• Title/Summary/Keyword: THREAT

Search Result 2,855, Processing Time 0.031 seconds

Concept Mapping Analyzing on Counselors' Vicarious Trauma Experience from Working with Victims of Sexual Violence (성폭력 상담자 대리외상 경험에 대한 개념도 연구)

  • Heo, Chan-hee;Lee, Jee-yon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.457-471
    • /
    • 2020
  • The purpose of this study is to explore the in-depth content of vicarious trauma experience of sexual violence counselors and to develop intervention strategy. To this end, depth interviews were conducted with twelve sexual violence counselors working at the sexual violence counseling site for more than three years. In addition, using the concept mapping method, the content exploration of the experience of vicarious trauma of sexual violence counselors was confirmed, and its conceptual structure was identified. As a result, 60 key sentences regarding the experience of vicarious trauma of sexual violence counselors were extracted. Then, multi-dimensional scale and cluster analysis were conducted after making nineteen appraisal participants who are under the same condition as depth interview participants to categorize and assess key sentences. As a result of analysis, the x-axis of negative perception, psychological and emotional dimension, and the y-axis of personal inner and behavioral dimension appeared, and five clusters emerged: immersion and skepticism about work, experience of emotional assimilation, hypersensitivity to sex, increased vigilance against men, and threat of safety. This provided basic data that could categorize and identify the contents of vicarious trauma of sexual violence counselors experience by sexual violence counselors.

Development of Geopolymer Mortar Based on Fly Ash (플라이애시 기반 지오폴리머 모르타르 개발)

  • Koh, Kyung-Taek;Ryu, Gum-Sung;Lee, Jang-Hwa
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.6 no.4
    • /
    • pp.119-126
    • /
    • 2012
  • Portland cement production-1.5billion tonnes yearly worldwide-contributes substantially to global atmospheric pollution(7% of total of $CO_2$ emissions). Attempts to increase the utilization of fly ash, by-products from thermal power plant to partially replace the cement in concrete are gathering momentum. But most of fly ash is currently dumped in landfills, thus creating a threat to the environment. Many researches on alkali-activated concrete that does not need the presence of cement as a binder have been carried out recently. Instead, the sources of material such as fly ash, that are rich in Silicon(Si) and Aluminium(Al), are activated by alkaline liquids to produce the binder. Hence concrete with no cement is effect reduction of $CO_2$ gas. In this study, we investigated the influence of the compressive strength of mortar on alkaline activator and curing condition in oder to develop cementless fly ash based alkali-activated concrete. In view of the results, we found out that it was possible for us to make alkali-activated mortar with 70MPa at the age of 28days by using alkaline activator manufactured as 1:1 the mass ratio of 9M NaOH and sodium silicate and applying the atmospheric curing after high temperature at $60^{\circ}C$ for 48hours.

  • PDF

A Study on Entrepreneurship, Competitiveness of SWOT, and Performance in Hidden Champion Firm (히든챔피언기업의 기업가정신, SWOT요인의 경쟁(대응)능력, 성과간의 관계에 관한 연구)

  • Lee, Sang Suk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.2
    • /
    • pp.21-33
    • /
    • 2016
  • This paper aims to investigate the relations among the entrepreneurship, SWOT factors, and performance in Korean hidden champion firms. 112 potential Korean hidden champions were drawn at random from the hidden champion candidates of Export-Import Bank of Korea. For analyzing the relationship of them, the entrepreneurship factors categorized with organizational risk taking, innovativeness, and proactiveness from previous researches(Khandwalla, 1977; Miller, 1983; Miller & Friesen, 1978, 1982). Also, four SWOT factors classified into strength, weakness, opportunities, and threat by confirmatory factor analysis. As a result, we found some statistically significant effects between the SWOT factors and entrepreneurship factors, and they sequentially affects to performance. That is, as a presented with previous research, there is verified that entrepreneurship is caused by organizational risk taking, innovativeness, and proactiveness. Also, SWOT factors significantly affect to business performance. Some guidelines for practicing potential Korea hidden champions as a result of this would include; first of all, it is important to support the potential hidden champions consulting approach in global perspectives; secondly, effective governmental support programs for hidden champions should be developed for positive impacts of according to these results.

  • PDF

Opportunities for Agricultural Water Management Interventions in the Krishna Western Delta - A case from Andhra Pradesh, India

  • Kumar, K. Nirmal Ravi
    • Agribusiness and Information Management
    • /
    • v.9 no.1
    • /
    • pp.7-17
    • /
    • 2017
  • Agricultural water management has gained enormous attention in the developing world to alleviate poverty, reduce hunger and conserve ecosystems in small-scale production systems of resource-poor farmers. The story of food security in the $21^{st}$ century in India is likely t o be closely linked to the story of water security. Today, the water resource is under severe threat. The past experiences in India in general and in Andhra Pradesh in particular, indicated inappropriate management of irrigation has led to severe problems like excessive water depletion, reduction in water quality, water logging, salinization, marked reduction in the annual discharge of some of the rivers, lowering of ground water tables due to pumping at unsustainable rates, intrusion of salt water in some coastal areas etc. Considering the importance of irrigation water resource efficiency, Krishna Western Delta (KWD) of Andhra Pradesh was purposively selected for this in depth study, as the farming community in this area are severely affected due to severe soil salinity and water logging problems and hence, adoption of different water saving crop production technologies deserve special mention. It is quite disappointing that, canals, tube wells and filter points and other wells could not contribute much to the irrigated area in KWD. Due to less contribution from these sources, the net area irrigated also showed declining growth at a rate of -6.15 per cent. Regarding paddy production, both SRI and semi-dry cultivation technologies involves less irrigation cost (Rs. 2475.21/ha and Rs. 3248.15/ha respectively) when compared to transplanted technology (Rs. 4321.58/ha). The share of irrigation cost in Total Operational Cost (TOC) was highest for transplanted technology of paddy (11.06%) followed by semi-dry technology (10.85%) and SRI technology (6.21%). The increased yield and declined cost of cultivation of paddy in SRI and semi-dry production technologies respectively were mainly responsible for the low cost of production of paddy in SRI (Rs. 495.22/qtl) and semi-dry (Rs. 532.81/qtl) technologies over transplanted technology (Rs. 574.93/qtl). This clearly indicates that, by less water usage, paddy returns can be boosted by adopting SRI and semi-dry production technologies. Both the system-level and field-level interventions should be addressed to solve the issues/problems of water management. The enabling environment, institutional roles and functions and management instruments are posing favourable picture for executing the water management interventions in the State of Andhra Pradesh in general and in KWD in particular. This facilitates the farming community to harvest good crop per unit of water resource used in the production programme. To achieve better results, the Farmers' Organizations, Water Users Associations, Department of Irrigation etc., will have to aim at improving productivity per unit of water drop used and this must be supported through system-wide enhancement of water delivery systems and decision support tools to assist farmers in optimizing the allocation of limited water among crops, selection of crops based on farming situations, and adoption of appropriate alternative crops in drought years.

A Study on the Introduction of Business Continuity Management System for Ensuring Uninterrupted Service of Public Institution Based on a Bottom-up Method (공공기관이 재난으로부터 중단없는 대국민 서비스 확보를 위한 상향식 업무연속성관리체계 도입방안에 관한 연구)

  • Choi, Deok Jae;Yang, Seung Weon;Kim, Gi Won;Kim, Dae Jin;Jang, Hyun Min;Kim, Dong Heon;Eun, Min Gyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.87-91
    • /
    • 2016
  • In recent years, lots of damages appear frequently due to cyber terrorism and natural disasters such as typhoon 'Chaba', earthquake at Kyeongju. The damages lead to people's anxiety and public institutions connected directly with them also can't be free from the threat situation. In addition, public institutions must prepare business continuity issues with the highest priority in the event of disasters because they are closest with people's safety. However, preceding researches suggest needs of disaster mitigation activities management system or central office oriented top-down BCP establishing system. In this study, We grasp the current status of public institutions's business continuity plan(BCP) against disaster and we propose an efficient bottom-up method for structuring the BCP of public institutions.

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Analysis of research trends in methane emissions from rice paddies in Korea

  • Choi, Eun-Jung;Lee, Jae-Han;Jeong, Hyun-Cheol;Kim, Su-Hun;Lim, Ji-Sun;Lee, Dong-Kyu;Oh, Taek-Keun
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.4
    • /
    • pp.463-476
    • /
    • 2017
  • Climate change is considered as the greatest threat to our future and descendants. The Korean government has set a target for 2030 to reduce emission of greenhouse gases (GHGs) by 37% from the business-as-usual levels which are projected to reach 851 million metric tons of $CO_2eq$ (Carbon dioxide equivalent). In Korea, GHGs emission from agriculture account for almost 3.1% of the total of anthropogenic GHGs. The GHGs emitted from agricultural land are largely classified into three types: carbon dioxide ($CO_2$), methane ($CH_4$), and nitrous oxide ($N_2O$). In Korea, rice paddies are one of the largest agricultural $CH_4$ sources. In order to analyze domestic research trends related to $CH_4$ emission from rice paddies, 93 academic publications including peer reviewed journals, books, working papers, reports, etc., published from 1995 to September 2017, were critically reviewed. The results were classified according to the research purposes. $CH_4$ characteristics and assessment were found to account for approximately 65.9% of the research trends, development of $CH_4$ emission factors for 9.5%, $CH_4$ emission reduction technology for 14.8%, and $CH_4$ emission modeling for 6.3%, etc. A number of research related to $CH_4$ emission characteristics and assessment have been studied in recent years, whereas further study on $CH_4$ emission factors are required to determine an accurate country-specific GHG emission from rice paddies. Future research should be directed toward both studies for reducing the release of $CH_4$ from rice paddies to the atmosphere and the understanding of the major controlling factors affecting $CH_4$ emission.