• Title/Summary/Keyword: Secure communication

Search Result 1,679, Processing Time 0.027 seconds

The Effect of Stress Among Middle School Students and the Effect of Motive on Their Addiction to the Internet (중학생의 스트레스와 인터넷 이용동기가 인터넷 중독에 미치는 영향)

  • Park, Hea-Young;Lee, Eun-Hee;Park, Sang-Mi
    • Journal of Families and Better Life
    • /
    • v.27 no.6
    • /
    • pp.65-82
    • /
    • 2009
  • The following research aimed to determine the effect of stress among middle school students on their addiction to the Internet. This research's target was a group of male students who had a high probability of getting addicted to the Internet while playing c/t games. The study distributed 357 questionnaires and used 340 copies, which meant discarding 17 copies that were considered inadequate. The research results are as follows: First, there appeared subordinate factors in the stress suffered by the students. These included stress from their families, from conflicts with their teachers, from the living environment, current schoolwork and future course in college, insecurity over their physical appearance, bullying from other students, and relationships with friends. Among these factors, stress caused by conflicts with teachers and family was the most frequently cited, while stress from their friends was the least cited. The motive in using the Internet was found to be bound with several factors. These include: a form of diversion, a way to communicate with others, a means in coping with loneliness, a source of news and information, a form of passing away time, a kind of habit, and others. Among these motives, passing away time and indulging a habit were cited the most, followed by news and information search, and a form of diversion. Second, as a subordinate factor in Internet addiction, the following were cited: formation of tolerance, health issues, occurrence of problems related to daily life, satisfaction or a pleasant sensation, withdrawal, cover-up on the use of the Internet, and formation of virtual interpersonal relationships, and others. Among these, the formation of tolerance came out the highest, followed by health issues, daily life, and problems related to daily life. Third, in terms of the effects of stress on the motive in using the Internet, the research found that the more the students felt stressed out by conflicts with their teachers and family, the more they tended to use the Internet to communicate with others, to cope with loneliness, to obtain newsI and information, to passawaytime, and to indulge a habit Also, the more they felt stressed out by the living environment, the more they tended to use the Internet to communicate with others, to cope with loneliness, and use news and information. The more they felt stressed out by their schoolwork and future course in college, they tended to use the Internet as a form of diversion and to secure news and information. The more they felt stressed out by their insecurity over their physical appearance and being victimized by bullies, the more they tended to use the Internet to cope with loneliness. Fourth, as for the effect of several variables on student addiction to the Internet, the study found that the more students felt stressed out by their living environment, by schoolwork and future course in college, by their physical appearance, and bullying from other students, the more they used the Internet as a form of diversion, a communication tool, and as a means of passing away time or indulging a habit. The study came up with the finding that the more the students used the computer and the Internet, the probability of their getting addicted to the Internet got higher.

A Study on the Mobile Medical Service Program -Based on the Community Diagnosis of a Remote Farm Area- (순회진료사업(巡回診療事業)의 문제점(問題点)과 개선방향(改善方向) (일부(一部) 무의지역에 대(對)한 지역사진단(地域社診斷)을 중심(中心)으로))

  • Park, Hung-Bae;Choi, Dong-Wook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.11 no.1
    • /
    • pp.86-97
    • /
    • 1978
  • The mobile medical service has been operated for many years by a number of medical schools and hospitals as a most convenient means of medical service delivery to the people residing in such area where the geographical and socioeconomic conditions are not good enough to enjoy modern medical care. Despite of official appraisal showing off simply with numbers of outpatients treated and medical persons participated, however, as well recognized, the capability (in respect of budget, equipment and time) of those mobile medical teams is so limitted that it often discourages the recipients as well as medical participants themselves. In the midst of rising need to secure medical service of good quality to all parts of the country, and of developing concept of primary health care system, authors evaluated the effectiveness of and problems associated with mobile medical servies program through the community diagnosis of a village (Opo-myun, Kwangju-gun) to obtain the information which may be halpful for future improvement. 1. Owing to the nationwide Sae-Maul movement powerfully practiced during last several years, living environment of farm villages generally and remarkably improved including houses, water supply and wastes disposal etc. Neverthless, due to limitations in budget time and lack of knowledge (probably the most important), these improvements tend to keep up appearances only and are far from the goal which may being practical benefit in promoting the health of the community. 2. As a result of intensive population policy led by the government since 1962, there has been considerable advances in understanding and the rate of practicing family planning through out the villages and yet, one should see many things, especially education, to be done. Fifty eight per cent of mothers have not received prenatal check and the care for most (72%) delivery was offered by laymen at home. 3. Approximately seven per cent of the population was reported to have chronic illness but since only a few (practically none) of the people has had physical check up by doctors, the actual prevalence of chronic diseases may reach many times of the reported. The same fact was observed also in prevalence of tuberculosis; the patients registered at local health center totaled 31 comprising only 0.51% while the numbers in two neighboring villages (designated as demonstration area of tuberculosis control and mass examination was done recently) were 3.5 and 4.0% respectively. Prevalence rate of all dieseses and injuries expereinced during one month (July, 1977) was 15.8%. Only one tenth of those patients received treatment by physicians and one fifth was not treated at all. The situation was worse as for the chronic patients; 84% of all cases either have never been treated or discontinued therapy, and the main reasons were known to be financial difficulty and ignorance or indifference. 4. Among the patients treated by our mobile clinic, one third was chronic cases and 45% of all patients, by the opinion of doctors attended, were those who may be treated by specially trained nurses or other paramedics (objects of primary care). Besides, 20% of the cases required professional managements of level beyond the mobile team's capability and in this sense one may conclude that the effectiveness (performance) of present mobile medical team is quite limitted. According to above findings, the authors would like to suggest following for mobile medical service and overall medicare program for the people living in remote country side. 1. Establishment of primary health care system secured with effective communication and evacuation (between villages and local medical center) measures. 2. Nationwide enforcement of medical insurance system. 3. Simple outpatient care which now constitutes the main part of the most mobile medical services should largely be yielded up to primary health care unit of the village and the mobile team itself should be assigned on new and more urgent missions such as mass screening health examination of the villagers, health education with modern and effective audiovisual aids, professional training and consultant services for the primary health care organization.

  • PDF

Effective Management of Invasive Nutria (Myocastor coypus) in the UK and the USA (영국과 미국에서 침입성 뉴트리아 (Myocastor coypus)의 효과적 관리)

  • Kil, Jihyon;Lee, Do-hun;Kim, Young-chae
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.4
    • /
    • pp.265-273
    • /
    • 2015
  • It is the better to take preventative measures against the natural intrusion in advance from invasive alien species that reduce biodiversity and cause economic loss to humans. If the prevention of intrusion and spread fails, we need to make active control and eradication. This study aims to introduce nutria (Myocastor coypus) control cases performed in the United Kingdom and the United States and to provide information for the contribution of nutria management measure improvements. The nutria eradication campaign in the United Kingdom was developed as a long-term plan based on sufficient understanding on the management target and objective and suitable support. Sufficient information on nutria was accumulated and the management strategy was flexibly modified according to the changes in management that were proactively reflected in the field. Regarding the eradication project at Chesapeake Bay in the United States, based on long-term ecological information, more advanced capture technology than in the United Kingdom were introduced and the eradication plan, strategy and implementation were configured by analyzing the strengths and weaknesses of the eradication campaign in the United Kingdom. The successful cases in the United Kingdom and the United State provide an information on how to improv the nutria management measure. For the eradication of nutria, it is necessary to reach a consensus between stakeholders and to form a consultative group between related organizations for periodic communication. Opinions on the field must be actively accepted in the consultation process for strategy and policy decision, and the eradication plan needs to be developed based on a management index. The eradication plan is required to be managed, evaluated and adjusted in a systematic way. Scientific management must be introduced and the management performance must be evaluated objectively so that a practical plan can be flexibly adjusted. It is also required to secure a long-term budget support and a stable organization and to input a concentrated budget at the proper period when there is high efficiency of eradication.

A Study on the Stereotype of ICT SMEs' R&D: Empirical Evidence from Korea (ICT 중소기업 R&D의 스테레오타입에 대한 연구 : 한국의 사례를 중심으로)

  • Jun, Seung-pyo;Choi, San;Jung, JaeOong
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.334-367
    • /
    • 2017
  • The ICT industry has been the main driver of Korea's economy with international competitiveness and is expected to be the growth engine that will revitalize the currently depressed economy. A broad range of different perspectives and opinions on the industry exist in Korea and overseas. Some of these are stereotypes, not all of which are based on objective evidence. Stereotypes refer to widely-held fixed opinions on a specific group and do not necessarily have negative connotations. However, they should not be viewed lightly because they can substantially affect decision-making process. In this regard, this study sought to review the stereotypes of ICT industry and identify objective and relative stereotypes. In the study, a decision-tree analysis was conducted on a survey result of 3,300 small and medium-sized enterprises (SMEs) in order to identify Korean ICT companies' characteristics that distinguish them from other technology companies. The decision-tree analysis, a data mining process based on machine learning, took a total of 291 variables into account in 10 subjects such as: corporate business in general, technology development activities as well as organization and people in technology development. Identifying the variables that distinguish ICT companies from other technology companies with the decision-tree analysis, the study then came up with a list of objective stereotypes of ICT companies. The findings from the stereotypes of Korean ICT companies are as follows. First, the companies are in need of technology policies that help R&D planning and market penetration. Second, policies must better support the companies working to sell new products or explore new business. Third, the companies need policies that support secure protection of development outcomes and proper management of IP rights. Fourth, the administrative procedures related to governmental support for ICT companies' R&D projects must be simplified. It is hoped that the outcome of this study will provide meaningful guidance in establishment, implementation and evaluation of technology policies for ICT SMEs, particularly to policymakers or researchers in relevant government agencies who determine R&D policies for ICT SMEs.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Universal Ethics and Pragmatic Pluralism (보편윤리학과 실용주의적 다원론)

  • Kwon, Su-Hyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.446-453
    • /
    • 2021
  • This paper deals with two methods regarding fact and value. One is the method of H. Putnam, which is to break the boundary between fact and value and to make a world where the two have an inherent connection. The other is the method of J. Habermas, which regards fact and value as the product of an intersubjective agreement based on argumentation. Putnam, through his position of internal realism, moves from realism to pragmatism, especially by combining the rationalist tradition of Kant and Dewey's pragmatic views. Habermas also stands in the tradition of rationalism and universalism in Kant, at the same time emphasizing the practicability of truth in Hegel's tradition of historical reason. The significance of the strategy of Putnam and Habermas is that they have attempted to revive the realm of value against the strict dichotomy of facts and values and the subsequent devaluation of rationality in the realm of value. The starting point of this attempt is that the practical foundation of rationality is laid on life and practice. This could provide the room for escaping from rationality, which prioritizes only truths that reveal facts, that is, instrument-reduced rationality, the room for the revival of practical rationality through reflection on what is the purpose of life, and, in turn, the room for resisting to pass the realm of values and norms to the logic of habitual routines or customs. However, despite such common goal, there are clear limitations to Putnam's approach due to the differences in the strategies taken on facts and values. Putnam's method can demolish the whole universal framework that is the foundation where pragmatic pluralism will be fostered, eliminating the difference between the specificity of values and the universality of norms and shaking up the status of universal ethics. Therefore, Habermas' ethical theory is proposed as an alternative to establish a basis for universal ethics by relying on communication rationality and to secure the coercion of norms and blossom cultural pluralism as a diverse lifestyle based on this coercion.

Science and Technology ODA Promotion of Korea through ICT of Global Problem Solving Centers -Suggestion on the mid- and short-term projects promotion of science and technology ODA roadmap- (글로벌문제해결거점 ICT화를 통한 한국형 과학기술 ODA 추진 -과학기술 ODA 중·단기 과제 추진에 대한 제언-)

  • Jung, Woo-Kyun;Shin, Kwanwoo;Jeong, Seongpil;Park, Hunkyun;Park, Eun Sun;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.162-171
    • /
    • 2021
  • The Korean government proposed the K-SDGs in 2019 to promote the UN SDGs, but the role and tasks of science and technology, an important means of implementing the SDGs, have not been materialized. Accordingly, the role of science and technology ODA for the SDGs was established through the Ministry of Science and ICT's policy research project 'Science and Technology ODA Promotion Roadmap for Spreading the New Southern Policy and Realizing the 2030 SDGs'. In addition, goals, strategies, and core tasks for the next 10 years were derived in 10 fields such as water, climate change, energy, and ICT. In this paper, we analyze 30 key tasks of the ODA promotion roadmap for science and technology for the realization of SDGs, and propose mid- and short-term tasks and implementation plans for effective roadmap promotion. Among the key tasks in each field, four common elements were derived: ICT/smartization, a global problem-solving center, cooperation/communication platform, and business model/startup support platform/living lab that can create and integrate roadmap implementation conditions. In addition, the four mid- and short-term tasks, 1) Establishment of science and technology ODA network, 2) Establishment of living lab business platform linked to start-up support business, 3) Local smartization of recipient countries, and 4) Expand and secure sustainability of global problem-solving centers, were set in relation to the implementation of the detailed roadmap. For the derived mid- and short-term tasks, detailed implementation plans based on the ICTization of global problem-solving centers were presented. The implementation of the mid- and short-term tasks presented in this paper can contribute to the more effective achievement of the science and technology ODA roadmap, and it is expected that Korea's implementation of SDGs will also achieve high performance.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Changes in China's Landscape Scenic Sites System and Suggestions for Application of Major Policies to Scenic Sites of Korea (중국 풍경명승구 제도의 변천과 주요정책의 국내 명승 적용 제언)

  • Kim, Dong-Hyun;Lee, Jian-Feng;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.11-18
    • /
    • 2023
  • This study aims to distinguish what can be used in consideration of the national situation with Korea for Chinese Scenic and Historic Interest Areas, and the results are as follows; First, the Chinese Scenic and Historic Interest Areas expanded to the existing scenic cruise culture, travel, and tourism culture in the process of the influx of Western culture in the modern and contemporary era, and became popular as a travel destination. Accordingly, the Chinese government developed the tourism industry around the scenic sites, and thanks to the development of transportation and communication, the Scenic and Historic Interest Areas has become an important national heritage. This influenced the establishment of the system related to Scenic and Historic Interest Areas, and today, it is operated around the Scenic and Historic Interest Areas ordinance. Second, the designation of the Scenic and Historic Interest Areas is divided into the size of the site according to the area, and the process of selecting the Scenic and Historic Interest Areas classification, rating evaluation, and comprehensive value evaluation according to evaluation indicators and rating standards is carried out. Accordingly, according to the results of the classification, it is subdivided from the national level to the Scenic and Historic Interest Areas at the local level. Third, the central government is in charge of managing and supervising Scenic and Historic Interest Areas across the country, and the local government's construction department is in charge of supervising Scenic and Historic Interest Areas in the region. The management organization of Scenic and Historic Interest Areas established by local governments above the county level has a system that actually protects, utilizes, and manages Scenic and Historic Interest Areas. In addition, 14 detailed indicators are used to monitor Scenic and Historic Interest Areas. Based on these results, considering the application of the domestic scenic site policy, the method of developing the policy that has established the system from the perspective of the utilization of the people is worth considering. On the other hand, the evaluation of the designation and management system through the setting of various indicators has limitations in that it is difficult to secure objectivity in impressing or evaluating the landscape. Therefore, rather than blindly introducing quantified evaluation, it seems that guidance and promotion on how to expand consensus on scenic values and enjoy heritage should be prioritized.