Due to COVID-19, much research has been conducted on learning loss and educational gaps due to the postponement of the start of school and prolonged online distance learning, and most of the research has focused on the phenomenon of educational gaps. If a pandemic situation like this occurs in the future, fundamental policies are needed to resolve the educational gap. A fundamental solution requires not only an understanding of the educational gap phenomenon, but also the structure behind the phenomenon. Therefore, from a structuralist perspective, this study sought to model the educational gap caused by COVID-19 as a prototype of systems thinking and identify its structure. In addition, we looked at the unintended consequences resulting from policies aimed at resolving existing educational gaps. In order to respond to similar disaster situations in the future, policies for resolving the digital gap, support for basic academic skills, quality improvement for distance learning, and self-directed learning were discussed based on the structure of this study.
South Korea needs reorganization of dispute resolution system due to the frequent occurrence of a case that trade secret or technique are leaked. First, the distributed various laws are established and enforced by enacting and enforcing individual laws. Therefore, the redundancy problems, the collision of individual laws, the decline in diversity, integrity, and connectivity are issues. An independent legal system is needed by Act on the Prevention and Protection of Technology Leakage. Thereby, The support system of technological protection that is sprayed in government departments such as the Small and Medium Business Administration, the Ministry of Trade, Industry and Energy, the Patent Office, the Fair Trade Commission, the Trade Committee, the National Police Agency, and the Spy Agency integrates and unifies institutionally, and it is necessary to advance a policy with functional division. Second, the Patent Tribunal, the Invention Promotion Act, the Industrial Property Right Dispute Mediation Committee by the patent law, the Industrial Technical Dispute Mediation Committee on the Industrial Technology Outflow Prevention and Protection Law and the Medium and Small Firm Dispute Mediation and Arbitration Committee on Small Business Technology Protection Support Law are installed. However, since it established the integrated law on the Act on the Prevention and Protection of Technology Leakage, it is desirable to set the merged operation of establishment on the Technical Dispute Mediation Committee under the Small and Medium Business Administration or the Ministry of Trade, Industry and Energy.
The purpose of this study is to grasp the overall policy decision system of sex crime prevention policy and analyze the interaction and pattern of actors in policy formation process. This is a useful way to identify the causes and ways to improve the policy if the sex crime prevention policy fails. As a research method, we used a model of advocacy through case analysis and language network analysis. In the external environment, low reporting of sex offenses, technical improvement and supplement for preventive management, consciousness of victims of sexual crimes, amendment of legislation, and support of the president. The conflicts between the advocacy coalition opposed the strong regulation, the prevention of recidivism, the expansion of the range of objects to be worn, the temporary effect of the system and the retrospective of the bill. As a problem-solving strategy, it was confirmed that the opposing positions of pros and cons of lack of manpower and negligence of management through the extension of the system were acutely opposed. In the context of media reports, this tendency is more likely to be understood as the concern of prevention and management at the central government level to prevent sex crimes. Therefore, although the methods of prevention of sex crimes have been insufficient in the past, it is hoped that this study will be helpful in breaking the link of negative policy vicious cycle.
The purpose of this study is to investigate the causes of the dramatic process in forest policies from July of 1972 to June of 1973. In 1972, the core forest problem calling for an immediate solution was the severe forest degradation such as a low growing stock ($11m^3/ha$) and lots of non-tree forest land corresponding to 12% of total forest land. There could have been various approaches to solve the problem at that time. By the end of 1972, the Korean government was afoot to choose the management-oriented approach to carry out reforestation as a part of forest management. In order to implement this approach, the Korean government established the Forest Development Law enforcing establishment of the Forest Management Corporation as a public organization to carry out forest management in the special development land. However, the Korean government changed the management-oriented approach into the administration-oriented approach to carry out reforestation as a part of forest greening in order to rehabilitate severe degraded forests as soon as possible in early 1973. The Forestry Administration (refer to Forest Service) was transferred from the Department of Agriculture and Forestry to the Department of Interior for the efficient rehabilitation in advance, before the 1st 10-year National Greening Project. After the organization's transfer, the government established the 1 st 10-year National Greening Project aiming to reforest one million ha from 1973 to 1982 to use activities like the national greening campaign and the administrative organization mobilization including police force. Reforestation policy as a part of forest management lost effect due to the greening-oriented approach choice. Moreover, the Government struggled to provide 20 billion won for the establishment of the Forest Management Corporation. After all, on March 5th of 1973, the management-oriented approach dropped a curtain deleting the clauses defining the establishment of the Forest Management Corporation. Park, Chung-hee who was the then president of Korea might have felt the 'time restriction' to lose no time to habilitate degraded forests. Due to his awareness, the approach regarding reforestation was changed into administration-oriented activities. The president's awareness was considered as an invisible cause at that time.
This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.
The objective of this article is to inform and document the contemporary development of the private security industry in Queensland Australia, a premier holiday destination that provide entertainment for the larger region. The purpose of this review is to examine the comtemporary development of mandated licensing regimes regulating the industry, and the necessary reform agenda. The overall aim is threefold: first, to chart the main outcomes of the two-wave of reforms since the mid-'90s; second, to examine the effectiveness of changes in modes of regulation; and third, to identify the criteria that can be considered a best practice based on Button(2012) and Prenzler and Sarre's(2014) criteria. The survey of the Queensland regulatory regime has demonstrated that, despite the federal-guided reforms, there remain key areas where further initiatives remain pending, markedly case-by-case utilisation of more proactive strategies such as on-site alcohol/drug testing, psychological evaluations, and checks on close associates; lack of binding training arrangement for technical services providers; and targeted auditing of licensed premises and the vicinity of venues by the Office of Fair Trading, a licensing authority. The study has highlighted the need for more determined responses and active engagements in these priority areas. This study of the development of the licensing regimes in Queensland Australia provides useful insights for other jurisdictions including South Korea on how to better manage licensing system, including the measures required to assure an adequate level of professional competence in the industry. It should be noted that implementing a consistency in delivery mode and assessment in training was the strategic imperative for the Australian authority to intervene in the industry as part of stimulating police-private partnerships. Of particular note, competency elements have conventionally been given a low priority in South Korea, as exemplified through the lack of government-sponsored certificate; this is an area South Korean policymakers must assume an active role in implementing accredited scheme, via consulting transnational templates, including Australian qualifications framework.
After the hydrogen fluoride leak in Gumi in 2012, the government has been systemizing the disaster management system, such as responding to and managing chemical accidents. In particular, the Ministry of the Interior and Safety (MOIS) is in charge of evacuation of residents following chemical accidents based on the Framework Act on Management of Disaster and Safety. In this study, an application plan was presented to support and utilize the decision-making support for evacuation of residents after a chemical accident using the chemical accident investigation equipment of the National Disaster Management Research Institute (NDMI). In the equipment operation system for scientific information collection due to chemical accidents, the roles and purpose of use of long/short distance measurement equipment were presented according to regular and emergency situations. Using the data acquired through long/short distance measurement equipment, it can be used as basic data for resident evacuation decision-making by monitoring whether chemicals are detected in an emergency and managing data on detected substances by company in a regular situation. As a result of measuring chemical substances in order to verify on-site usability by equipment only for the regular operation system, it was confirmed that real-time detection of chemical substances is possible with long distance measuring equipment. In addition, it was confirmed that it was necessary to check the measurable distance and range of the equipment in the future. In the case of short distance measurement equipment, hydrocarbon-based substances were mainly detected, and it was confirmed that it was measured at a higher level in Ulsan-Mipo National Industrial Complex than in Onsan National Industrial Complex. It is expected that it can be used as basic data to support decision-making in the event of chemical accidents through continuous data construction in the future.
Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.
The purpose of this study was to analyze the effect of male university student perceptions of dating violence on dating violence abuse behavior and damage behavior. The subjects of the study were 233 students from six departments at U University located in Chungbuk. As a research instrument, Haeun Yoon's(2013) instrument was used to recognize dating violence, and CTS2 was used as a instrument for harassment and damaging behavior of dating violence. For data analysis, correlation analysis between dating violence perception and damage behavior was performed, and regression analysis was performed to determine the effect of dating violence perception on dating violence harassment and damage behavior. First, it was shown that there was a significant negative correlation between the harassment behavior or damage behavior and perception of dating violence in male university students. Second, it was found that the recognition of dating violence had a significant negative effect on the harassment behavior and damage behavior of dating violence. The results of the research could be used as basic data to develop a dating violence prevention program.
The Purpose of this study is to establish efficient and balanced development and to make transparent marketing system, environment which is to protect small business, consumer's. This Goal of this study is that focus on development of regional and national economy. Especially, to protect small businessmen, to reserve consumer's buying choice. First of all, to examine causes of distribution maintenance and to will be analysed legal controversy of big distributive markets since local autonomy business limits. It is this study that concentrate on big distributive mart shutdown of business hours, Problems and Countermeasures. The main focus of in this study is as follows: First, to examine the ruling of the court that protest and accept of business hour in big distributive mart' problem and regulation, Second, to understand each of the judgement and problems of distributive shutdown systems, Third, to suggest the good distributive business trade act and the possible collaboration with focus on small and big mart System in Korea. This paper to analyze case of conflict and focus on establishment of transparent distribution since business limits.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.