• Title/Summary/Keyword: Private institute

Search Result 2,801, Processing Time 0.036 seconds

AN INTEGRATED REAL OPTION-RISK MANAGEMENT FRAMEWORK FOR PPP/PFI PROJECTS

  • Jicai Liu;Charles Y.J. Cheah
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.729-738
    • /
    • 2007
  • The Public Private Partnership/Private Finance Initiative (PPP/PFI) schemes have made the private sector become a major participant involved in the development of infrastructure systems along with the government. Due to more integrated efforts among project participants and longer concession period, PPP/PFI projects are inherently more complex and risky. It is therefore very important to proactively manage the risks involved throughout the project life cycle. Conventional risk management strategies sometimes ignore managerial flexibility in the planning and execution process. This paper starts with a revised risk management framework which incorporates the real option concept. Following the presentation of the framework, a new risk classification is proposed which leads to different ways of structuring options in a project according to the stage of the project life cycle. Finally, the paper closes by discussing other issues concerning option modeling and negotiation.

  • PDF

A Study on Corporate Social Responsibility of the private sector for disaster management (재난안전분야에 대한 민간기업의 사회공헌 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.171-179
    • /
    • 2016
  • The purpose of this study is to research the importance of public-private partnerships in disaster management. This study was evaluated by experts specializing in the improvement of public-private partnerships for disaster management. The following items are needed to encourage corporate social contribution activities in the disaster security industry. The researchers first propose a solution by means of ensuring cooperation between government and business networks. Second, we propose for those entities to discover new means to support private companies' participation in social contribution activities. The researchers' third solution is to be utilized to secure funding for induction and to support public-private partnerships to participate in the social contribution activities of private companies. Our fourth solution is promoting a sustainable plan for raising public awareness of corporate social contribution. Finally, the social contribution of the participating companies enhance brand recognition and as well as incentives. This study may contribute to the current operating system to support relevant policies and measures to encourage the participation of enterprises in the field of disaster security. Future research will be to study (such as through questionnaires) ways to participate in disaster management companies in accordance with environmental changes.

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.

A Study on the Self-destructing Data for Information Privacy (개인정보 보호를 위한 데이터의 자가 초기화에 대한 고찰)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.629-638
    • /
    • 2013
  • Recently the interest in the information privacy has been growing. Digital data can be easily transferred via Internet. Service providers ask users for private data to give customized services. Users believe that their shared data are protected as they deliver their private data securely. However, their private data may be leaked if service providers do not delete or initialize them when they expire. The possibility of information leak may lower if the service providers deal with users' private data properly. In this paper, we study the self-destruction of private data for information privacy and propose the glass-box model.

An Economic Evaluation of the Home Nursing Care Services: Public Health Center Versus Private Hospital (일개 보건소의 가정간호사업 위탁운영에 관한 경제성 평가)

  • Kim, Jin-Hyun;Lee, In-Sook;Joo, Mee-Kyoung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.16 no.4
    • /
    • pp.409-418
    • /
    • 2010
  • Purpose: The purpose of this study was to compare the costs and benefits of home nursing care services between public health centers (PHC) and private hospitals. Method: Participants were 105 patients who had received home nursing care services from a private hospital or public health center. From a societal perspective, the researcher identified the costs and benefits of the services using performance data and calculated the net benefit and benefit/cost ratio. Result: The net benefit of the home nursing care service based in the PHC was 165.9 million won and benefit/cost ratio was 2.0, while the net benefit of the home nursing care services by the private hospital was 141.1 million won and benefit/cost ratio was 1.7. Both types of programs were economically validated. Conclusion: Home nursing care services were basically efficient as the results showed a positive net benefit. A cost-benefit analysis indicated that the PHC-based home nursing care services were more efficient than that of the private hospital. With limited human resources and management standards in public health centers, results suggest the need for a more systematic management of the home nursing care service to improve the health of this vulnerable community population.

Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information (비특정 개인정보 수집 및 활용에 관한 정책적·기술적 개선방안 연구)

  • Jeon, Hoimi;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1583-1592
    • /
    • 2016
  • This report explains unspecified private information that have the company of resource value is provided the public with out protection. Let's have a good look at the protection of unspecified private information problems through personal information of law and policy mobile messenger company's TOS(Terms of service) We urgently need for an competition framework to prevent the leaking of Non-specified private informations and need for technical development that is information combined management system. We try verify systems as mentioned above with variety scenarios and suggest improvement plan that is leaking Non-specified private information.

A Diachronic Analysis on the Shapes of Pond at the Private Residence in the Choson Dynasty (조선시대 민간정원 지당형태의 통시적 분석)

  • 권차경;강영조
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.61-71
    • /
    • 2000
  • The purpose of this article is to investigate the forms and styles of pond at private housing in terms of diachronically influencing characteristics in the Choson Dynasty. From various literatures and records, we have selected 73 cases of pond. We have analyzed the types of pond based on square type, squared type with islets, and modified types and found the following results: 1) Chronically, shapes of pond had been chanced from the three prototypes into their features of deducting side or edge, adding a triangular or trapezoid shape, and installing more islets, and replaced their figures with gradually progressive from side having a straight lined shape to a curved one. 2) As for characteristics of arranging ponds, we found three patterns of arrangement - the juxtaposition with a similar shape of pond, juxtaposition with a different shape of pond, and the juxtaposition with a pond having different topological level in the light of the relation with a stream and a pond. We can conclude the two changed patterns of ponds at private residence in Choson Dynasty that the one had been transformed shapes of pond with sides of pond, and the others had been transformed juxtaposition with either a stream or a natural stream. From this research we can find an important implications in understanding patterns and types of garden in the Choson Dynasty from exploratory approach and in the future the relationship between topographical characteristics of private residence and Confucian ideas, and shapes of pond is needed to be examined in explanatory manner.

  • PDF

A Study on the Resident Recognition of Common Space in Apartment (공동주택 거주자의 공유공간 인식에 대한 조사 연구)

  • Han, Min-Seung;Whang, Hee-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

A Private Key Management Guideline For Secure Blockchain-Based Services (안전한 블록체인 기반 서비스를 위한 개인키 관리 가이드라인)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.899-914
    • /
    • 2022
  • A blockchain-based decentralized service can offer reliable services without the centralized server by operating the system based on the consensus among byzantine participants. Participants can interact with the blockchain network through a digital signature mechanism but the private key management issue remains unresolved. NIST SP800-57 provides a key-management guidance but this guidance is not appropriate for blockchain-based services because it does not consider a decentralized environment. In this paper, we define the core functions of the blockchain wallet application for private key management and present security protections according to NIST SP800-57, as well as related techniques to satisfy them. Finally, we propose the private key management guideline for secure blockchain-based decentralized services.

Fair Private Matching with Semi-Trusted Third Party (STTP를 활용한 공평한 비밀 매칭)

  • Kim, E-Yong;Hong, Jeong-Dae;Cheon, Jung-Hee;Park, Kun-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.446-450
    • /
    • 2008
  • Private Matching is the problem of computing the intersection of private datasets of two parties without revealing their own datasets. Freedman et al.[1] introduced a solution for the problem, where only one party gets private matching. When both parties want to get private matching simultaneously, we can consider the use of Kissner and Song[2]'s method which is a privacy-preserving set intersection with group decryption in multi-party case. In this paper we propose new protocols for fair private matching. Instead of group decryption we introduce a Semi-Trusted Third Party for fairness. We also propose an update procedure without restarting the PM protocol.