• Title/Summary/Keyword: Step-In Rights

Search Result 43, Processing Time 0.036 seconds

Experimental Study on the Determination of Slope and Height of Curbs Considering the VRUs (교통약자를 고려한 보도의 경사도와 높이 결정을 위한 실험연구)

  • Kim, Hyunjin;Lim, Joonbeom;Choe, Byongho;Oh, Cheol;Kang, Inhyeng
    • International Journal of Highway Engineering
    • /
    • v.20 no.1
    • /
    • pp.107-115
    • /
    • 2018
  • PURPOSES : As the population of the mobility handicapped, who are classified as the disabled, the elderly, pregnant women, children, etc., has increased, the voices for guaranteeing their rights have been increasing as well. Thus, the design manuals for roads and sidewalks for the mobility handicapped were developed by the local government, such as the Ministry of Land, Transport, and Tourism, in Seoul City. However, according to the 2013 survey results of the Seoul Metropolitan City, the mobility handicapped still feel uncomfortable with the sidewalks, and particularly request for the improvement of the step and slope of the sidewalk curb. Therefore, in this study, we conducted an empirical experimental study to determine the slope of the sidewalk curb and height of the steps considering the mobility handicapped and analyzed whether there is a statistically significant difference. METHODS : The methodology of this study is an empirical experimental one. In the study, five non-disabled people, 10 wheelchair users, and 10 eye patch and stick users walked about 2-3 min on the sidewalk plates of the sloped type (0%, 5%, 6.3%, 8.3%) and stepped type (0 cm, 1 cm, 3 cm, 6 cm), and their human physiological responses, such as the skin temperature, volume of perspiration on forehead and chest, and heart rate, were measured and recorded. After combining the data, we conducted a nonparametric test, ANOVA, or t-test to determine whether there was a statistically significant difference according to each slope and step type. RESULTS : It was found that for the non-disabled, there was no significant difference in human physiological responses according to the slope and steps of the sidewalk. It can be said that the non-disabled do not feel much physiological discomfort while walking. In the case of the sloped sidewalk plate, the heart rate of the wheel chair users increased when the slope was 6.3%. In the case of the eye patch and stick users, the volume of perspiration on the chest increased at a slope of 5.0%. In general, it is judged that a sidewalk with a slope that is less than 5% does not cause a change in the physiological response. In the case of a stepped sidewalk plate, when 0 cm, 1 cm, and 3 cm were compared for wheelchair users, the amount of forehead perspiration increased from 1 cm. Meanwhile, in the case of the eye patch and stick users, when 0 cm and 6 cm were compared, the amount of perspiration on the forehead and chest as well as the heart rate all increased at 6 cm. Taken together, in the case of wheelchair users, a difference was shown when the height of the step of the sidewalk plate was 1 cm, suggesting that installing it at 0 cm does not cause any physiological discomfort. Moreover, in the case of the eye patch and stick users, when comparing only 0 cm and 6 cm, 0 cm was considered to be suitable, as there was a difference in physiological response at 6 cm. CONCLUSIONS : In this study, we set the human physiological responses such as chest skin temperature, amount of perspiration, and heart rate as evaluation items, and our study was considered to be a meaningful experiment that targeted wheelchair users as well as eye patch and stick users. The validity of the evaluation items was confirmed, as the results of human physiological responses were significant. As for the sidewalk design, according to the experiment result, it is considered that differential application should be implemented according to the type of mobility handicap, rather than uniformly applying a sidewalk step of 2 cm and sidewalk slope of 1/25, which are the current legal standards.

A Study on the Legal Liabilities of Contractor as a Delay in the Product Delivery on the Offshore Plant Construction Contract (해양플랜트공사계약상 제조물인도지연에 따른 당사자의 법적 책임에 관한 고찰)

  • Jin, Ho-Hyun
    • MARITIME LAW REVIEW
    • /
    • v.29 no.2
    • /
    • pp.115-144
    • /
    • 2017
  • The impact of the global financial crisis, which began in the United States in 2007, had a major impact on the domestic shipping and shipbuilding industries. In this regard, the domestic shipyard has established an order-taking strategy in several ways as an alternative to lowering the amount of construction of commercial vessels due to deterioration of the shipping industry, and selected industrial sector was the offshore plant sector. However, the domestic shipyard has under performed the offshore plant in order to just increase sales and secure work without any risk analysis for EPC contracts. As a result, the shipyard has been charged more than the initial contract price with the offshore plant contractor, or the shipyard has become a legal issue requiring payment of liquidated damages due to delays in delivery of the product. The main legal disputes are caused by the thorough risk analysis and the inexperience of process control that can occur during offshore plant construction. and In particular, there is no sufficient review of the unequivocal provisions in the contract as an element of risk management. There is no human resource to review these contractual clauses. Therefore, this study identifies the existence of specific risks that could lead to delays in offshore plant construction, and examined the existence of any unequivocal clauses in contracts for offshore plant construction. and also discussed how the toxic clause applies to the actual parties and how the concrete risk factors in the construction contracts are transferred and expressed by referring to the interviews with the project manager of the domestic shipyard and the previous research. As a result, This paper examined the legal liability of the contracting parties regarding delayed delivery of the products due to the offshore plant construction contract. And to improve the domestic shipbuilding industry.

Employment Adjustment in the British Shipbuilding Industry(1860~1945) - Focusing on the Case of the Boilermakers' Society (영국 조선산업의 고용조정(1860~1945): 보일러제조공조합을 중심으로)

  • Shin, Wonchul
    • Korean Journal of Labor Studies
    • /
    • v.24 no.2
    • /
    • pp.321-365
    • /
    • 2018
  • Though the British shipbuilding industry dominated the world market in the 19th century, it could not avoid the repetitive rise and fall of the unemployment following after the cyclical fluctuations. Without challenging the employers' rights to fire at will, the boilermakers maintained their own unemployment insurance in order to escape from the new poverty law system. In the beginning the craft union could continue their own unemployment insurance under the National Insurance Act of 1911, but it went into bankruptcy under the massive unemployment of the 1920s and the attacks of shipyard employers. The Act of 1911 was a step towards social solidarity in that it spread the risks beyond the occupational boundaries, applying unemployment insurance to unskilled and non-union workers, and the employer and the government also paid the premium. In the Great Depression, the shipyard trade unions demanded that the government should intervene in the shipbuilding market to provide jobs, but it was not accepted by the government. The government responded only to the another demand of the union for the maintenance, which could be achieved partially through the abnormal operation of the insurance system, abandoning the insurance principle. After all, unemployment in the shipbuilding industry was resolved only by the expansion of rearmaments and the outbreak of World War II. From the 19th century to the World War II, the craft unions did not challenge the employers' right to fire at will and did not attempt to regulate dismissal procedures or make any demands on dismissal compensations. During interwar periods rules and practices related with weak employment protection - one of the main features of the liberal employment adjustment institution - were prevalent in Britain. The principle of 'employment at will' could survive through the historical events such as the World War I, II as the operation of the unemployment insurance became the focus of the social conflicts.

Framework for Technology Valuation of Early Stage Technologies (초기단계 기술의 가치평가 방법론 적용 프레임워크)

  • Park, Hyun-Woo;Lee, Jong-Taik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.242-261
    • /
    • 2012
  • Early stages of technology valuation have been often overlooked or under-represented. The early stage technologies are even riskier due to their inadequacy of commercial development and market applicability. More than 95% of patents fail to earn any revenues so that the majority of patents were valueless. Technology transfers from laboratories at universities and research institutes to industrial firms have increased to acquire value from invented technologies. Technology transfer, a process of transferring discoveries and innovations resulted from research to commercial sectors, typically comprises several steps: disclosing the discoveries and innovations, i.e., intellectual property (IP), evaluating the IP's economic prospects, securing a patent, copyright or trademark for the IP, commercializing the technology through licensing, forming a joint venture, or selling. At each of those stages in the research and development of technology, the value of technology would play a very important role of making decision on the movement toward the next step, however, the financial value of technology is not easy to determine due to a great amount of uncertainty in the course of research and development, and commercialization. This paper refers to technology embodied as devices, equipment, software or processes primarily developed at public research institutions such as universities. Sometimes it is also as the result of externally financed projects contracted with industry. Nearly always technology developed at public research entities results in laboratory prototypes. When it is required to define the technology transfer contract terms for the license of the university patrimonial rights to external funding companies or other interested parties, a question arises: what is the monetary value? In this paper, we present a method for technology valuation based on the identification of specific value points related to its development. The final technology value must be within previously defined value limits. This paper consists of the review of issues related to technology transfer and commercialization, the identification of characteristics of technologies in the early stage of technology development, the formulation of framework of methods to value the early stage technologies, and the conclusion and implication of the previous review.

  • PDF

Development of Evaluation Index and Multi-layer Evaluation System for Quality Management of Elderly Long-term Care Institution (노인장기요양기관(시설급여) 평가의 품질관리를 위한 평가지표 개발 및 다층평가시스템 방안)

  • Lee, Sang-Jin;Kim, Yun-Jeong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.11
    • /
    • pp.1015-1026
    • /
    • 2019
  • The purpose of this study is to develop evaluation indexes for improving the quality of long-term care institutions (facility salary) evaluation in the sense that the applicability and effectiveness of previous studies related to the development of evaluation indexes for long-term care facilities for elderly are insufficient. There was this. To this end, an analytical review of the 2018 long-term care institution (accommodation benefit) evaluation index, an analysis of Japan's elderly long-term care home evaluation index, and the elderly long-term care facility workers in Korea and the special care home for the elderly in Japan FGI on evaluation indicators and evaluation system was conducted. Based on the results of the research, evaluation indicators were developed in terms of supporting users to receive high quality services. The characteristics of the elderly, that is, the characteristics of elderly diseases that are difficult to maintain and improve, the direction and transparency of institutional operation, and the need for terminal care were reflected. Forty-three evaluation indicators were presented, covering institutional operations, environment and safety, beneficiary rights protection, payroll process, and payroll results. In addition, we proposed a four-step multi-level evaluation system that can improve the efficiency of the evaluation process by improving the redundant and unnecessary evaluation process.

A Key Management Scheme without Re-encryption for Home-domain Contents Distribution in Open IPTV Environments (Open IPTV 환경에서 재암호화 과정 없는 댁내 컨텐츠 분배를 위한 키관리 기법)

  • Jung, Seo-Hyun;Roh, Hyo-Sun;Lee, Hyun-Woo;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.57-66
    • /
    • 2010
  • Due to the advancement of IPTV technologies, open IPTV services are a step closer to becoming reality. In such service environment, users are able to enjoy IPTV services using a variety of devices available at their home domain. However, it is impossible to get such flexible services at their convenience unless each of devices is individually connected to Set-Top-Box (STB) because of Conditional Access System (CAS) or service providers otherwise allow STB to freely distribute decoded contents to every user devices attached to STB. In this paper, we propose a key management scheme for securely distributing contents from STB to multiple user devices at home domain. The proposed scheme also makes the service providers be able to control the access rights to each of user devices without installing individual STBs. It is achieved by computationally dividing a private key of RSA signature scheme into three parts and thus makes possible to distribute the contents scrambled through a underlying CAS mechanism without re-encrypting them that the existing scheme should employ. It improves significantly computation and communication complexities, maintaining it as secure as the existing schemes. Additionally, it prevents misbehaving users from illegally distributing the contents from STB to their devices available at home domain.

Blood Collection Workload and Safety of Medical Technologists at Korean Hospitals (한국 의료기관에서 임상병리사의 채혈 업무 현황과 안전 실태 조사)

  • Sung-Bae PARK;Suk JEKAL;Weon Joo HWANG;Do Wang LEE;Choong Won SEO;Sunghyun KIM
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.3
    • /
    • pp.159-166
    • /
    • 2023
  • This study investigates the current situation of medical technologists for blood collection, which is considered the most important step for diagnosis. The survey enrolled 650 medical technologists working in hospitals and medical check centers in Busan, Ulsan, and Gyeongnam. We found that each medical technologist performed blood collection for about 100 patients. There was more than one blood collection failure per day, with more than one case of pain and filing of civil complaints per year. Hence, there was a high work burden on the medical technologists. Cases where a medical technologist was stabbed with a used needle occurred more than once a year, and about 15% of them received infection control and treatment because of stab wounds. Additionally, more than half of the participants suffered from musculoskeletal disorders and mental stress due to blood collection work. Unlike administering intravenous and intramuscular injections using the same needle, no fee is charged for blood collection. Based on the results of this study, it will be possible to improve the safety and rights of medical technologists by calculating the actual fee for blood collection work and assigning a relative value score.

Understanding the Access and Benefit-Sharing of Genetic Resources for Environmental Ecology Researchers (나고야의정서 이행에 따른 ABS 체계의 이해와 환경생태분야 연구자의 대응방안)

  • Lee, Jonghyun;An, Minho;Chang, YounHyo
    • Korean Journal of Environment and Ecology
    • /
    • v.35 no.4
    • /
    • pp.336-346
    • /
    • 2021
  • The enforcement of the Nagoya Protocol, which regulates the acquisition and use of genetic sources, an essential material for biotechnology R&D, has imposed a burden for additional documentation works to researchers. In the past, countries regarded genetic resources as a common human heritage and thus allowed researchers to use them freely. However, they can no longer afford the luxury of such freedom now since many countries are introducing new laws and regulations on the acquisition and use of the resources as the Nagoya Protocol recognizes the exclusive ownership of genetic resources. Therefore, Korea, which is highly dependent on foreign genetic resources, needs a more systematic response. This paper aims to review the key contents of the Nagoya Protocol to raise awareness among domestic and foreign genetic resource users, including researchers of environment and ecology and present the overall structure, and flow of acquisition, access, and benefit sharing (ABS) for the use of foreign genetic resources to help them respond appropriately to the new landscape. The researchers' efforts and support at the national level are necessary at the same time to appropriately respond to the Nagoya Protocol. First, the researchers must understand the overall framework and the specific response in each stage under the Nagoya Protocol scheme. It is necessary to respond to the ABS procedure of the resource provider country from accessing genetic resources to sharing benefits resulting from it. In that regard, the Nagoya Protocol has imposed more restrictions on research activities and raised the burden outside of research. The current trend of recognizing the country's sovereign rights over genetic resources is likely to continue and widespread worldwide as resource-rich countries are expected to continue protecting their resources. Therefore, our study will help environmental ecology researchers understand ABS and conduct research under the Nagoya Protocol and legal obligations of resource provider countries step by step, from access to benefit sharing.

A Study on the Restructuration of Norm System in the Field of ICT for the Smart Media (Smart미디어시대 정보통신·미디어(ICT) 분야 규범체계의 재구조화에 관한 연구)

  • Ji, Seong-Woo
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.33-62
    • /
    • 2013
  • In this paper, the consolidation of ICT basic legislation and ICT special legislation concerning "Ministry of Science, ICT and Future Planning" and "Korea Communications Commission" which came on the back of governmental reorganization in recent years is discussed in the theoretical and practical aspect. Development of "data communication technology" innovatively changed the method of livelihood of mankind, the emergence of network under global dimension provided financial social benefit and posed a challenge and a threat at the same time. Form digital revolution human kind can expect to receive many important blessings. Nevertheless, there are many advantages of development of technology by digital revolution, cyberspace like online media, internet etc. has realistically many problems that must be solved. To maximum positive aspects like the expansion of freedom of expression and creating plan of economy by the advance of transmission technology is needed. And to minimize side effects of informatization is required more. The First, Special Act on ICT has an adaptation in normative standardization to be fit in media convergence beyond convergence of broadcasting and telecommunications. Henceforth, there must be established a legal basis for the achievement of protection of economic evolution and freedom of speech in digital media, information, communication technology and content development. The second, the government action is to accomplish economic development and freedom of information in structural aspect of norm. Therefore minimizing normative problem by reorganization of organization remains clearly unresolved in politics. The third, Special Act on ICT must be basic law covering info-communications field, pay telecommunication and media contents field. The forth, from a technical point of view, net neutrality, conflict of interest for digital content and so on can be fixed easily. Special Act on ICT must not only pursuit of development of industry. Special Act on ICT and pursuit of enhancing quality of life of people and preparing program to promote democratization. From now on, we need to make powerful nation of information& communications technology and in information human rights protection field got to be one step ahead of others with reference to appear all the various aspects must be brought together in the discussion of legislation process of Special Act on ICT.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF