• Title/Summary/Keyword: Security

Search Result 25,827, Processing Time 0.045 seconds

A Study on Restriction of Access to Medical Institutions and Discrimination on Human Rights of Persons with Disabilities Not Wearing Masks to Prevent Healthcare-Associated Infections (의료관련감염 예방을 위한 마스크 미착용 장애인의 의료기관 출입제한과 인권차별 결정에 대한 검토)

  • Moon, Sang Hyuk;Kim, Je Sun
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.1
    • /
    • pp.67-98
    • /
    • 2023
  • In the early stages of the COVID-19 pandemic, Korea took the lead in implementing "social distancing" policies more strongly than other countries. In addition to making it mandatory to wear a mask according to the policy, all patients using medical institutions are tested for COVID-19 to prevent Healthcare-Associated Infections, and only those patients who test negative have been regulated to receive face-to-face medical treatment. In this process, situations such as the disabled, who have difficulty wearing masks, were not taken into account, and emergency patients did not receive timely treatment or surgery from medical personnel. In response, the National Human Rights Commission of Korea has decided that forcing everyone to wear a mask and restricting access to medical institutions constitutes discrimination against the disabled. Therefore, the purposes this study has that, the first is to review cases of human rights discrimination against persons with disabilities due to measures to prevent the transmission of infectious diseases that did not consider the characteristics of persons with disabilities in the COVID-19 situation and issues regarding the decisions of the National Human Rights Commission of Korea, the second is to find a reasonable plan and the need for measures to prevent refusal of treatment by medical institutions for the disabled who have difficulty wearing masks.

An Educational Needs Analysis of Home Economics Teachers for Food Literacy Education in Secondary School Home Economics (중등 가정과 푸드리터러시 함양 식생활교육에 대한 가정과 교사의 교육 요구도 분석)

  • Song, Yunmi;Lee, Kyung Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.35 no.2
    • /
    • pp.41-59
    • /
    • 2023
  • This study aimed at analyzing the educational needs of home economics teachers for food literacy cultivation education in secondary school home economics. A total of 192 home economics teachers were surveyed about their perceptions of importance and performance of food literacy education content categories and elements, and their priorities were identified. Among the 38 content elements presented, home economics teachers recognized that the current performance level was significantly lower than that of the importance over 34 content elements. Based on the Borich educational needs assessment and the Locus for Focus Model, we identified five content elements with 'very high' educational needs ('food security/food sovereignty', 'reducing food-related waste', 'food waste management and recycling', 'food-related waste recycling', and 'country of origin information'), and four content elements with 'high' educational needs ('genetically modified food', 'ethical food consumption', 'food additives', and 'eco-friendly agricultural products'). These results indicate that dietary education in secondary school home economics should emphasize both the production and disposal of food. The findings of this study suggest implications for the needs for a new dietary education in secondary school home economics that allows students to learn all stages of food system. These results can also be used as a basis for dietary education for cultivating food literacy in secondary school home economics education.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

A Study on the Changes in the Back Garden of Gyeongbokgung Palace during Cheongwadae Period through an Interview with Landscape Manager (조경 관리자 인터뷰를 통한 청와대 시기 경복궁 후원의 변화에 관한 연구)

  • Kim, Kyu-Yeon;Lee, Shi-Young;Choi, Jaehyuck;Choi, Jong-Hee
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.26-34
    • /
    • 2023
  • This study conducted interviews with former and current managers of Cheongwadae landscape architecture to provide basic information necessary to preserve, manage, and utilize Gyeongbokgung Palace's back garden, and the main conclusions summarized are as follows. First, the topography changed a lot with the construction of the main building and the official residence under President Roh Tae-woo. The water system was connected to Gyeongbokgung Palace in the past, but is now disconnected. Second, in the case of planting, the most important principles were the president's security and protocol, and accordingly, trees were placed or managed. Trees were planted by introducing excellent trees in various regions, and wildflowers and ground cover plants were frequently replaced according to the season. Third, facilities and roads were arranged for the president's protocol, hobbies, and workers' rest, and fire-fighting facilities were installed to prevent disaster in the forest area of Baegaksan Mountain. Fourth, the biggest inflection point of Gyeongbokgung Palace's back garden during Cheongwadae period was the change in topography due to the new construction of the main building and official residence during President Roh Tae-woo, the removal of A and B barbed wire fences that separated space during President Roh Moo-hyun, and the extensive landscaping carried out for the G20 Summit under President Lee Myung-bak. The area of Gyeongbokgung Palace's back garden is expected to face another inflection point due to the opening of Cheongwadae on May 10, 2022, and the work of evaluating the historical, academic, and landscape values of Gyeongbokgung Palace's back garden should be carried out while preserving the status.

The Influence of Competitive Psychological Climate and IS Related Anxiety: The Role of IS Related Value Dissimilarity (경쟁적 심리 분위기와 정보보안 걱정의 영향: 정보보안 가치 차이의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.649-660
    • /
    • 2023
  • The study aims to identify the complex effects of information security (IS) environments and individuals' IS-related perceptions and value dissimilarity that negatively affect insiders' IS compliance activities. In detail, the study aimed to confirm the roles of prospective and inhibitory anxiety, and value dissimilarity in the process in which a competitive psychological climate negatively affects IS compliance intentions. The study obtained 387 samples from the firm's workers with IS-related regulations and verified the research hypotheses established using the AMOS 22.0 and Process 3.1 tools. As a result, the competitive psychological climate negatively affected IS compliance intention by increasing individual's IS-related prospective and inhibitory anxiety. In addition, IS-related value dissimilarity had an interactive effect with prospective and inhibitory anxiety and had a negative effect on IS compliance intention. This study has practical implications in terms of presenting information and values to be provided to employees to achieve internal IS goals and has academic implications in terms of applying the complex effects of IS-related anxiety and value dissimilarity.

Design and Implementation of Economical Smart Wall Switch with IEEE 802.11b/g/n

  • Myeong-Chul Park;Hyoun-Chul Choi;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.103-109
    • /
    • 2023
  • In this paper, we propose a smart wall switch based on IEEE 802.11b/g/n standard 2.4GHz band communication. As the 4th industrial era evolves, smart home solution development is actively underway, and application cases for smart wall switches are increasing. Most of the Chinese products that preoccupy the market through price competitiveness use Bluetooth and Zigbee communication switches. However, while ZigBee communication is low power, communication speed is slower than Bluetooth and network configuration through a separate hub is additionally required. The Bluetooth method has problems in that the communication range and speed are lower than Wi-Fi communication, the communication standby time is relatively long, and security is weak. In this study, an IEEE 802.11b/g/n smart wall switch applied with Wi-Fi communication technology was developed. In addition, through the two-wire structure, it is designed so that no additional cost is incurred through the construction of a separate neutral line in the building. The result of the study is more than 30% cheaper than the existing wall switch, so it is judged that it will be able to preoccupy the market not only in terms of technological competitiveness but also price competitiveness.

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

A Study on Intangible Impact of Personal Information Security Breach to Korean Firm's Value (개인정보 보안사고가 국내 기업의 가치에 미치는 비가시적 영향력에 관한 연구)

  • Lee, JongHyun;Kweon, SeongHo;Chang, Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.595-596
    • /
    • 2009
  • 정보화의 발전에 비례하여 정보보호의 중요성도 높아지고 있다. 최근까지 정보보호에 대한 관심과 주요 연구의 흐름은 기술적인 보호조치(예: 암호화, 접근제어, 방화벽 등)와 관리적 관점의 행동연구였다. 최근에 들어서야 국내외적으로 정보보호 투자효과에 대한 연구가 활성화되기 시작했다. 정보보호 투자효과에 대한 계량적 산정이 필요한 이유는 정보보호의 중요성을 정확하게 인식할 수 있어 적정규모의 예산을 책정하고 효율적으로 예산을 투입할 수 있는 기초를 마련할 수 있기 때문이다. 정보보호 투자효과를 측정하기 위한 선행연구로 보안사고의 피해규모를 산정하는 연구가 필수적이다. 보안사고의 피해규모는 가시적 손실(피해복구, 생산성 저하, 손해배상 등)과, 비가시적 손실(고객 충성도 저하, 회사의 브랜드 이미지 하락 등) 규모의 합으로 구성된다. 그 동안 가시적 손실규모 측정에 관한 연구는 상대적으로 많았으나, 비가시적 손실규모 측정에 관한 연구는 상대적으로 미흡하였던 것이 사실이다. 이는 현실적으로 비가시적 손실규모를 측정할 수 있는 접근방법을 고안해내는 것이 어려웠기 때문이다. 이로 인해 막연히 비가시적 손실규모가 가시적 손실규모에 비해 대단히 클 것이라고 짐작해 올 수 밖에 없었다. 본 논문에서는 보안사고의 비가시적 손실규모를 측정하기 위해 대규모 개인정보 보안 사고가 발생한 기업의 매출액 증가율을 경쟁기업과 분석하는 연구방법을 제안한다. 매출액은 영업이익 및 순이익과는 달리 회사 내부적인 회계방침에 의해 규모의 조절이 불가능한 재무요소이면서 회사가 고객 충성도 저하와 회사의 브랜드 이미지 하락으로 인해 받게 되는 영향을 가장 정확하게 반영하는 재무요소이기도 하다. 연구방법에 따라 2008년 대규모 개인정보 보안사고가 발생한 국내기업을 선정하고 그 경쟁사와 매출액 변화추이를 비교 분석하였다. 분석결과 보안사고가 발생한 기업의 평균 매출액 증가율이 경쟁사 평균 매출액 증가율 보다 0.0225% 높다는 사실을 발견했다. 이 결과는 국내의 보안 사고가 기업 가치에 미치는 비가시적 영향이 거의 없거나 또는 발생하더라도 그 영향력이 미미하여 가격정책 및 광고 홍보를 통해 충분히 극복할 수 있다는 점을 대변한다. 본 논문의 결과는 역설적으로 국내 보안사고의 피해규모를 측정하는데 있어 가시적 손실규모의 정확한 측정이 무엇보다 중요함을 의미한다.

China and Central Asia : Soft Balancing Strategy against the U.S. (중국과 중앙아시아 관계 : 미국에 대한 소프트밸런싱 전략을 중심으로)

  • Kang, Teak Goo;Kim, Yei kyoung
    • Journal of International Area Studies (JIAS)
    • /
    • v.16 no.2
    • /
    • pp.121-146
    • /
    • 2012
  • The purpose of this paper is to study on China's emergence and its influence on international society against the U.S. hegemony. Recently, China's influence has proliferated in Central Asia as well as East Asia at a rapid rate. China, through its soft balancing strategy, increased its influence in Central Asia in response to the U.S. power and behavior. This study analyzes the relationship among China and Central Asia with the view of soft balancing theory. In order to determine whether China's strategy on Central Asia is soft balancing, this paper presents three indicators: 1) Second-tier major power is willing to take a strategy that increase diplomatic cost of hegemony or counter the hegemony influence through using regional and global multilateral cooperation. 2) Second-tier major power is willing to not only increase its influence by strengthening regional economic cooperation, but also check the extension of the hegemony economic influence into its boundary. 3) Second-tier major power intends to prevent expanding hegemony military influence into the region through limited military cooperation and increasing military spending, and denying territory. This paper analyze China's multi-polar strategy, economic and energy cooperation with Central Asia countries, and the military and security cooperation with multilateral organizations such as SCO.

Mutilateralism vs. Bilateralism in Chinese Resource Diplomacy : Comparative Analysis on Chinese Foreign Policy toward Central Asia and Africa (중국 자원외교의 다자주의와 양자주의: 중앙아시아 및 아프리카에 대한 중국 자원외교 비교)

  • Kim, Ki-jung;Chun, Ja-hyun
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.1
    • /
    • pp.107-133
    • /
    • 2009
  • International relations in the 21st century is featured by boundless competition among nations to secure sufficient energy resources for achieving economic development. Resource diplomacy, therefore, is competitive in its nature, which is derived from the fact that resources of the globe are limited. Chinese recent economic growth has been possible mainly due to its success in resource diplomacy. The Chinese resource diplomacy has shown two different patterns according to target regions. On the one hand, China has pursued multilateral approach to Central Asia region, by which China aimed to secure energy with joint exploration method in the region. Chinese resource diplomacy toward Africa, on the other hand, has been based on bilateral approach combined with unit-centered economic aid to African nations. This difference in Chinese foreign policy pattern seems to be derived from three factors: namely, Chinese strategic considerations on geopolitical condition, regional security sensitivity, and legacies of Chinese long-time non-alignment diplomacy since the 1950s. Whether China is able to maintain the current pattern of resource diplomacy will be depended on how wisely China pursue its relations with two other global powers: Russia in the Central Asia and the U.S. in Africa. In this regard, the Chinese resource diplomacy is expected to work as determining factor of shaping a pattern of tri-lateral strategic relations among the U.S., Russia, and China. Chinese resource diplomacy thus will determine the future direction of the global politics in terms of strategic arrangement.