• Title/Summary/Keyword: Organization Support and Protection System

Search Result 25, Processing Time 0.024 seconds

Study on the police's protection·support of victims-declaring the Victims Protection years (피해자보호원년을 선언한 경찰의 범죄피해자 보호·지원에 관한 연구)

  • Gong, Jung-Sik
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.7-35
    • /
    • 2015
  • South Korea's socioeconomic status is high enough to support services for the protection of crime victims. Until now, the Ministry of Justice was the only institution to protect and support the victims, but recently the national police is included. This is considered preferable, since the police is the one to contact the victims first- they can provide immediate support after the incident. Several limits in current laws and crime protection system exist. Therefore, given the importance of protecting victims, model of public-private joint forms should be considered. In premise of establishing a new relationship between the public-private joint system of justice and the maintenance, the range of police's involvement with crime supports will be determined. In the case of developed countries, the police and private organizations maintain close cooperation, appearing as substantial care and support for crime victims. Therefore this study reviews the problems in crime victim protection, assistance from the police stage, and suggest the improvements as follows. The first is to redefine the role of the police who first contacted in the crime victims protection support, the second is to establish a permanent cooperation framework, such as victims specialized police, victims protection agency, the third is to develop services for victim protection available from the police stage, and the fourth, opening Victim Support Center functioning as a temporary accommodation or safety zone for the personal protection of victims. The fifth is to regularize solution conference for victims' protection, and the sixth is to divide of roles in state organization government in charge of victim's protection and local government responsible for victim's support.

  • PDF

Design and implementation on Safety assesment system for security threat analyzing (보안 위험분석을 위한 안정성 평가 시스템 설계 및 구현)

  • Cho, Kyoung-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.333-339
    • /
    • 2007
  • Risk of damage on information system being grow according to increasing its dependence rate on most of organization. On this work, make planed for a safety assessment system in which information protection management system and threat analyzing method. Also, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization, an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

Grope for a summary program about intellectual property protection of traditional knowledge(TK) etc. discussed in WIPO (WIPO의 전통지식 등의 지재권 설정 논의에 관한 개략적 방안 모색)

  • Lee, Je-Hyun;Kim, Yong-Jin;Choi, Hwan-Soo
    • Journal of Haehwa Medicine
    • /
    • v.12 no.2
    • /
    • pp.227-234
    • /
    • 2004
  • The international government committee is progressing their agreements about intellectual property protection of traditional knowledge(TK), gene resource(GR), folklore(FL) in WIPO. It is in the course of selection with precedence of TK, GR, FL in WIPO, focused on discussions about listing of TK documents, standardization of DB construction, sharing and profit distribution of GR. There are disagreements between developed countries and developing countries about intellectual property protection agreements of TK, GR. The developed countries insist on using the existing intellectual property protection, but the developing countries ask new ones on character of TK, GR. It causes intangible assets to be valuable trade properties in future world trade. This research Groped for a summary program about intellectual property protection of traditional knowledge(TK) etc. debating in WIPO. This program confirms that such as TK, GR etc. not only to be the cultural property accumulated in human history, but also to be the original resource may be using at present. Therefore, we suggest that the focus of discussion should transfer to UNESCO instead of WIPO which only deal with the intellectual property protection. Besides, the main body which protecting and supporting TK should become its holding organization so as to achieve more effective management about it. In order to protect and support TK, the government should have firstly the recognition that TK is the property belongs to the country. By this viewpoint, it needs to setup DB through overall excavation of the unofficial knowledges in order to protect and support these TK, GR. Because the positive dealing with those WIPO's discussion means to support our TK, GR, so there should have some reorganization about existing related ones, and also needs systemic supporting policies & management' system.

  • PDF

A brief review of national management system in public health and medical aspect (보건의료관점에서 본 국가재난안전관리 체계 및 대책)

  • Kim, Jee-Hee;Lee, Si-Young
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.375-376
    • /
    • 2008
  • Recently the increase of natural disaster and man-made disaster, newly emerging infectious diseases and bioterrorism attack changed the world in many aspects. So the Ministry of Health and Welfare and other related agencies are trying to solve the problems with disasters. We discussed these problems in the following eleven categories. (1) emergency medicine (2) communicable disease control, (3) food safety control, (4) public facilities safety, (5) social welfare facilities safety, (6) bioterrorism control, (7) geriatric health care, (8) insurance support, (9) overseas disaster victim support, (10) national organization protection, (11) fire fighter safety in forest fire. Through the reviews on the various kinds of disaster, we proposed the disaster control measure for the near future.

  • PDF

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

The Relationship between Emotional Labor Status and Depression in Dental Hygienists (치과위생사의 감정노동 실태와 우울에 미치는 영향)

  • Choi, Yoon-Kyeong;Kim, Keon-Yeop;Kim, Myeong-Seon;Moon, Bo-Ae;Kim, Kwang-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.635-643
    • /
    • 2017
  • This study examines the relationship between emotional labor and depression in dental hygienists. Data were collected from 186 dental hygienists working in dental clinics in Daegu from early March to early April 2016. The survey was composed of questionnaires related to general characteristics, work-related characteristics, emotional labor, and depression. As a result of analyzing the subordinate factors of emotional labor, 57.0% of the factors of 'organization support and protection system' were the highest, and the effect of emotional labor on depression was 'emotionaldisharmony and damage', 'Organizational support and protection system', and especially, the ' emotionaldisharmany and damage' factors were 4.042 times higher than normal. The dental hygienist's degree of emotional labor risk is high, and education, prevention and management measures for emotional labor will be prepared. In addition, emotional labor affects the depression of dental hygienists as well, and comprehensive mental health measures are needed to take into consideration general and occupational characteristics that affect depression.

A Study on the Linkage Model of Community Elderly Protection System: Focusing on Long-Term Care Insurance for the Elderly (지역사회 노인보호체계의 연계모형에 관한 연구: 노인장기요양보험을 중심으로)

  • Choi, In-Kyu
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.259-266
    • /
    • 2016
  • The purpose of this study is to explore the feasibility of establishing the elderly protection system for the elderly in the local community, and to explore the linkage model and action strategy. In Korea, there is a need to build a comprehensive elderly care system so that elderly people can have appropriate counseling and support programs in the community, as the elderly increase their diverse needs (leisure, housing, employment). In this study, we set up a linkage model of elderly care system and suggested two ways to practice it. First, it is suggested that it is desirable to focus on the formation of the elderly protection system in the community, and divide the practice process into three stages: organization, practice, and organization. Second, it is necessary to apply the long-term care professional manpower which can play a central role such as care manager and nursing care provider in order to apply the community organizing model of the elderly protection system and stable operation of long-term care insurance for the elderly. In addition, a social welfare council and a private network should be established to form a social welfare council, the establishment of related legal provisions, and the education of care managers. Therefore, it is necessary to establish basic data through this study, to establish diverse strategies and plans for the elderly protection system, and to promote it in a phased manner.

On the optimum design of reinforcement systems for old masonry railway tunnels

  • Ghyasvand, Soheil;Fahimifar, Ahamd;Nejad, Fereidoon Moghadas
    • Geomechanics and Engineering
    • /
    • v.28 no.2
    • /
    • pp.145-155
    • /
    • 2022
  • Safety is a most important parameters in underground railway transportation; Also stability of underground tunnel is very important in tunneling engineering. Design of a reliable support system requires an evaluation of both ground demand and support capacity. Iran's traditional railway tunnels are mainly supported with masonry structures or unsupported in high quality rock masses. A decrease in rock mass quality due to changes in groundwater regime creep and fatigue in rock and similar phenomena causes tunnel safety to decrease during time. The case study is an old tunnel in Iran, called "Keshvar"; it is more than 50 years old railway organization. In operating this Tunnel, until the several problems came up based on stability and leaking water. The goal of study is evaluation of the various reinforcement systems for supporting of the tunnel. The optimal selection of the reinforcement system is examined using TOPSIS Fuzzy method in light of the looming and available uncertainties. Several factors such as; the tunnel span, maintenance, drainage, sealing, ventilation, cost and safety were based to choose the method and system of designing. Therefore, by identifying these parameters, an optimal reinforcement system was selected and introduced. Based on optimization system for analysis, it is revealed that the systematic rock bolts and shotcrete protection had a most appropriate result for these kind of tunnel in Iran.

Evaluation Tool for Analyzing Method of the Information System (정보시스템 위험분석 평가도구)

  • Kim, Kang;Cho, Kyoung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.773-777
    • /
    • 2007
  • Very various infusion by development of systems that is based on network is spread. Therefore, Evaluation Tool has been an active research area to reduce the risk from intrusion. On this thesis, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

A study for Internal Accounting Control Based on Computerized Accounting Information System (전산화된 회계정보시스템의 내부회계통제의 운영방안에 관한 연구)

  • 손명철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1355-1364
    • /
    • 2001
  • Internal control comprises the plan of Organization and all of the coordinate methods and measure adopted within a business to safeguard its assets. check the accuracy and reliability of its accounting data, promote operation efficiency, and encourage adherence to prescribed managerial policies. Internal accounting control is classified into General Control and Application Control. Essential elements of internal accounting control as follows : 1. General Control $\circled1$ Organization and operation controls. $\circled2$ System development and Documentation controls. $\circled3$ Hardware controls. $\circled4$ Software and hardware Accessibility controls. $\circled5$ General systems security and protection 2. Application control $\circled1$Input control. $\circled2$ Processing control. $\circled3$ Output control. Internal accounting control can establish a total management information system by connecting with mana-gement control of a company, and enable decision makers to establish decision support system(DSS), is so vital today.

  • PDF