• Title/Summary/Keyword: Protection and security

Search Result 1,982, Processing Time 0.027 seconds

Korean 'Social Welfare' Delivery System and Its Discourse Relation - Historical Formation, Pathway, and Present Issues - (우리나라 '사회복지' 전달체계와 담론적 작용 - 역사적 형성과 경로, 쟁점 -)

  • Kim, Young Jong
    • Korean Journal of Social Welfare
    • /
    • v.69 no.1
    • /
    • pp.175-197
    • /
    • 2017
  • This study aims to analyze the formation of Korean social welfare delivery system and its pathway, from which the pending issues are to be discussed on the organizations and personnel of the delivery system using the word 'social welfare' with its related discourse. Historical institutionalism is chosen as the perspective to explain path-dependent change and critical juncture, and various legislative data are used as the indicative signals for the discourse of 'social welfare'. The results of the study are as follows. First, the term 'social welfare' began to be institutionalized in Korea by the enactment of Livehood Protection Law(1961). Second, the policies by the year 1987 of expanding social welfare center and introducing social welfare professionals as civil servants form a critical juncture which makes the social welfare discourse realized as the institutional realities. Third, until the year around 2014, the system has not changed in the perspective of macro framework. Fourth, currently the system shows several signs of severe turmoil, which might lead to dismantle the system of 'social welfare' discourse. To conclude, this study shows the possibility of explaining organizations and personnel composing the social welfare delivery system by the usage of discourse analysis, treating it as an analytical entity.

  • PDF

A Study on the Privacy Awareness through Bigdata Analysis (빅데이터 분석을 통한 프라이버시 인식에 관한 연구)

  • Lee, Song-Yi;Kim, Sung-Won;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

An Analysis of the Characteristics of China's Naval Strategy to Become a Maritime Power: Focusing on analyzing the "goals, methods, and means" of strategy (해양강국 달성을 위한 중국 해군전략의 성격 분석: 전략의 "목표·방법·수단"을 이용한 분석을 중심으로)

  • Kim, nam-su
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.1-42
    • /
    • 2021
  • Controversy continues over the offensive nature of China's naval strategy to become a maritime power. Therefore, the purpose of this study is to identify the characteristics of China's naval strategy to become a maritime power by using the three elements of strategy and predict China's military actions in the future. For this purpose, research was conducted by considering the three elements of strategy and the distinct characteristics of naval strategy, and it was found that China's naval strategy was overall aggressive, but there was an imbalance in the pursuit of aggression between each strategic element. Offensive nature was prominent in terms of the methods, but there were limitations in the goals and means, such as the need to cooperate with neighboring countries to become a maritime power and the lack of military technology and operational continuity. The prospects for China's future military actions derived from the imbalance between these strategic elements are as follows. ① The risk of all-out military conflict with the US is low for now. ② China may use its naval power to force or cause limited military clashes against neighboring countries within the first island chain. ③ Accidental military conflicts with the US and neighboring countries may occur over naval confrontation over territorial disputes.

  • PDF

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

On the New Prospect of Gangwon Border Area as a Peace Zone and its Sustainable Development (강원도 접경지역이 평화지역으로 가기위한 새로운 지평과 지속가능발전)

  • Kim, Jong-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.638-651
    • /
    • 2022
  • Last year, a new perception of the right to peace on the Korean Peninsula was adopted: DMZ Yanggu Peace Declaration 2021. The Declaration reflects that there is a raising of necessity for a new perception and approach from the perspective of DMZ-related laws, sustainable ecological environment and security. Gangwon is making considerable efforts to make the border area in DMZ as an area of peace by continuously enhancing publicity on the establishment of the 'Peace Special Self-Governing Province'. This study suggests the necessity of a paradigm shift towards the significance of the interkorean border region that it should function as a passage between the South and the North rather than a dam. For, to be renewed as a sustainably developing region through newly constructed flow of communication, the wall of hostility must preliminarily fall dawn. Then a question arises about how Gangwon is, out of other border region, most eligible for the reconsideration of its significance as a border area. The answer relies on the newly established agenda and understandings towards the right to peace in the perspective of founding the policy for the Unification of the Korean Peninsula. Furthermore, the conservation of DMZ ecological environment through enlistment of UNESCO Biosphere Reserve should go hand in hand with the ultimate value of global agenda of the conservation and protection of the environment. The study insists that the peace zone is a prerequisite for the adaption of the era of future-oriented glocalization featured by the Fourth Industrial Revolution. Up to this date, the border area was an area of pain and agony. It is time for Gangwon to be reborn as an area of peace and coexistence. The aim of this study is to point a direction for Gangwon to become a sustainably developing region by illuminating the value of the Gangwon border area as a new area of peace.

A Legal Review on Abuse Cases of Virtual Currency and Legal Responses (가상화폐의 악용사례와 법적 대응방안에 관한 고찰)

  • Hwang, Suk-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.585-594
    • /
    • 2018
  • Virtual currencies have emerged along with new technologies such as block chain, artificial intelligence (AI), and big data. This study examines the benefits of a security-enhanced block chain resulting from individual trading, decentralized from governments, as well as the problems associated with misuse of virtual currencies. Virtual currencies, due to its anonymity, is vulnerable to financial crimes, such as ransom-ware, fraud, drug trafficking, tax evasion and money laundering. Use of virtual currencies can facilitate criminals avoid detection from investigative agencies. Government regulatory policy continues to address these concerns, and the virtual currency exchange has also announced a self-regulation proposal. However, a fundamental solution remains necessary. The purpose of this paper is to investigate the problems regarding abuse of virtual currency and to identify a practical system for transactions involving virtual currencies. However, in order to promote transactions involving virtual currencies and to institutionalize a governance system, multilateral cooperation is required. Although the restricting the use of virtual currencies regarding minors and foreign trade, as well as the introduction of a real-name system are considered promising prospects, many problems remain. Virtual currency is not a simple digital item but a method of redesigning the function of money. Coordinated efforts are needed globally to be able to further activate the positive aspects concerning the use of virtual currencies.

The Design and Protective Capacity Assessment of the Prefabricated PC Arch Ammo Magazines (아치형 조립식 PC 탄약고 설계 및 방호성능 평가)

  • Park, Jang-Kweon;Lim, Chul-Won;Ryu, Dong-Woo;Son, Ki-Young;Baek, Jong-Hyuk;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.6
    • /
    • pp.615-621
    • /
    • 2014
  • This study suggests the design and assembly drawing of the prefabricated precast concrete arch ammo magazines using the numerical analysis as well as the explosion verification test. The protective capacity of the proposed magazines is identified with the maximum support rotation angles measured by explosion verification tests according to the U.S. Unified Facility Criteria 3-340-02. Using numerical analysis, it is examined that oval-type members are better than the semi-circle ones in terms of protective capacity. Based on this numerical results, the design and assemble drawing for the prefabricated precast concrete arch ammo magazine are developed. It is identified that the structure constructed by invented design and assembly drawing has enough protective capacity against blast pressure caused by 133.75kg TNT explosion. The detonation point cannot be open due to the military security. In sum, it could be concluded that the ammo magazine proposed in this study has reliable protective capacity with enough redundancy. The redundancy means that there are more economic design approach with reducing the curved wall thickness.

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.