• Title/Summary/Keyword: Security Control

Search Result 3,087, Processing Time 0.028 seconds

Quality of Working Life (직장생활에 대한 새로운 인식)

  • 김영환
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.43-61
    • /
    • 1981
  • Interest in the Quality of working life is spreading rapidly and the phrase has entered the popular vocabulary. That this should be so is probably due in large measure to changes in the values of society, nowadays accelerated as never before by the concerns and demands of younger people. But however topical the concept has become, there is very little agreement on its definition. Rather, the term appears to have become a kind of depository for a variety of sometimes contradictory meanings attributed to it by different groups. A list of all the elements it if held to cover would include availability and security of employment, adaquate income, safe and pleasant physical working conditions, reasonable hours of work, equitable treatment and democracy in the workplace, the possibility of self-development, control over one's work, a sense of pride in craftsmanship or product, wider career choices, and flexibility in matters such as the time of starting work, the number of working days in the week, Job sharing and so on altogether an array that encompasses a variety of traditional aspirations and many new ones reflecting the entry into the post industrial era. The term "quality of working life" was introduced by professor Louis E. Davis and his colleagues in the late 1960s to call attention to the prevailing and needlessly poor quality of life at the workplace. In their usage it referred to the quality of the relationship between the worker and his working environment as a whole, and was intended to emphasize the human dimension so often forgotten among the technical and economic factors in job design. Treating workers as if they were elements or cogs in the production process is not only an affront to the dignity of human life, but is also a serious underestimation of the human capabilities needed to operate more advanced technologies. When tasks demand high levels of vigilence, technical problem-solving skills, self initiated behavior, and social and communication skills. it is imperative that our concepts of man be of requisite complexity. Our aim is not just to protect the worker's life and health but to give them an informal interest in their job and opportunity to express their views and exercise control over everything that affects their working life. Certainly, so far as his work is concerned, a man must feel better protected but he must also have a greater feeling of freedom and responsibility. Something parallel but wholly different if happening in Europe, industrial democracy. What has happened in Europe has been discrete, fixed, finalized, and legalized. Those developing centuries driving toward industrialization like R.O.K, shall have to bear in mind the human complexity in processing and designing the work and its environment. Increasing attention is needed to the contradiction between autocratic rule at the workplace and democratic rights in society.n society.

  • PDF

Accessibility Information Element & a PNC Selection Method in the High Rate WPAN (WPAN에서 통신가능성 정보 요소와 PNC 선택 방법)

  • Jeong, Heon-Ju;Cho, Moo-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.639-647
    • /
    • 2005
  • When a DEV associates with an existing WPAN, the PNC checks the capabilities of the new DEV to see if it is more capable to be the PNC of the piconet based on the criteria defined in the IEEE Std 802.15. If the new DEV is more capable and the current security policies allow it, then the PNC has the option of handing over control of the piconet to the DEV that has just joined. And, If the PNC is shutting down or wants to leave the WPAN, it also uses the handover process to give control to another DEV in the piconet. However, IEEE 802.15.3 checks only DEV capability information for more PNC capable. For PNC selection, it should consider the radio coverage of new PNC capable DEVs. So, we propose the method of PNC selection with accessibility check. This method manages PNC candidate list in the current piconet. In this paper, we analyze accessibility problems for PNC selection in section 2. In section 3, we explain CI(Configuration Inquiry) process which is proposed by Sony Corporation and propose PCI(PNC Candidate Inquiry) process. Also, we perform numerical analysis to compare PCI process with CI process in section 4. Finally, we conclude in section 5.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

Overview of Legal Measures for Managing Workplace COVID-19 Infection Risk in Several Asia-Pacific Countries

  • Derek, Miller;Tsai, Feng-Jen;Kim, Jiwon;Tejamaya, Mila;Putri, Vilandi;Muto, Go;Reginald, Alex;Phanprasit, Wantanee;Granadillos, Nelia;Farid, Marina Bt Zainal;Capule, Carmela Q.;Lin, Yu-Wen;Park, Jihoon;Chen, Ruey-Yu;Lee, Kyong Hui;Park, Jeongim;Hashimoto, Haruo;Yoon, Chungsik;Padungtod, Chantana;Park, Dong-Uk
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.530-535
    • /
    • 2021
  • Background: Despite the lack of official COVID-19 statistics, various workplaces and occupations have been at the center of COVID-19 outbreaks. We aimed to compare legal measures and governance established for managing COVID-19 infection risks at workplaces in nine Asia and Pacific countries and to recommend key administrative measures. Methods: We collected information on legal measures and governance from both general citizens and workers regarding infection risks such as COVID-19 from industrial hygiene professionals in nine countries (Indonesia, India, Japan, Malaysia, New Zealand, Republic of the Philippines, Republic of Korea, Taiwan, and Thailand) using a structured questionnaire. Results: A governmental body overseeing public health and welfare was in charge of containing the spread and occurrence of infectious diseases under an infectious disease control and prevention act or another special act, although the name of the pertinent organizations and legislation vary among countries. Unlike in the case of other traditional hazards, there have been no specific articles or clauses describing the means of mitigating virus risk in the workplace that are legally required of employers, making it difficult to define the responsibilities of the employer. Each country maintains own legal systems regarding access to the duration, administration, and financing of paid sick leave. Many workers may not have access to paid sick leave even if it is legally guaranteed.

An Analysis on Limited Warfare through the Falkland Islands Dispute (포클랜드제도 분쟁을 통한 제한전 분석)

  • Yang, Seong-sil;Lee, Hee-wan;Shin, Jin
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.211-235
    • /
    • 2021
  • As a result of the Falkland Islands War from April 2 to June 14, 1982, Britain overcame severe economic depression and reclaimed the glory of the former British Empire by winning the war. On the other hand, Argentina was greatly affected by the collapse of a military dictatorship and the birth of a democratic government. This study suggests strategies for responding to maritime disputes that may occur in Dokdo Island in the future by applying "DIME on PMESII" to the Falkland Islands dispute. In particular, the study analyzes how DIME (diplomacy, information, military, and economy) capabilities have an effect as a means of the total national power of a country that effectively controls the disputed territory. Based on the results of this study, the response strategies related to the Dokdo maritime dispute are as follows. First, effective control over the disputed territory should be effectively maintained and strengthened like in Britain. This strategy inspires patriotism, supports the government during warfare, secures a just cause for war, and gains international support. Second, 'DIME on PMESII' was effective in modern warfare by focusing our DIME capabilities on the weaknesses of the other country's PMESII system. That is, wars are not won simply by the conflict of armed forces but by a nation's overall national strength, such as diplomatic, information, and economic capabilities. Third, appropriate strategies for neighboring countries are needed to overcome the possibility of limited warfare in the sea through preparations for Dokdo maritime disputes in the future.

  • PDF

Five-stage Anger Model Approach to Narrative and Protagonist's Revolt Action Mechanism in the Movie, "The Man Standing Next" ('분노의 5단계 모델'관점의 영화 <남산의 부장들> 서사와 주인공의 거사 결행 기제)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.3
    • /
    • pp.285-294
    • /
    • 2020
  • "The Man Standing Next" was a 'anger-character movie' that shows a fierce psychological game between the characters. Inspired by this point, it was analyzed the narrative structure of this film based on scene unit applying the 'Five-stage Anger Model' formulated by Lakoff and Kövecses and others. The results showed that the causality and feasibility of the protagonist's anger behavior were highly reflected above the model. In particular, among the five steps, the film-maker spent the longest time on 'anger control' justifying the hero's motivation for punishment or retaliation, while giving the shortest time to 'loss of control' to maximize the urgentness of the punitive actions. The detonator causing his anger at each stage was disposed two to six times each stage with neglect, contempt, arrogance, ostentation, mockery, unauthorized intervention, etc. Sneering of "Chief Security Officer" and insulting of "The President" make the protagonist feel the scorn of a terrible friend-murderer each functioned as a "rage trigger." In conclusion, the film follows the above sophisticated model in its narrative structure. Though it was a political drama that sets up a lot of anger scheme caused from public reasons, it reflects ordinary people's routine anger, which corresponds to 24 percent of the list of Nobaco's Provocation Inventory (PI). The producers elaborately reflected the anger procedure theory and balanced the public and private drivers of rage. It was considered to be derived from the intention to enhance communication with the audience increasing their understanding and aspiration for political movie that are usually heavy and unfamiliar.