• Title/Summary/Keyword: Personal Protection

Search Result 1,076, Processing Time 0.026 seconds

Improvement of Citadel Structure on Board Ship Using FDS (화재 시뮬레이션을 이용한 선원대피처의 구조 개선에 관한 연구)

  • Kim, Won Ouk;Kim, Jong Su;Park, Woe Chul
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.306-311
    • /
    • 2015
  • Recently, vessel hijacking by pirates has been a big issue around the world. In case of the hostages of M/V "SAMHO Jewelry" on January 20, 2011, the Korean Navy has rescued 21 seafarers by first naval operation with somalia pirates since establishment of the Navy. Also, in case of the "HANJIN Tianjin", all crews evacuated to the Citadel promptly when being attacking by pirates and were safely rescued by the navy. By the accident, Necessity of Citadel for seafarer on board ship came to the fore against pirates. Taking in account increasing pirates accident at sea, many research relating to pirates has been implementing with a view to responding to them so far. By amending the ship facility regulation in the domestic law on Jan. 2011, the installment of Citadel on board ship became mandatory for ocean going vessel serving pirates area. Hence, this paper provides new model of Citadel structure based on an Fire Dynamic simulation in order to improve personal safety in case of vessel hijacking.

A Study on the Eyeglass Wearer's Self-image -Q-methodological Approach- (안경착용자의 안경착용에 대한 이미지 연구 -Q-방법론적 접근-)

  • Chung, Soo-Jeong;Chung, Hae-Kyung;Kim, Kyung-Hee;Kwon, Hye-Jin
    • Journal of the Korean Society of School Health
    • /
    • v.12 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • This study attempts to identify the self-image of eyeglass wearers with Q-methodology. Preliminary Q-statements were collected through personal and telephone interviews and based in consultation with reference books, eyeglass wearers, an optician and an oculist. Finally, 34 Q-samples were seleted. The results were analyzed by a Q-factor with a PC QUANL Program. The self-image of eyeglass wearers were found to revolve around three types: Type 1. They feel that eyeglasses have a negative influence on image and that they uncomfortable. In addition, other people have a negative bias toward people who wear eyeglasses. As a result of these negative prejudices and inconveniences, there is a tendency to wear contact lens or have laser operations. Type 2. They feel less uncomfortable comparatively, when explained that glasses can help improve their image. When explained as a fashion accessory, negative prejudices almost disappeared. Type 3. They show a positive reaction when explained that spectacles are also used for sight protection. Howerer, they are sensitive to changes in their complexion as a result of eyeglass wear and place much importance in the design of glass frames. The significance of this study is to suggest basic data for a mediation device that improve the image of eyeglass wearers discovery and analysis of these three types.

  • PDF

The Study of the Influence of Low Cost Carriers' Web site Service Quality on Customer Loyalty (저가항공사의 웹 사이트 서비스 품질이 고객 충성도에 미치는 영향 연구)

  • Hyun, Hye-Won;Suh, Myung-Sun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.103-112
    • /
    • 2015
  • In this study, a study was carried out to see what influence low-cost carrier's e-service quality has on low-cost carrier customers' perceived value and customer satisfaction and what impact the results have on customer loyalty based on the results of previous studies related to e-SERVQUAL, an e-SERVQUAL measurement model for general e-commerce. In addition, a survey of consumers who have experienced using low-cost carrier experience through web sites was conducted. For the analysis of the data collected, SPSS 18.0 was used to conduct frequency analysis, factor analysis, reliability analysis, correlation analysis, and regression analysis and thus to test a hypothesis. Research findings showed that perceived value and customer satisfaction are closely related to customer loyalty, and it was also observed that the reliability factor on the service provided on the web site acts as an important influencing factor for customer loyalty in the perceived value and security factors such as payment by credit cards and protection of personal information serve as important one in terms of customer satisfaction. This study has its limitation in that samples of users who have experienced low-cost carrier are concentrated on specific ages and professions. In the future, it is required to conduct further studies on whether difference is made on the importance of measurement factors related to e-service quality by gender, age group, occupation, and e-service quality.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

Improvements about Problem of Criminal Mediation System (형사조정제도의 문제점에 대한 개선방안)

  • Park, Jong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.550-562
    • /
    • 2016
  • Criminal Mediation System in Korea, it did pilot operation by Crime Victim Support Centers such as Daejeon and other two District Prosecutors' Office in April 2006. And starting 2007, Crime Victim Support Centers and Criminal Mediation System conducted from 57 District Attorney's Office and Branch Offices and now 2016, Criminal Mediation System is operated in all the District Attorney's Office. On the other hand, the Attorney General's Office established the 'Criminal mediation practical operating instructions' in October 2009 and created its legal basis at "Crime Victims Protection Act" in September 2010. It seems that the criminal mediation have to operate as the direction for supporting crime victims recovery. However, it seems that the overall infrastructure of the criminal mediation system is built. But I have experienced this through G Attorney's Office as a Criminal mediator activity from 2007 to 2016 now, some issues have emerged such as weak on personal safety in criminal mediation room, etc. Thus, in this paper, I will examine the problems about this and propose improvements of criminal mediation system to fit the practical criminal mediation.

Design of a Personalized Service Model for Developing Research Support Tool (연구지원 도구의 개인화 서비스 모델 설계)

  • Choi, Hee-Seok;Park, Ji-Young;Shim, Hyoung-Seop;Kim, Jae-Soo;You, Beom-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.8
    • /
    • pp.37-45
    • /
    • 2015
  • With advancement in information technologies and a better mobile environment, the paradigm of service is shifting again from web portals to networked-applications based on individual application programs. Furthermore, as more investment is being made in R&D, the efforts to enhance R&D productivity are becoming important. In this paper, we designed a personalized service model for developing a tool to assist researchers in their R&D activities. To do this, we first compared services and tools in terms of information activities of researchers in R&D. In addition, we also analyzed changes of information environment such as open expansion of information and data, enhancement of personal information protection, popularization of social networking service, very big contents, advances in web platform technology in terms of personalization, and defined some directions of developing a personalized service. Subsequently we designed a personalized service model of research support tool in the views of functions, contents, operation, and defined personalized design goals and principles for implementing it as standard, participation, and open.

A New Model for Codes of Ethics for Librarians of South Korea (한국의 사서직 윤리규정 방향 제안)

  • Kim, Hae-Kyoung;Nam, Tae-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.329-352
    • /
    • 2004
  • In this knowledge-based society of this age, librarianship takes a professional position and requires essential principles of ethics that has to be observed. Therefore, library associations and professional communities all over the world have released criteria and code of ethics to make their professional positions to keep. This research investigated and analyzed the codes of ethics for librarians in United States, Great Britain, Japan, and South Korea which are based on the mission of each library of each country. Based on these analysis and comparison, this research proposed more advanced codes of ethics for South Korea. The proposed model of codes of ethics consists of two parts: ethics for information and ethics for professional positions. The ethics for information contains six essential elements: equal access and services for information, denial of inspection, protection of privacy, neutralization of librarian, and security of intellectual freedom. The ethics for professional positions consists of 8 essential aspects: exclusion of personal benefit, continuous efforts for developing knowledge, keep the professional position, conflicts between professional task and organization, relationship with co-workers, ensure the conditions of rights and welfare for employees, cooperations among libraries, and contribution for creation of new culture.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry (물류산업의 블록체인 적용효과와 법적 과제에 대한 연구)

  • Yang, Jae-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.187-199
    • /
    • 2018
  • The purpose of this study is to find out the positive effects of the block chain when applied to the logistics industry and what legal problems should be solved to apply the block chain to the logistics industry. As a result of the study, it was found that the block chain can create the streamlining document work, increasing visibility, improving transaction reliability, activating Internet of things, and expanding smart contract. However, in order to apply the block chain to the logistics industry, have also confirmed that the scope of electronic transactions, international distribution of electronic bill of lading, and legal supplementation related to personal information protection are necessary. It is meaningful to confirm the applicability in the logistics industry, the positive effect and the legal problem, but it is necessary to study the problem from the practical point of view in the hereafter research.