• Title/Summary/Keyword: Public Property

Search Result 537, Processing Time 0.027 seconds

An Analysis on the Unified Policy of the Administrative System for the Public Library: Focusing on the First and the Second Comprehensive Library Advancement Plan (도서관 행정체계 일원화 정책 분석 연구 - 제1, 2차 도서관발전종합계획을 중심으로 -)

  • Cha, Sung-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.241-266
    • /
    • 2014
  • The purpose of this study is to investigate the importance and validity of the unified policy of the administrative system for the public library through the analysis and evaluation of the outcomes and plans about the policy on the first and second Comprehensive Library Advancement Plan. In addition, this study seeks to the strategies for the public library administrative system unification by reviewing the issue details of the unification strategies. The first Comprehensive Library Advancement Plan was found to be just proclamatory without concrete and practical results through its performance analysis. The policy tasks were evaluated to lack in feasibility and specificity in the second Comprehensive Library Advancement Plan which was performed on a group of library professionals. Policy decision to determine who would be responsible for the unification into the local government was found to be valid by the results of previous research findings, policy evaluation by experts and in-depth interview survey for field practitioners. Substantial and detailed action-oriented strategy rather than bluffing and macro policy is necessary for the unification of the library administrative system. It is because we have found there exist significant issues in terms of unified approach, structure of the organization, personnel transfer and grade adjustment, property transfer, etc. through the analysis.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

A Study on the Structural and Other Influential Characteristics of Western Timber Roof Truss in Modern Buildings - Focusing the Record of Modern Buildings among the Cultural Assets maintained by Public Institution - (근대 건축물에 사용된 서양식 목조 지붕 트러스의 구조요인 및 기타 영향요인에 관한 연구 - 공공기관이 관리하는 문화재 중 근대건축물 기록을 중심으로 -)

  • Lee, Yoon-Hee;Yu, Hye-Ran;Kwon, Ki-Hyuk
    • Journal of architectural history
    • /
    • v.20 no.4
    • /
    • pp.95-114
    • /
    • 2011
  • Western style timber roof trusses used as typical roof structures of buildings during a modern period have been developed with the interactions with their facade and functionality. The shapes of trusses and member sizes have been diversely changed by the purposes of architects, historical circumstances, and structural characteristics. For this reason, the change in the shapes of western style timber trusses along the times is one of important technology assets demonstrating the development of their structures during the modern period. Therefore, the purpose of this paper is to find out their structural characteristics throughout parametric analysis of which parameters were determined from the collected and classified documents on western style timber roof structure built in the modern period carefully obtained from public institutions. Results of the parametric analysis are as follows. The number of king-post trusses and modified king-post trusses built between 1920 and 1937 reaches almost half of the total number of truss types investigated. The mean values of their spans, distances, tributary areas, and height are respectively, 10.5m, 2.4m, $24.37m^2$and 3.24m. The cross-section areas of trusses tend to reduce since the city construction law was enacted in 1920. Also, this study found that western architects usually used larger structural members than eastern architects and usages and finishing materials of roof trusses are not always considered as one of the important design parameters.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Review of Respiratory Disease and Hazardous Agents Caused by the Use of Biocide in Metalworking Operations (수용성 금속가공유에서 살균제 사용으로 발생된 유해인자 및 호흡기 질환 위험 고찰)

  • Park, Donguk;Ko, Yeji;Yoon, Chungsik
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2013
  • Objectives: The aim of this study is to critically review the health effects of not only direct exposure to biocide, but also indirect exposure to by-product hazardous agents generated through the use of biocide in metalworking operations. Methods: An extensive literature review was conducted of studies reporting on respiratory disease cases, particularly hypersensitivity pneumonitis (HP), in environments using water-soluble metalworking fluids (MWFs). Keyword search terms included 'metalworking fluids', 'machining fluids', 'metalworking operation' 'machining operation' and 'biocide', which were also used in combination. Additional articles were identified in references cited in the articles reviewed. Results: Several of the field, epidemiological and experimental studies reviewed assumed that the symptoms and signs typical of HP developed in machinists who handled water-soluble MWF could be caused by inhalation exposure to nontuberculous mycobacteria (NTM). Most NTM are known to be not only resistant to both biocide and disinfectant, but also to have acid-fast cell walls that are highly antigenic. The presence or persistence of the Mycobacterium species, referred to as NTM, in metalworking fluid-using operations may be caused by NTM contamination in either the natural water or tap water that is used to dilute the base oil and additives for water-soluble MWFs. This hypothesis that NTM contamination in water-soluble MWFs is a causative agent of HP has high biologic plausibility, such as antigenic property, hydrophobicity and small diameter (< 5 um). Conclusions: Aerosolized mycobacteria colonized from MWF are likely to be causing the HP. Inhalation exposure to mycobacteria should be considered as a possible cause for the development of HP.

The Actual Condition of the Arson and Countermeasure (방화범죄의 실태와 대책방안)

  • Jung Gi-Sung
    • Fire Science and Engineering
    • /
    • v.19 no.2 s.58
    • /
    • pp.93-104
    • /
    • 2005
  • Nowadays, the arson is not common interest happening. the arson has been handled with a crime of violence along with murder, robbery and rape. because of being detrimental to the public clam. but the arson a has not been made award of a serious social problem. There is a rise in the control possibility according to a level of national concern. we have known that the last fire accident of the Deagu underground It took a heavy toll of lives and the property due to our no interest in arson. The government and regional self governing community have fully aware of the serious of the arson so that we can make arrangement for overall measures. The government should not only make up for legislation and systematize to correct a defect but also there is uniting the countermeasure system of the organs. The government establish particular research institution of the arson to consider a useful countermeasure. The investigation authorities should develop the investigation technique to arrest an arsonist. The relevant post strengthen the public relation to bring up a private organization of fire prevention in order to prevent the arson to try the government best.

Court's Criteria for Judging Research Misconduct and JRPE Goals

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.1
    • /
    • pp.23-28
    • /
    • 2020
  • Purpose: Focusing on Supreme Court precedents, we intend to establish criteria for judging research misconduct. Research design, data and methodology: In addition, I would like to propose the criteria for judging research misconduct by the KODISA, which applies the court's standards well in practice, and guidelines for preventing research misconduct. Research design, data and methodology: After classifying the case of research misconduct into six cases, the court's judgment and practical application will be reviewed. Results: First, research misconduct that has passed the disciplinary prescription can be punished. This is because the state of illegality continues to this day. Second, even if there were no punishment regulations at the time of research misconduct, it can be retroactively punished with the current punishment regulations. This is because research ethics is a universal and common standard and does not change. Third, if there is a fact that infringes on intellectual property rights, it is presumed unwritten intentions. Therefore, the act of taking and using the work of another person without permission or proper citation procedure, even if it is unintentional and for the public interest, is a research misconduct. Fourth, if there is an inappropriate citation notation, the intention of research misconduct is presumed. It is the judgment of the court that even if a quotation is marked, if it is incomplete, it is recognized as plagiarism. Fifth, if the author uses the work of another person without proper source indication, it is plagiarism even if the other person who owns the copyright agrees to it. The understanding or consent of some parties does not justify research misconduct in violation of public trust. Sixth, it is a research misconduct to create a new work without citations for one's previous work. In addition, even if there is a citation, if the subsequent writing is not original, it is a research misconduct. Conclusions: Academia should clarify the scope of research misconduct by referring to the Research Ethics Regulations of KODISA, and deal with research results that lack the value as creative works similar to those of research misconduct.

Study of IoT Service Strategy for Prevent Disasters (재난재해 감소를 위한 사물인터넷 서비스)

  • Yoon, YoungDoo;Choi, Hun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.102-109
    • /
    • 2017
  • The Nation's Constitution stipulates that the nation should strive to prevent disasters and protect the public from harm. That is, the nation is a protector of the protection of people's lives and property from potential danger. The disasters are the most important global issues, and disasters scope are not confined to natural disasters such as pre-existing earthquakes, landslides, floods, fires and fires extend to cyber terror and disease. In the age of IoT and ability of analyze big data, the establishment of a disaster prevention service system in modern society is a priority for the nation. In this study, we will explore the disaster prevention services for each country using IoT technology. Based on the research, it is believed that it will be the foundation for establishing strategies for service system of disasters using IoT technology.

Causes of Waste Problem and Strategics for Recycling in Economic Aspect (폐기물의 처리 및 재활용의 문제점과 대책)

  • 박대문
    • Journal of environmental and Sanitary engineering
    • /
    • v.8 no.2
    • /
    • pp.49-64
    • /
    • 1993
  • The present waste problems require a change of thinking with regard to conventional economics. It has been generally believed that competitive markets maximize social welfare. But, the other hand, a few economists argue that "the competitive markets cannot always be relied on to provide all goods in the efficient amount." One of the best examples of the latter contention is the environmental problem. What is the basic thinking of the conventional economics that causes this problems \ulcorner What is the present problem that requires the change of conventional economic thinking \ulcorner The environmental problem result from the conventional economic thinking such as pursuing the limitless of the Gross National Product(GNP), believing the increasing returns in economics of scale and the efficiency of competitive market. This economic principles, howe- ver, does not apply currently to public goods, especially environmental amenity and natural resource because the price of markets does not reflect the natural goods of services. We call this eternality. Externalizes are no considered by either buyers or sellers of goods of which production or use results in an eternality. This leads to market failure are causes an waste problem in the economic activities. Today, it is almost impossible to say in a word what the solution for waste problems is because they are by-products complicated and entangled human activities. In this paper, I have introduced the causes of environmental problems only from the economic point of view. I have also described the needs of conversion of conventional economic thinking. Firstly, sustainable development, maintaining the natural resources, should be the basis of the economic growth rather that pursuing the limitless growth of GNP. Secondly, an appropriate scale of human's production activity should be taken into account to reduce the impact to the natural environment. Thirdly, internalization of eternality is asked to correct the market failure. This requires the public policy such as imposing a talsubsidy, assigning a property right or implement a more detailed environmental quality standard through, because use of the natural resources can be. allocated optimally by the intervention of government or social associations.

  • PDF