• Title/Summary/Keyword: Rights Control

Search Result 294, Processing Time 0.024 seconds

A Study on the Securing Political Neutrality of the Prosecution Service (검찰의 정치적 중립성 확보방안 연구)

  • Kim, Taek;Jung, In whan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.59-66
    • /
    • 2020
  • This paper considered the measures of securing political neutrality of the prosecutor on the reform of the prosecution. The nation's prosecution has enormous authority. In the meantime, the prosecution enjoyed unlimited power uncontrolled with investigative rights, prosecution monopoly, and police investigation command. No other country has as much power as the Korean prosecution. However, the prosecution, which enjoys such power, is placed on the task of reforming the prosecution due to poor democratic control. Has there been such a prosecutor in Korean history who only looks forward and wields long sword ehrflqtjdrhk against corruption in power? So far, the prosecution has conducted investigations that suit the administration's taste, and the prosecutors have been on the rise in return. That is why the previous administrations tried to ensure the political neutrality of the prosecution. As such, We would like to consider legal logic to analyze the sincerity of the prosecution reform. To this end, the first is to consider the authority of prosecutors and prosecutors. Second, consider the internal requirements of the government's reform of the prosecution. Third, establish the direction of prosecution reform.

A Study of an effective centralization of medical supply system. In Y University Medical Center (Y의료원의 물류 공급체계 중앙화 관리에 대한 연구)

  • Kwon, Soon-Chang;Kim, Young-Soo
    • Korea Journal of Hospital Management
    • /
    • v.4 no.1
    • /
    • pp.1-20
    • /
    • 1999
  • Since the late 1980s, there have been radical changes in the managerial environment of Y University Medical Center(YUMC). Externally, the competition among hospitals has intensified due to the establishment of universal health insurance in 1939 and the entrance of large enterprises into the health care industry in the early 1990s. In addition, government regulation of medical institution is becoming stricter. Also, consumer groups have continued to demand the respect for patient rights and improvement of the quality of medical services. Internally, the financial condition of YUMC has worsened, not only because weak control and poor mediation in its large-scale structure have made its operation inefficient, but also because the rates of increase in the prices of goods and labor have grown faster than any increases in revenues. This study on materials management at YUMC presents a way for YUMC to reduce costs and increase its productivity, thereby overcoming its financial difficulties and dealing with external pressures. This study utilized the case studies of the materials purchasing and medical supply management in the United States and the comparative analysis of management to suggest short-term and long-term alternatives for innovation in YUMC. The goals of the short-term alternatives for innovation are to centralize the purchasing and supply departments and to simplify the decision-making processes. Through these attempts, it is estimated that YUMC's costs could be reduced by $600,000 per year. In the long-term, it is necessary to consider introducing a Supply Processing Distribution(SPD) system and setting up a centralized electronic system for supply and inventory management, although it is difficult to estimate the effect of cost-cutting because of the lack of analysis data. Thus, YUMC should thoroughly analyze initial investment costs and economical efficiency generated from long-term alternatives.

  • PDF

The effects of corporate governance on the borrowing costs (기업 지배구조가 차입비용에 미치는 영향)

  • Gong, Jaisik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.5829-5835
    • /
    • 2015
  • This paper investigates the impact of corporate governance structure on the firm's debt costs under different governance environments. We find that after the 2008 banking crisis, family firms with controlling shareholders benefit from lower debt cost through the strong control rights of dominating large shareholders, compared with the firms with diversified minority-shareholders. Foreign investors are related statistically to the higher cost of debt. Before the 2008 banking crisis, cash flows and growth potentials are positively associated with the firm's cost of debt.

Implementation of an Android MIDI Player that Supports DRM for Musical Instrument Practice (DRM을 지원하는 악기 연습용 안드로이드 MIDI 재생기 구현)

  • Kim, Daseul;Kim, Seungha;Ko, Eunbyul;Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.275-282
    • /
    • 2015
  • The Musical Instrument Digital Interface (MIDI) file format is a typical format for dynamic music that can be used not only for playing, but also for supporting dynamic music activity, such as musical instrument practice. However, almost all of the existing MIDI applications focus only on the playing features. In this paper, therefore, we implement a MIDI file play application that supports various dynamic features such as part-play repeating certain sections that the user wants, tone and speed control while playing a MIDI file, downloading MIDI files from a server, and lastly Digital Rights Management (DRM). By supporting these features, we are confident that our MIDI application will help users who wish to practice musical instruments to do so conveniently, while effectively protecting the copyright of their purchased MIDI files.

A New Spray Chrysanthemum Cultivar, 'Snow Bowl', Resistant to White Rust, Long Vase Life and Single Type with White Petals for Cut Flower

  • Lim, Jin-Hee;Shin, Hak-Ki;Park, Sang Kun;Cho, Hae-Ryong;Rhee, Hye-Kyung;Kim, Mi-Seon;Joung, Hyang Young;Yae, Byeong Woo
    • FLOWER RESEARCH JOURNAL
    • /
    • v.18 no.4
    • /
    • pp.303-307
    • /
    • 2010
  • A new spray chrysanthemum cultivar 'Snow Bowl' was released by National Institute of Horticultural & Herbal Science(NIHHS), Rural Development Administration (RDA), in 2008. The cross was made in 2005 between '03B1-230', breeding lines of NIHHS and 'Sei-Alps'. Trials were conducted from 2006 to 2008 for the evaluation and selection of this cultivar, including shading cultures in summer and retarding cultures in spring. The natural flowering time of 'Snow Bowl' is late October, but year-round flowering is possible by photo-periodic control. It has single type flowers with white petals. The growth of plant is very vigorous and it is resistant to white rust. The diameter of flower is 6.3cm. Number of flowers per stem and petals per flower are 12 and 31, respectively. Days to flowering under the short day treatment is about 59 and its vase life is 24.1 days in autumn season. 'Snow Bowl' was applied as No. 2009-179 on February 18, 2009 for variety protection and the plant variety protection rights have been registered as No. 3239 on August 3, 2010 at the Korea Seed and Variety Service.

A Study on the Importance Analysis of Reliability, Security, Economic Efficiency Factors that Companies Should Determine When Adopting Cloud Computing Services (클라우드 컴퓨팅 서비스 채택 시 기업이 판단해야 하는 신뢰성, 보안성, 경제성 요인의 중요도 분석)

  • Kang, Da-Yeon
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.75-81
    • /
    • 2021
  • The purpose of this research is to derive and evaluate priorities for critical factors that must be determined before an enterprise adopts a cloud computing service. AHP analysis techniques were used to reflect decisions made by experts as research methods. AHP is a decision-making technique that expresses complex decision-making problems hierarchically and derives the best alternatives through pairwise comparison between the items of the hierarchy. Compared to the existing statistical decision making techniques, the decision making process is systematic and simple, making it easy to understand. In addition, the procedure is also reasonable by providing an indicator to determine the consistency of the decision maker in the analysis process. The analysis results of this research showed that security was the first priority, reliability was the second priority, and economic efficiency was the third priority. Among the factors in the first-priority security items, the access control rights and the safety factors of external threats are the most important factors. Research results can be used as a guideline in future practice, and it is necessary to evaluate, compare and analyze the satisfaction of companies that have adopted cloud computing services in the future.

Implementation of Digital Document Management DRM System with OMA Structure (OMA 구조를 이용한 안전한 전자문서 관리를 위한 DRM 시스템 구현)

  • Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.45-54
    • /
    • 2006
  • As widespread of using digital documents in various fields, control the usage of digital document is needed. So, Digital Rights Management(DRM) will become a key component of digital document system, but absence of proper digital document DRM system, there is a real risk to lose important information when a hacker achieved intrusion in important system. This paper designs and implements digital document DRM system based on OMA(Open Mobile Alliance) DRM model and OpenOffice. We considered being a digital document DRM system to contain appropriate solution of security and document compatibility.

APDM : Adding Attributes to Permission-Based Delegation Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • Delegation is a powerful mechanism that allocates access rights to users to provide flexible and dynamic access control decisions. It is also particularly useful in a distributed environment. Among the representative delegation models, the RBDM0 and RDM2000 models are role delegation as the user to user delegation. However, In RBAC, the concept of inheritance of the role class is not well harmonized with the management rules of the actual corporate organization. In this paper, we propose an Adding Attributes on Permission-Based Delegation Model (ABDM) that guarantees the permanence of delegated permissions. It does not violate the separation of duty and security principle of least privilege. ABDM based on RBAC model, supports both the role to role and user to user delegation with an attribute. whenever the delegator wants the permission can be withdrawn, and A delegator can give permission to a delegatee.

Indonesia's State Ideology and Its Interpretations across Orders: Based on the Analysis of Citizenship Education (인도네시아의 국가철학과 이에 대한 시대적 해석: 국민윤리 교육을 중심으로)

  • Song, Seung-Won
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.2
    • /
    • pp.187-214
    • /
    • 2010
  • This article is aimed at understanding the goals of the citizenship educations and changes of political cultures in the Sukarno, Suharto, and the post-Suharto periods in Indonesia. Sukarno's and Suharto's regimes adopted Pancasila, Indonesia's state ideology, as the philosophical basis of education. The citizenship education based on Pancasila was nothing but a political education, which aimed at suppressing the masses and justifying authoritarian rules of the regimes. After the collapse of the Suharto regime, a democratic citizenship education has launched, which emphasized the expanded civic rights and obligations as world citizens and the masses' active participation in politics. However, in this new curriculum, Pancasila is still emphasized as the supporting philosophical pillar of education. The reason is because, through the values of communitarianism represented in the discourse of Pancasila, the state needs to control the possible irresponsible and undemocratic behaviors of local powers and global economy when liberalism is not effectively controlled.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.