• Title/Summary/Keyword: Security Management

Search Result 5,367, Processing Time 0.037 seconds

A Study on The Enhancement of Aviation Safety in Airport Planning & Construction from a Legal Perspective (공항개발계획과 사업에서의 항공안전성 제고에 대한 법률적 소고)

  • Kim, Tae-Han
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.67-106
    • /
    • 2012
  • Today air traffic at the airport is complicated including a significant increase in the volume of air transport, so aviation accidents are constantly occurring. Therefore, we should newly recognize importance of the Air Traffic Safety, the core values of the Air Traffic. The location of airport that is the basic infrastructure of the air traffic and the security of safety for facilities and equipments are more important than what you can. From this dimension, I analyze the step-by-step safety factors that are taken into account in the airport development projects from the construction or improvement of the airport within the current laws and institutions and give my opinion on the enhancement of safety in the design and construction of airport. The safety of air traffic, as well as airport, depends on location, development, design, construction, inspection and management of the airport including airport facilities because we have to carry out the national responsibility that prevents the risk of large social overhead capital for many and unspecified persons in modern society through legislation regarding intervention of specialists and locational criteria for aviation safety from the planning stage of airport development. In addition, well-defined installation standards of airports and air navigation facilities, the key points of the airport development phase, can ensure the safety of the airport and airport facilities. Of course, the installation standards of airport and air navigation facilities are based on the global standard due to the nature of air traffic. However, to prevent the chaos for the safety standards in design, construction, inspection of them and to ensure the aviation safety, the safety standards must be further subdivided in the course of domestic legislation. The criteria for installation of the Air Navigation facilities is regulated most specifically. However, to ensure the safety of the operation for Air Navigation Facilities, performance system proved suitable for the Safety of Air Navigation Facilities must change over from arbitrary restrictions to mandatory restrictions and be applied for foreign producers as well as domestic producers. Of course, negligence of pilots and defective aircraft maintenance lead to a large portion of the aviation accidents. However, I think that air traffic accidents can be reduced if the airport or airport facility is perfect enough to ensure the safety. Therefore, legal and institutional supplement to prioritize the aviation safety from the stage of airport development may be necessary.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on Actual Conditions of Preschool Education for Activation of Public Education (공교육 활성화를 위한 유아교육 현황 분석)

  • Jeong, Kyoung Hwa;Kwon, Eun Joo
    • Korean Journal of Childcare and Education
    • /
    • v.2 no.1
    • /
    • pp.65-88
    • /
    • 2006
  • This study intended to activate public education, researched and analyzed real conditions of preschool education to know desirable directions of public education and help parents recognize public education. The final purpose is to offer basic materials to reestablish preschool education in the public education system. First, parents' recognition concerning preschool education in the public education system was much different from that of teachers. As for definitions of preschool education as a public education, parents understood that it means 'the nation and self-governing bodies manage aid both the public and private kindergartens', and teachers recognized that it means that 'the nation and self-governing bodies not only found operate public kindergartens but also aid manage educational funds of private kindergartens. Second, the examination of educational environments of kindergartens told that teachers and parents thought that opportunity to enter the kindergarten is not equal for all children in our country, and quality of kindergarten teachers is satisfactory. Also, they thought that curriculums of preschool educational organs have been set well according to children's developmental stages, education quality is different according to preschool education organs' foundation-types. They recognized that facilities and apparatus of preschools are satisfactory, security and neatness of preschools are satisfactory, too. Third, the examination of developmental directions of preschool education as a public education proved following facts; as for foundation-types of kindergartens in the future when promoting preschool education as a public education, parents answered financial support and supervision by the government, teachers answered aid and management of operational fees as well as support for teacher personnel expenses.

  • PDF

A Study on Awareness of the Dental Health Insurance Coverage (치과 건강보험에 관한 인식 조사)

  • Han, Ji-Hyoung;Kim, Yoon-Sin
    • Journal of dental hygiene science
    • /
    • v.8 no.2
    • /
    • pp.65-71
    • /
    • 2008
  • The purpose of this study was to examine people's awareness of health insurance in a bid to help improve the management of dental health insurance coverage. The subjects in this study were 1,036 people who included experts in that field and medical consumers. The findings of the study were as follows: 1. In regard to the demographic characteristics of the expert group including gender and age, the female experts outnumbered the males, as the former accounted for 84.7 percent. And the experts in their 20s made up the largest age group, followed by the 30-39 age group and those in their 40s. As to the demographic characteristics of the medical consumers, the rates of the men and women stood at 49.8 percent and 50.2 percent respectively, which were similar. By age, the largest number of the medical consumers were in their 20s, followed by in their 30s and in their 40s. 2. Concerning opinions on the procurement of finance for health insurance, many respondents in both groups agreed that the health insurance coverage should be enlarged by securing more finance, and that items involved in the coverage should be prioritized again. Regarding a means of securing financial resources, the experts placed the most emphasis on extended budgetary support from the government, followed by establishing a social security system and budget compilation by local governments. The medical consumers attached the most importance to extended budgetary backing from the government, followed by budget compilation by local governments and determining contribution according to income level. 3. As for general view of the dental health insurance, the experts believed that the amounts of copayment and self-payment by the insured were appropriate(2.47), and they found the number of benefitted items to be proper(2.29) as well. The medical consumers thought that the benefit percentage of the dental health insurance in the overall health insurance budget was appropriate(2.26), and they also considered the number of benefitted items adequate(2.16). But this group didn't give a lot of marks to the appropriateness of those things. 4. As to perception about the dental health insurance, both groups took a similar view of it. Specifically, they felt the strong need for a dental health insurance system. In terms of satisfaction level, both groups were dissatisfied with it, and there was a strong tendency for them to be discontented with the health insurance coverage.

  • PDF

Resolution Method of Hazard Factor for Life Safety in Rental Housing Complex (임대주택단지의 생활안전 위해요인 해소방안)

  • Sohn, Jeong-Rak;Cho, Gun-Hee;Kim, Jin-Won;Song, Sang-Hoon
    • Land and Housing Review
    • /
    • v.8 no.1
    • /
    • pp.1-11
    • /
    • 2017
  • The government has been constructing and supplying public rental housing to ordinary people in order to stabilize housing since 1989. However, the public rental houses initially supplied to ordinary people are at high risk for safety accidents due to the deterioration of the facilities. Therefore, this study is aimed to propose a solution to solve the life safety hazards of the old rental housing complex as a follow-up study of Analysis of Accident Patterns and Hazard Factor for Life Safety in Rental Housing Complex. Types of life safety accidents that occur in public rental housing complexes are sliding, falling, crash, falling objects, breakage, fire accidents, traffic accidents and criminal accidents. The types of safety accidents that occur in rental housing complexes analyzed in this study are sliding, crashes, falling objects, and fire accidents. Although the incidence of safety accidents such as falling, breakage, traffic accidents and crime accidents in public rental housing complexes is low, these types are likely to cause safety accidents. The method of this study utilized interviews and seminar results, and it suggested ways to solve the life safety hazards in rental housing complexes. Interviews were conducted with residents and managers of rental housing complexes. Seminars were conducted twice with experts in construction, maintenance, asset management, housing welfare and safety. Through interviews and seminars, this study categorizes the life safety hazards that occur in rental housing complexes by types of accidents and suggests ways to resolve them as follows. (1) sliding ; use of flooring materials with high friction coefficient, installation of safety devices such as safety handles, implementation of maintenance, safety inspections and safety education, etc. (2) falling ; supplementation of safety facilities, Improvement of the design method of the falling parts, Safety education, etc. (3) crash ; increase the effective width of the elevator door, increase the effective width of the lamp, improve the lamp type (U type ${\rightarrow}$ I type), etc. (4) falling objects and breakage ; design of furniture considering the usability of residents, replacement of old facilities, enhancement of safety consciousness of residents, safety education, etc. (5) fire accidents ; installation of fire safety equipment, improvement by emergency evacuation, safety inspection and safety education, etc. (6) traffic accidents ; securing parking spaces, installing safety facilities, conducting safety education, etc. (7) criminal accidents; improvement of CCTV pixels, installation of street lights, removal of blind spots in the complex, securing of security, etc. The roles of suppliers, administrators and users of public rental housing proposed in this study are summarized as follows. Suppliers of rental housing should take into consideration the risk factors that may arise not only in the design and construction but also in the maintenance phase and should consider the possibility of easily repairing old facilities considering the life cycle of rental housing. Next, Administrators of rental housing should consider the safety of the users of the rental housing, conduct safety checks from time to time, and immediately remove any hazardous elements within the apartment complex. Finally, the users of the rental housing needs to form a sense of ownership of all the facilities in the rental housing complex, and efforts should be made not to cause safety accidents caused by the user's carelessness. The results of this study can provide the necessary information to enable residents of rental housing complexes to live a safe and comfortable residential life. It is also expected that this information will be used to reduce the incidence of safety accidents in rental housing complexes.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF

Volume Rendering System of e-Science Electron Microscopy using Grid (Gird를 이용한 e-사이언스 전자현미경 볼륨 랜더링 시스템)

  • Jeong, Won-Gu;Jeong, Jong-Man;Lee, Ho;Choe, Sang-Su;Ahn, Young-heon;Hur, Man-Hoi;Kim, Jay;Kim, Eunsung;Jung, Im Y.;Yeom, Heon Y.;Cho, Kum Won;Kweon, Hee-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.560-564
    • /
    • 2007
  • Korea Basic Science Institute(KBSI) has three general electron microscopes including High Voltage Electron Microscope(HVEM) which is the only one in Korea. Observed images through an electron microscope are what they are tilted by each step and saved, offering the more better circumstances for observers, a reconstruction to 3D could be a essential process. In this process, a warping method decreases distortions maximumly of avoided parts of a camera's focus. All these image treatment processes and 3D reconstruction processes are based on an accompaniment of a highly efficient computer, a number of Grid Node Personal computers share this process in a short time and dispose of it. Grid Node Personal computers' purpose is to make an owner can share different each other and various computing resources efficiently and also Grid Node Personal computers is applying to solve problems like a role scheduling needed for a constructing system, a resource management, a security, a capacity measurement, a condition monitoring and so on. Grid Node Personal computers accomplish roles of a highly efficient computer that general individuals felt hard to use, moreover, a image treatment using the warping method becomes a foundation for reconstructing to more closer shape with an real object of observation. Construction of the electron microscope volume 랜더링 system based on Grid Node Personal computer through the warping process can offer more convenient and speedy experiment circumstances to observers, and makes them meet with experiment outcome that is similar to real shapes and is easy to understand.

  • PDF

Study on the Legal Issues of New Draft of Civil Aviation Law in China (중국 민용항공법 개정 최근 동향과 주요 법적쟁점)

  • Lee, Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.2
    • /
    • pp.177-214
    • /
    • 2016
  • During more than 20 years of practice, Civil Aviation Law has experienced three times of amendments since it was enacted in 1995. But these revisions are limited to the technical level. The problems and limitations have become increasingly prominent in its implementation. Firstly, the civil aviation law is the result of interests game among several departments and some legal issues was left behind and the regulation was very vague as a result. Secondly, the process of aviation legislation is the process that the country has undergone profound changes and social transformation. The 20 years is long enough for the society to undergo tremendous changes and 1995 version of civil aviation law does not keep pace of development of economy. There was a serious lag between reality and the law. In order to actively promote the development of the aviation industry and overcome implementation issues of the Civil Aviation Law, Civil Aviation Administration of China (CAAC) initiated modification procedure the law and published new draft of Civil Aviation Law in August 2016. The spirit of this modification is to learn and absorb new achievements of domestic and foreign legislation and the International Convention on civil aviation. Furthermore, the purpose of the revision is to provide favorable policy for the development of civil aviation industry and improve aviation safety and supervision, strengthen and protection of consumer rights and interests, to enhance the safety of civil aviation activities, and promote the development of general aviation. This revision concerned to the 78 articles which are revised or deleted and 24 articles added. The highlights of the draft include but not limited to the enhancement of security management, clarification of the main responsibility for production safety. And also it added the provisions related to the construction of effective tracking capability of public air transport enterprises and license system on the transport of dangerous goods. Compared with the existing civil aviation law, the draft has made a great improvements. But there are several deficiencies and limitations in the drafts. These problems need to be supplemented and perfected through further amendments in near future.

Strategy and Basic Planning for Creating an Urban Agricultural Park -Focusing on Gosangol Village in Daegu City- (도시농업공원 조성을 위한 전략 및 기본계획 연구 - 대구광역시 고산골마을을 대상으로 -)

  • Lee, Jong-Il;Kwon, Jin-Wook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.4
    • /
    • pp.23-34
    • /
    • 2017
  • This study focused on a planned site located in Gosangol Village in Daegu Metropolitan City that aims to build an urban agricultural park combining urban agriculture and urban park for the sustainable realization of urban agriculture. Accordingly, this study has significance in two perspectives: firstly, suggesting development strategies to be considered when building an urban agricultural park as a theme park, and secondly, presenting guidelines for spatial programs and facilities to be introduced for actual applications. The results are as follows. Firstly, building an urban agricultural park fills a role as a local community space prompted by the demand-oriented evolution of urban parks, and agricultural behaviors to be incorporated in the theme. In this context, 'building an urban agricultural space focusing on sustainability', 'constructing green space systems focusing on agricultural landscape', and 'structuring leisure spaces for communications in the community' are presented as development strategies. Secondly, key functions that an urban agricultural park should have include production and trade of agricultural products on the production side, soil preservation, resource cycling and green space provision on the environmental side, leisure and experience, community vitalization, education, and social security on the social and cultural side, and entertainment functions, ecological functions, and protective functions as urban park functionality. Thirdly, key facilities needed when building an urban agricultural park include urban agricultural facilities other than park management facilities, landscape facilities, recreational facilities, sports facilities, educational facilities, and convenient facilities, and family gardens as the key facility of the urban agricultural park should be scaled in consideration of various purposes and behaviors of their use. This study has a limitation that the subject site was limited to a specific area but has significance in that it presented a planning model for the spatial structuring of park-type urban agriculture.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.