Park;Daewon Kim
    • Journal of Navigation and Port Research
    • /
    • v.48 no.2
    • /
    • pp.88-96
    • /
    • 2024
  • This study examined challenges posed by two ferry routes, namely, Likoni and Mtongwe crossings, in the Mombasa Channel and their impact on navigational safety. Utilizing the Environmental Stress (ES) model, this study analyzed current ship traffic and assessed stress levels imposed by ferry crossing traffic on navigators. ES values revealed significant stress at these ferry crossings attributed to varying transit speeds. Standardizing transit speeds at two ferry passages can reduce high stress levels, presenting a viable solution. Furthermore, the IWRAP Mk2 simulation underscores crossing collisions as a significant concern, particularly at Likoni and Mtongwe crossings, due to increased ferry traffic. This research offers valuable insights for stakeholders, such as the Kenya Ports Authority (KPA), to develop targeted safety measures and enhance the flow of ship traffic in the channel.

Characteristics and Influencing Factors of Red Light Running (RLR) Crashes (신호위반사고의 특성과 영향요인 분석)

  • Park, Jeong Soon;Jung, Yong Il;Kim, Yun Hwan
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.3
    • /
    • pp.198-206
    • /
    • 2014
  • According to the statistics of the National Police Agency, red light running (RLR) crashes represent a significant safety issue throughout Korea. This study deals with the RLR crashes occurred at signalized intersections in Cheongju. The objectives of this study are to comparatively analyze the characteristics of between RLR crashes and the Non-RLR crashes, and to find out factors using a Binary Logistic Regression(BLR) model. In pursuing the above, the study gives particular attentions to testing the differences between the above two groups with the data of 2,246 RLR/ 3,884 Non-RLR crashes (2007-2011). The main results are as follows. First, many RLR crashes were occurred in the nighttime and in going straight. Second, the difference between RLR and Non-RLR crashes were clearly defined by crash type, maneuver of vehicle before crash, age of driver (30s, 50s), alcohol use and accident pattern. Finally, a statistically significant model (Hosmer and Lemeshow test : 7.052, p-value : 0.531) was developed through the BLR model.

The Priority Management Ranking by using the Classification of Vulnerable Areas for the Soil Contamination in Busan Metropolitan City (부산시 토양오염 취약지역 등급화를 이용한 우선관리대상 순위 선정)

  • Jung, Hyunjung;Lee, Minhee;Doe, Jinwoo
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.7
    • /
    • pp.1-12
    • /
    • 2015
  • The purpose of this study is to highlight the National Classification System related to cleanup the soil contaminated sites and to provide some guidance to address the priority management rank system before the remediation for Busan metropolitan city. Based on the previous soil investigation data, the quantitative classification of vulnerable areas for soil pollution was performed to successfully manage the contaminated sites in Busan. Ten evaluation factors indicating the high soil pollution possibility were used for the priority management ranking system and 10 point was assigned for each factor which was evenly divided by 10 class intervals. For 16 Gu/Guns in Busan, the score of each evaluation factor was assigned according to the ratio of the area (or the number) between in each Gu (or Gun) and in Busan. Ten scores for each Gu (or Gun) was summed up to prioritize the vulnerable Gu or Guns for soil pollution in Busan. Results will be available to determine the most urgent area to cleanup in each Gu (or Gun) and also to assist the municipal government to design a successful and cost-effective site management strategy in Busan.

North Korean Research Institutes for Plant Resources and the Actual Conditions of Their Agricultural Usage

  • Lim, Sang-Cheol;Kim, Wan-Seok
    • Korean Journal of Plant Resources
    • /
    • v.23 no.6
    • /
    • pp.550-553
    • /
    • 2010
  • The representative research institutes in North Korea are the Academy of Science and the laboratories of major universities. The National Academy of Science consists of headquarters, Academy of Medicinal Science, Academy of Forestry Science, and Academy of Agricultural Science. Under the authority of the National Academy of Science, Central Information Agency for Science and Technology (CIAST) has built up a database system integrating all the science technology data to provide scientific and technological information. The major universities of North Korea include Kim Il-sung University, Kim Chaek University of Technology, Pyongyang Agricultural College, and Wonsan Agricultural College, and an agricultural college is situated in each province. Out of 3,860 plant species in North Korea, 158 species which amounts to approximately 4% of the total are rare and endangered, and deforestation is under a critical situation. The Oriental Medicine (Koryo Medicine) has been well developed using medicinal plants, and practical researches on biotic pesticide are largely conducted as an alternative to tackle the shortage of farming materials. Hereafter, a South-North joint research on the amount of plant resources and the methods of its conservation is needed and the North Korean research areas of biotic pesticide are worth adopting to the South Korean eco-friendly organic agriculture.

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

Design of KT′s Single Sign-On on Public Key Infrastructure (공개키 기반 구조에서 KT Single Sign-On 설계)

  • Yeon, Seung-Ho;Park, Hyun-Gyu;Oh, Hee-Soo;Kim, Yeong-Heon;Jun, Byoung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.231-239
    • /
    • 2002
  • This paper gives a comprehensive overview of the SSO solution design on the intranet. SSO described in this paper is based on LDAP, PKI and CA. We designed the data structure to hold many various application services by changing the attribute and DN of LDAP DB. We built LDAP DB using the employee records stored in our organization database. LDAP DB is routinely updated from the database. CA Server that depends on PKI is used to issue the certificates. SHTTP based on SSL is used to protect the data between certificate server and the intranet users.