• Title/Summary/Keyword: Protect

Search Result 7,536, Processing Time 0.039 seconds

Government Support and Risk Management to Kaesong Industrial Business (개성공단 진출 기업에 대한 정부지원과 리스크 관리)

  • Kim, Jae Seong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.63
    • /
    • pp.245-260
    • /
    • 2014
  • This study is aimed to summarize a tense situation of Risk management for Kaesong Industrial Business Enterprise in 2013 and to investigate trade insurance of K-sure. Now we have to find a new way to protect Kaesong Industrial Business Enterprises from uncertain environment and also need to prevent a recurrence of parallel cases in the domain of South-North economic cooperation in Korean peninsula. There are two method to protect Kaesong Industrial Business Enterprises. First they rely on the Korea government for protection. Second they need to effect trade insurance of K-sure. such as Export Credit Guaranty or Short-term Export Insurance. They shall create a wise predictable environment to protect Kaesong Industrial Business Enterprises themselves without resort to Korea government. Of course there are many things left behind to consider I hope it will be helpful to those who prepare South-North economic cooperation especially in Kaesong Industrial Complex.

  • PDF

Application and Development of Protect Technique for waterproofing Reinforced Concrete Bridge Decks by Latex-Modified Mortar (라텍스 모르타르를 이용한 콘크리트 교면 방수층 보호 공법 개발 및 적용에 관한 연구)

  • Han, Sang-Il;Lee, Won-Young;Kim, Jae-won;Kang, Seung-Hee;Cha, Dong-Hwa;Kim, Jin-Man
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.175-178
    • /
    • 2009
  • This study is thing for construction properties that protect about damage of waterproofing course that is problem in asphalt pavement and latex modification concrete pavement. It is thing about new method of construction and develop protecting material of waterproofing. Did performance test item first at, as a result, drew by suitable thing in all KS items, This is considered to have more effective spot construction work because if means that have stability by material as well as method construction.

  • PDF

Determinants of the Intention to Protect Personal Information among Facebook Users

  • Chon, Bum Soo;Lee, Jeong-Ki;Jeong, HyeonJu;Park, Jowon;Park, Jonghwa
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.146-155
    • /
    • 2018
  • This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

A Study On Enterprise Password Management Recommendations (대규모 조직에서의 패스워드 관리에 관한 권고 고찰)

  • Park, Jin-Sub
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF

Influences of Coatings and Solution Corrosivity on Cathodic Protection of Metallic Materials

  • Yoo, Y.R.;Chang, H.Y.;Jin, T.E.;Kim, Y.S.
    • Corrosion Science and Technology
    • /
    • v.5 no.3
    • /
    • pp.106-111
    • /
    • 2006
  • Painting has protected metallic stack but the paint films may be degraded and corrosion problem can be arisen. To protect the painted metal stack, cathodic protection can be applied. If cathodic protection is applied to bare metal, only small area may be protected. However, if cathodic protection is applied to painted metal surface, large area can be protected and the lifetime of paint films can be extended. High corrosion resistant alloys were corroded at a Flue Gas Desulfurization (FGD) facility of power plant within a short period and thus cathodic protection can be used to protect these metals. On the base of computer simulation, if cathodic protection is applied to bare metal in a FGD environment, it was estimated that applied current could almost be spent to protect area near the anode. However, if cathodic protection is applied to high resistant-coated metal, the much larger area from the anode could be effectively protected.

Using SQLMAP to Detect SQLI Vulnerabilities

  • Almadhy, Waad;Alruwaili, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.234-240
    • /
    • 2022
  • One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.

Psychotherapist's Liability for Failure to Protect Third Person (정신질환자의 타해(他害)사고와 의료과오책임)

  • Son, Heung-Soo
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.331-393
    • /
    • 2010
  • Psychiatrists who treat violent or potentially violent patients may be sue for failure to control aggressive outpatients and for the discharge of violent inpatients. Psychiatrists may be sued for failing to protect society from the violent acts of their patients if it was reasonable for the psychiatrists to have known or should have known about the patient's violent tendencies and if the psychiatrists could have done something that could have safeguarded in public. The courts of a number of jurisdictions have imposed a duty to protect the potential victims of a third party on persons or institutions with a special relationship to that party. In the landmark case of Tarasoff v Regents of University of California, the California Supreme Court held that the special relationship between a psychotherapist and a patient imposes on the therapist a duty to act reasonably to protect the foreseeable victims of the patient. Under Tarasoff, when a therapist has determined, or under applicable professional standards should determine, that a patient poses a serious threat of violence to another, he incurs an obligation to use reasonable care to protect the intended victim against such danger. In addition to a Tarasoff type of action based on a duty to warn or protect foreseeable victims of psychiatric outpatients, courts have also imposed liability on mental health care providers based on their custody of patients known to have violent propensities. The legal duty in such a case has been stated to be that where the course of treatment of a mental patient involves an exercise of "control" over him by a physician who knows or should know that the patient is likely to cause bodily harm to others, an independent duty arises from that relationship and falls on the physician to exercise that control with such reasonable care as to prevent harm to others at the hands of the patient. After going through a period of transition, from McIntosh, Thompson and Brady case, finally, the narrow rule of requiring a specific or foreseeable threat of violence against a specific or identifiable victim is the standard threshold or trigger element in the majority of states. Judgements on these kinds of cases are not enough yet in Korea, so that it may be too early to try find principles in these cases, however it is hardly wrong to read the same reasons of Tarasoff in the judgements of Korea district courts. To specific, whether a psychiatric institute was liable for violent behavior toward others depends upon the patients conditions, circumstances and the extent of the danger the patients poses to others; in short, the foreseeability of a specific or identifiable victim. In this context if a patient exhibit strong violent behavior toward others, constant observation should be required. Negligence has been found not exist, however, when a patient abruptly and unexpectedly attack others or unidentifiable victim. And the standard of conduct that is required to meet the obligation of "due care" is based on what the "reasonable practitioner" would do in like circumstances. The standard is not one of excellence or superior practice; it only requires that the physician exercise that degree of skill and care that would be expected of the average qualified practitioner practicing under like circumstances. All these principles have been established in cases of the U.S.A and Japan. In this article you can find the reasons which you can use for psychotherapist's liability for failure to protect third person in Korea as practitioner.

  • PDF

Application of Corrosion Inhibitors to Protect the Corrosion of Reinforcement in Concrete (콘크리트 중의 철근방식을 위한 방청제의 적용)

  • 문한영;김성수;김홍삼;안기용
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1999.10a
    • /
    • pp.751-754
    • /
    • 1999
  • Corrosion inhibitors are widely used to protect chloride-induced corrosion of reinforcement in concrete. However, the number of researches on the corrosion of reinforcement, when corrosion inhibitor is used, is not enough for actual application in the field. In addition, on corrosion of reinforcement a quantitative standard about corrosion inhibitor does not exist and the data about its influencing concrete are relatively rare. In this study, the effectiveness of rebar corrosion protection, setting time, compressive strength, chloride ion's penetration, and diffusion test were performed using with three different kinds of corrosion inhibitors.

  • PDF

A Study on the Overcurrent Relay Coordination in Power Systems (전력계통에서의 과전류계전기 보호협조에 관한 연구)

  • Choi, Hong-Kyoo;Kim, Kyung-Chul;Oh, Jung-Suk;Kim, Byung-Chul
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.351-358
    • /
    • 2004
  • When fault occur in power systems, the protective relay plays a roles of protecting power system according to its setting values. There, it is very important that the protective relay have high selectivity performance in power system by correct setting the relays. This paper analyzed protect device protect cooperation or Transient stability and apply to Overcurrent relay in the real power system operation environment by using EDSA Program.

  • PDF

Design of Digital fulltext Protection System using Digital Fingerprinting (핑거프린팅을 이용한 디지털 원문 보호시스템 설계)

  • Kim, Sang-Kuk;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.5
    • /
    • pp.699-710
    • /
    • 2004
  • It is one of important techniques to protect illegal uses and forgeries for text databases when the internet has become widsepread. Lots of studies and system developments has been progressed in order to protect text databases, important documents of the companies, and blueprints of the research institutes. Given this project securing the KISTI (Korea Institute of Science and Teschnology Information) digital contents, we are to design a watermaking and fingerprinting system protecting document images, and a agent notifying the traitors' location.

  • PDF