• Title/Summary/Keyword: Policy Evaluation

Search Result 2,932, Processing Time 0.024 seconds

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF

Why the states has no housework policy\ulcorner : The political issue on housework (가사노동의 정채적 반영을 위한 연구)

  • 윤소영
    • Journal of Families and Better Life
    • /
    • v.15 no.1
    • /
    • pp.41-52
    • /
    • 1997
  • This paper explored the public issue on housework analyzed the policy and the law associated housework and developed the theorical model for its political program. This idea is dependent that the policy has priority over change of the social ideology. That policy contains a campaign and a education to be aimed to share of housework in order to make responsibility of men as well as women on family and work. Also it contains economic value estimates to quantify and value the non-wage work(childcaring homemaking etc.) in order to confirm its productive activity. It would assume the lawful form as like a social security or a pension. For example the Family Rights Law Tax Law and Social Security Act have to be reflected on the value of housework and to be secured the social status of provider. After all this work was useful to improve a wage and a social status of all women. As consistent policy and operation associated housework are poor in Korea it is difficult to develop theoric l model on this theme. On the range a political proposal on housework would be bound by family policy(evaluation of housework) and women's labor policy(housework support). So the policy intend to secure a family life to improve welfare of women and to equilibrate the family and the work.

  • PDF

Analysis on the priority of policy programs for 6th industrialization in agricultural sector: using AHP (농업 6차 산업화 정책의 우선순위 분석: AHP를 이용하여)

  • Park, Jeong-Il;Lee, Do-Kyung;Kim, Sounghun
    • Korean Journal of Agricultural Science
    • /
    • v.42 no.4
    • /
    • pp.461-467
    • /
    • 2015
  • The 6th industrialization is one of the most important policies for Korean agricultural sector, and Korean government allocates the large portion of policy budget to promote the 6th industrialization. However, recently, Korean government has experienced the confusion and inefficiency due to too many policy programs for the 6th industrialization. The purpose of this paper is to analyze the current policy programs for the 6th industrialization and to suggest the several guidelines for the more efficient policy system, including the priority of policy programs for the 6th industrialization. The results of studies present a few findings as follows: First, Korean government should evenly promote the 1st, 2nd, and 3rd industry in agricultural sector. Second, the main agent of the 6th industrialization needs to be the ministry of agriculture, food and rural affairs. Third, the policy resource for the 6th industrialization should be focused on the prominent farmers or enterprises. Forth, the policy programs for the 6th industrialization need to be grouped.

Drop Policy Considering Performance of TCP in Optical Burst Switching Networks (Optical Burst Switching Network에서 TCP 성능을 고려한 Drop Policy)

  • 송주석;김래영;김현숙;김효진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.203-209
    • /
    • 2004
  • In OBS networks, the burst dropping due to contention significantly affects the performance of TCP, but existing drop policies have not considered this problem and researches related to TCP have been mainly studied on burst assembling. We propose the drop policy considering retransmission of TCP to improve the performance of TCP in OBS networks. The proposed drop policy is the Retransmission Count-based DP that regards retransmission count of bursts as priority when it selects dropping burst. This paper evaluates the performance of RC-based DP model and general DP model using ns-2. The metrics of performance evaluation are TCP throughput, maximum sequence number of received TCP packets and drop rate of packet as simulation time increases.

A Study on the School Safety Accident Prevention Policy through Accident Case Analysis (사고사례 분석을 통한 학교안전사고 예방정책에 관한 연구)

  • Park, Sang-Keun;Yoon, Yong Gi
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.22 no.5
    • /
    • pp.11-22
    • /
    • 2015
  • The purpose of this study is to suggest prevention policy by analyzing accident cases related with school facilities. The results of study are as follows: First, policy enforcement that follows disaster management process such as prevention, preparation, response and recovery is required for school safety policy. Second, in order to proceed with the effective safety policy through collection, analysis, interpretation of data and result monitoring against accident case, the systematic safety infrastructure such as injury surveillance system and the composition of policy consultative group among safety organizations should be established. Third, the school facilities should be installed and managed according to the safety design. Fourth, the systematic education is needed to done for the managers who are concerned with safety regarding the establishment of safety management plan for each school. Fifth, the evaluation and feedback system is required for the results of proceeding with safety policy.

Satisfaction Gaps among Physicians, Nurses, and Patient Family in the Emergency Department (응급실 서비스 만족도에 대한 환자 가족의 평가와 의료진의 인식 차이)

  • Kang, Kyunghee
    • Health Policy and Management
    • /
    • v.23 no.2
    • /
    • pp.145-151
    • /
    • 2013
  • Background: The objective of this study was to explore patient family's evaluation of emergency department (ED) service satisfaction and to compare these with ED staff perception of patient family's evaluation. Methods: Based on two surveys of the National Emergency Medical Center: the 2008 National Survey for Recognition and Satisfaction towards Emergency Medical Services and the 2008 Opinion Survey of Emergency Medical Service Providers, satisfaction gaps among physicians, nurses, and patient family were evaluated by Kruskal-Wallis tests and Wilcoxon-Mann-Whitney tests. Furthermore, the factors associated with satisfaction of emergency medical service were identified by ordinal logistic regression models. Results: There were statistically significant gaps among physicians, nurses, and patient family in overall satisfaction with ED visit, length of stay in ED, enough explanation, physicians/nurses kindness, and ED facilities. Age and income in the patient family model, the number of beds in hospital, job satisfaction and year of service in the physicians model, and the number of beds in hospital, job satisfaction and the number of patients per duty hour in the nurses model were statistically significant factors associated with evaluation/ perception of ED service satisfaction. Conclusion: Patient satisfaction is an important indicator of the quality of care and service delivery in the ED. To improve and understand satisfaction in ED service, a dyadic view of the evaluation of service quality and satisfaction-that is, from the perspectives of both the patient and the emergency medical service providers-should be concerned.

A Study for Improvement of The Qualification System through The Value Evaluation Methods (가치평가 방법에 따른 자격제도 개선방안에 관한 연구)

  • Jung, Byung-Han;Park, Jae-Hyun;Yang, Kwang-Mo;Kang, Sung-Woo;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.193-201
    • /
    • 2015
  • The history of Korea Qualification system began after the Korea War. The Qualification was recognized to it's value with economic growth until the 2000. But the value of qualifications has to be re-evaluated under the current global environments. Almost Previous research has not to work for the value of qualifications all of Korea. So, This study presents a evaluation structure frame to work and some evaluation factors for the qualification value. In addition, the methodology proposed to obtain results using the AHP weights based on the evaluation methodology and questionnaire. The analysis results are used as a basis for selecting the future policy direction of the national qualification.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

Emergy evaluation of the optimum number of stories of new apartment buildings (아파트의 적정 건설층수 결정을 위한 에머지(emergy)평가)

  • Im Jung-Hyuk;Kang Dae-Seok;Lee Suk-Mo
    • Journal of Environmental Science International
    • /
    • v.14 no.5
    • /
    • pp.473-480
    • /
    • 2005
  • The cost of the construction and management of new apartment buildings was evaluated using a monetary analysis and an emergy concept to provide a new perspective regarding the housing policy of Korea. The systems of analyses were typical apartment buildings with an area of $76.03m^2$ per household in Korea built on the same size of land area. Three apartment buildings with different stories were evaluated and compared; 5-story, 15-story, and 20-story apartment buildings. The durable years of those apartments were assumed to be 40 years. The total cost of the construction and management of an apartment building was divided into three categories of construction, land purchase, and management. A 20-story apartment showed the highest cost and a 15-story apartment the lowest in the monetary cost analysis. In contrast, the emergy evaluation revealed a different pattern in the cost of construction and management, the cost increasing from a 5-story apartment to a 20-story one. This means that the higher the apartment constructed, the greater the cost in terms of real wealth. This result suggests that new evaluation methodologies like the emergy analysis should be used together with the monetary analysis to provide better insights on the national housing policy.

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.