• Title/Summary/Keyword: Private Uses

Search Result 243, Processing Time 0.02 seconds

A Study on the Improvement Plans of Private Sector Investment for the Mixed-Use of School Facilities (학교시설 복합화를 위한 민자사업 방식 개선 방안에 관한 연구)

  • Lee, Jae-Kook;Oh, Byeong-Uk
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.10 no.1
    • /
    • pp.31-38
    • /
    • 2010
  • The use of school should not be limited to student education any longer but be extended for attaining social benefits. For this reason, school should play central roles not only in education but also in childcare, welfare, culture, physical education, etc. In order for school to accommodate various new functions, it is essential to promote the mixed-uses of school facilities, and this process requires the involvement of private capitals for early achievement of social benefits from school facilities. Thus, this study purposed to examine the necessity of the multiple uses of school facilities through the investment of private capitals, to diagnose the adequacy of build-transfer-lease (BTL) applied currently to the multiple uses of school facilities, and to find obstacles to the activation of private sector investment and suggest solutions for the obstacles. In particular, this study aimed at proposing plans to enhance the efficiency of private sector investment and activate private sector investment projects by suggesting how to promote the multiple uses of school facilities in consideration of profitability for private investors.

The First Curriculum of Mathematics in Korea for the New Millennium

  • Choe, Young-Han
    • Research in Mathematical Education
    • /
    • v.7 no.2
    • /
    • pp.73-90
    • /
    • 2003
  • In the Republic of Korea, mathematics has always been a major blame for huge private expenditures on so-called "private education," which consists of private tutoring and lessons at "private academies of extra curricula." The private spending on out-of-school education often exceeded public expenditures on schools. In 1997, South Korean Ministry of Education reformed curriculum of mathematics along with other subjects to ease the burden of private education. The aim of this curriculum change was to put a boost on individual students' interests, affections and other attributes toward school mathematics. The essential distinctiveness of the new curriculum of mathematics compared with the previous one is as follows: 1. The implementation of so-called "differentiated curriculum" for grades 1-10. 2. 30% reduction of contents in mathematics and the reconciliation of contents. 3. Elective subjects for mathematics for grades 11 and 12. 4. More uses of technology in mathematics teaching. Firstly, we examine the background of the curriculum reform and analyze the new curriculum according to awareness of educational administrators, teaching environments of schools and readiness of mathematics teachers. Then we find out what kinds of problems it has and look for some suggestions for remedies.

  • PDF

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

A Study on IP Virtual Private Network Architecture

  • Robles, Rosslin John;Kim, Na-Youn;Sattarova, Feruza;Kim, Seok-Soo;Kim, Tai-Hoon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.696-699
    • /
    • 2009
  • A VPN is a private network that uses a public network to connect remote sites or users together. As its popularity grows, companies, organization and even the government turned to it as a means of extending their own networks. To setup a Virtual Private a proper IP VPN Architecture must first be selected. In this paper, the types of IP Virtual Private Network Architecture like the MPLS-Based, IPSec-Based and the SSL/TLS-Based are discussed and compared. The comparison may serve as a guide for selecting the proper IP Virtual Private Network Architecture that is suitable for the company's needs.

  • PDF

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.

The Research of Difference between Public and Private Section : Sort by Region in China (공공기관과 민간기업의 소득격차에 관한 연구 : 중국 지역별 격차를 중심으로)

  • Kim, Yeonggil;An, Qinrui;Kim, Soowook
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.1
    • /
    • pp.139-154
    • /
    • 2015
  • This paper uses the Heckman model to evaluate the income difference between the public sector and the private sector based on the CHNS data. The research finds that the difference of the public sector versus the private sector between the west area and the east area is about 10% from 1989 to 2000, the transition of the income difference is smooth, that data has made sharp increase to 32% from 2000 to 2011. Considering the income difference between the west area and the central area, the central area and the east area from 1989 to 1997, the data is about 10~15%, from 2000 to 2011 is rocketing time, the data reaches 20%. This paper is very revealing about the income difference ofthe public sector versus the private sector is increasing year after year, and the economy is developing rapidly but with imbalance among different areas in China. It would provides the reference for adjust the income distribution system in future.

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • Journal of Distribution Science
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF

A Study on the Decision-Making of Private Banker's in Recommending Hedge Fund among Financial Goods (은행 금융상품에서 프라이빗 뱅커의 전문투자형 사모펀드 추천 의사결정)

  • Yu, Hwan;Lee, Young-Jai
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.333-358
    • /
    • 2019
  • Purpose The study aims to develop a data-based decision model for private bankers when recommending hedge funds to their customers in financial institutions. Design/methodology/approach The independent variables are set in two groups. The independent variables of the first group are aggressive investors, active investors, and risk-neutral type investors. In the second group, variables considered by private bankers include customer propensity to invest, reliability, product subscription experience, professionalism, intimacy, and product understanding. A decision-making variable for a private banker is in recommending a first-rate general private fund composed of foreign and domestic FinTech products. These contain dependent variables that include target return rate(%), fund period (months), safeguard existence, underlying asset, and hedge fund name. Findings Based on the research results, there is a 94.4% accuracy in decision-making when the independent variables (customer rating, reliability, intimacy, product subscription experience, professionalism and product understanding) are used according to the following order of relevant dependent variables: step 1 on safeguard existence, step 2 on target return rate, step 3 on fund period, and step 4 on hedge fund name. Next, a 93.7% accuracy is expected when decision-making uses the following order of dependent variables: step 1 on safeguard existence, step 2 on target return rate, step 3 on underlying asset, and step 4 on fund period. In conclusion, a private banker conducts a decision making stage when recommending hedge funds to their customers. When examining a private banker's recommendations of hedge funds to a customer, independent variables influencing dependent variables are intimacy, product comprehension, and product subscription experience according to a categorical regression model and artificial neural network analysis model.

A Probe Detection based on Private Cloud using BlockChain (블록체인을 적용한 사설 클라우드 기반 침입시도탐지)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF