• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.024 seconds

The First Comprehensive Plan of National Health Insurance (제1차 국민건강보험 종합계획)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.99-104
    • /
    • 2019
  • On May 1, 2019, the Minister of Health and Welfare announced publicly the first Comprehensive Plan of National Health Insurance (NHI). The Comprehensive Plan which is the 5-year plan including expenditure and revenue aspect of NHI, is desirable in 42 years of introduction of NHI and 30 years of universal coverage of NHI, though the Plan was late and had some conflict process. The Comprehensive Plan was established without evaluation of Moon's Care Plan, did not included to relationship with NHI and other health security systems, and did not have the blue print of NHI. The Plan was not sufficient in content of adequate health care utilization and relationship with service benefit and cash benefit. The Comprehensive Plan should be modified in considering the blue print of NHI and national healthcare system with participating stakeholder in turbulent environment-low fertility, rapid ageing, low economic growth rate, era of non-communicable diseases, unification of the Korean Peninsula, and 4th industrial revolution. Therefore, I suggest to establish the President's Committee of Improving Healthcare System for the blue print of health care and NHI.

Multi-functional Benefits & Costs Analysis of Tide Land Reclamation Project and Development Guidelines in the Future (간척사업(干拓事業)의 다기능적(多機能的) 편익(便益)-비용분석(費用分析)과 발전방향(發展方向))

  • Lim, Jae Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.32 no.2
    • /
    • pp.107-126
    • /
    • 2005
  • The most limited production resource in Korea is land. During the period from 1995 to 2002, annual farm land area of 17,600ha have been converted to urban and industrial land. The self-sufficiency rate of rice, Korean staple food, is expected to be decreased from 97.5% in 2003 to 60-70% in 2020. Under such conditions, this study is aimed at first identifying multi-functional benefits of the reclamation projects such as agricultural production, industrial water supply, urban land supply, transportation effects, sightseeing effects and environmental values with and without the projects. To carry out the objectives, three existing tideland reclamation projects such as Daeho, Kumgang and Yongsangang irrigation project stage II were evaluated and Saemangeum tideland reclamation project which was jointly revaluated by environmental NGO and Govn't appointed specialists in 2000 was reviewed. According to this study results, tide land reclamation projects were showed financially and economically feasible and environmentally sustainable. The joint cost like estuary dam should be allocated based on the multi-functional benefits of the projects. To allocate the joint cost, legal and institutional improvement should adapt the joint cost allocation method as the specific cost-remaining benefit method. Korea has more than 402,000 ha of tidal flat of which 76,396ha have been reclaimed in 2003. To meet food security and to cope with shortage of land, phil-environmental reclamation projects should be continuously implemented and necessary tidal flats for protecting environmental ecosystem should be remained according to the detail survey results of reclaimable resources.

  • PDF

Analysis of Effects on Adoption of a Safety e-Reporting System (안전신고 제도(안전신문고) 도입에 따른 효과 분석)

  • Lee, Jun;Cho, Sangmyeong;Park, Eunmi;Lee, Sanghwa
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.27-41
    • /
    • 2019
  • To analyze the effectiveness of the safety e-reporting system, the present study carried out analysis of safety e-reporting data reported between September 2014 and July 2019, and selected items for measuring the effectiveness of safety e-reporting. Using these items, the effects of adopting the reporting system for the four major parking violations was analyzed, alongside an analysis of effects in terms of traffic accidents using the unit model. When we count the securement of the tax revenue through measures such as charging fines as the beneficial factor per case, the estimation of the benefit is around 62,000 KRW per case. Summing the two factors up, the total value of citizen's reports pertaining to the big four parking violations is about 275,000 KRW per case. Most of the reports made through the Safety e-Report system are about traffic and facilities. When we calculate the total annual benefit with the representative reporting value defined with traffic and facilities, the system received a total of 1,164,439 cases from 2014 to 2019, while citizens reported 52,721 cases for the big four parking violations from April to July 2019. As the value of a safety report is around the net benefit for last five years is around 27,340,000,000 KRW.

Drug Use Evaluation of Letrozole in Breast Cancer Patients at Regional Cancer Hospitals in Thailand

  • Ketkaew, Chaninun;Kiatying-Angsulee, Niyada
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.14
    • /
    • pp.6055-6059
    • /
    • 2015
  • Background: Medication policy development in Thailand is continually promoting rational drug use. Letrozole, an endocrine therapy drug, is usually prescribed for post-menopausal status early and advanced stage breast cancer. After Ministry of Public Health announced Letrozole as compulsory licensed drug in 2009, more breast cancer patients can access to this drug at low cost especially those within universal coverage schemes. To ensure that Letrozole is rationally prescribed, the drug utilization study was conducted. Objectives: The aim of this study was to describe the appropriate use of Letrozole in breast cancer and the relationship between appropriate use and health benefit schemes. Materials and Methods: A retrospective study to evaluate use of Letrozole in breast cancer patients was performed for six months between January - June 2010 in seven regional cancer hospitals, Thailand. All prescriptions of Letrozole were identified from pharmacy dispensing databases and prescription papers. A medical record review was also performed to evaluate appropriate use referring to the drug use evaluation criteria. The approved criterion of this study was referred from the guideline of Thai National Formulary version 2010. Results: There were 681 prescriptions of Letrozole for 254 breast cancer patients with an average age of $58.6{\pm}10.0years$. The patients in universal coverage scheme (UCS), civil servant medication benefit scheme (CSMBS) and social security scheme (SSS) were 77.7%, 18.5% and 8.7% respectively. 10.6% were prescribed Letrozole for the first time. Letrozole were prescribed by oncologists (82.8%). The average number of tablets per prescription was $58{\pm}10$. Calcium supplements were prescribed concomitant with Letrozole for 19.4%. To assess drug use evaluation criteria, 45 prescriptions were excluded because of uncompleted clinical data, 636 prescriptions were evaluated. The study showed 86 prescriptions (13.5%) with inappropriate use including 6 (0.9%) not prescribed for estrogen receptor (ER) and/or progesterone receptor (PR) positive, 31 (4.9%) not prescribed for post-menopausal and 49 (7.7%) not prescribed for an appropriate duration. Appropriate use percentages in different health benefit schemes were similar, 85.7% of CSMBS, 86.4% of SSS and 86.7% of UCS. The relationship between health benefit scheme and appropriate use of Letrozole was not significantly different, ${\chi}^2$ (2, N = 636) = 0.081, p > 0.05. Conclusions: The study showed inappropriate use in breast cancer patients because of non-compliance with duration, menopausal status and hormone receptor requirements. To prescribe appropriate indication did not referred to the appropriate practice along the treatment. Drug use evaluation proved very useful for detecting the sign of inappropriate use and allows immediate feedback to the stakeholder for developing medication policy in the future. Importantly, there was no significantly difference in appropriate use of Letrozole across health benefit schemes.

Poverty Reduction Effectiveness and Efficiency of Social Security Benefits (사회보장급여의 빈곤완화 효과성 및 효율성)

  • Noh, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.237-247
    • /
    • 2021
  • The purpose of this study is to analyze the effectiveness and efficiency of social security benefits to poverty alleviation. To this end, this study analyzed the poverty alleviation effect of public pension, basic pension, child-rearing allowance, disability allowance, basic living security subsidy, EITC, and other government subsidies using 2019 Household Financial Welfare Survey. The analysis results are as follows. First, social security benefits lowered the poverty rate by 6.8%p. Second, in terms of the poverty gap reduction effect, the public pension for the elderly male households, the basic pension for the elderly female householder, and the basic guarantee for the working female householder contributed the most. Finally, in terms of poverty alleviation efficiency, about 33% of social security benefits contribute to narrowing the poverty gap. Social security benefits for female heads of households were found to serve as a function of alleviating poverty gap and for male heads of households to supplement household income. Based on these results, this study suggested the discovery of various poverty states, expansion of basic security for the female elderly, and the connection between the purpose of social security benefits and key targets.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.

Generation and Management of Strong Passwords using an Ownership Verified Smartphone (소유권 확인된 스마트폰을 이용한 강력한 패스워드 생성 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.30-37
    • /
    • 2020
  • Enforcing additional authentication to password-based authentication, in addition to attempting to increase the security of the password itself, helps to improve the security of the password authentication scheme. For a well-known problem of using strong passwords that differ from site to site, we propose a scheme for password generation and management with an inherent supplementary authentication. Like the so-called password manager, the scheme retrieves and presents a strong site-specific password whenever requested without requiring the user to remember multiple passwords. Unlike the existing methods, however, the scheme permits the password retrieval process to proceed only through the authenticated user's ownership verified smartphone. Hence, even for sites not enforcing or supporting two-factor authentication, the logon process can benefit from the scheme's assurance of enhanced security with its two-factor equivalent authentication. The scheme can also prevent an attacker from impersonating a user or stealing secrets even when the stored information of the server for password retrieval service or the user's smartphone is leaked.

Study on a Forward Light Changes According to the Surface Treatment of Light Cutoff Panel (차광판 표면 처리 방법에 따른 전사광 변화에 관한 연구)

  • Gu, Jinhoi;Kwon, Myunghee;Lee, Yoon-Gyeong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.12
    • /
    • pp.1-5
    • /
    • 2014
  • Since the "Light Pollution Prevention Act" was executed, the installation of the light cutoff panel to the security lightings which caused light trespass has been increased in the local government. The light cutoff panel is effective in reducing the light trespass in term of the cost-benefit. Because the installation of the light cutoff panel is inexpensive than the change of the security lighting. But the reflected light from the surface of the light cutoff panel has been regarded as another light pollution problem to solve. Therefore, we try to improve light cutoff panel by changing the light reflectivity characteristic of the surface of the light cutoff panel. First, we laminated the surface of light cutoff panel by black powder to reduce the light reflectivity of the light cutoff panel. After the black powder lamination, the light reflectivity on the light cutoff panel improved from 85% to 5%. And we compared reflected light caused by black powder laminated light cutoff panel with the one of no surface treatment cutoff panel. The vertical illuminance was measured at 3, 6, 9m in front of the security lighting and 3, 6, 9, 12, 15, 18m in back of the security lighting to evaluate the reflected light. And the measurement height was determined of 1.5m considering the height of the 1th floor of an apartment house. In this study, we found that the reflected light from the light cutoff panel can be reduced about 90% by the black powder lamination method. The results derived from this study will be helpful to develope the various kind of light cutoff panel which minimize the adverse effect like reflected light of light cutoff panel.

An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis (탐색적 요인 분석을 이용한 기업의 ISMS 인증 시 장애요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.951-959
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent issue. According to the National Intelligence Service in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment and operation of ISMS (Information Security Management System) even for private enterprises. But to be ISMS certified, there are many exposed or unexposed barriers, moreover, sufficient amount of studies has not been conducted on the barriers of ISMS Certification. In this study, we analyse empirically through exploratory factor analysis (EFA) to find the obstacle factors of ISMS Certification. The result shows that there are six obstacle factors in ISMS Certification; Auditing difficulty and period, Consulting firm related, Certification precedence case and consulting qualification, Internal factor, CA reliability and auditing cost, Certification benefit.

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.