• Title/Summary/Keyword: Technical Security

Search Result 957, Processing Time 0.03 seconds

Analysis on the Korean Women's Fear of Sexual Crime in Seoul Metropolitan Subway System (한국 여성의 지하철 내 성범죄두려움 분석)

  • Lee, Yoon-Ho;Seong, Yong-Eun;Yoo, Young-Jae;Jun, Eun-Joo
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.351-382
    • /
    • 2007
  • This study seeks to analyze various aspects of women's fear of sexual crime committed against them within the Seoul metropolitan subway system, which takes center stage in public transportation today in Korea; that is, among different kinds of fear of crime, women's fear of sexual crime is empirically examined, and it is expected that the results of this study shall serve as an important basis for future policy-making, so that the fear of sexual crime against women in the subway system could be reduced. To the end, this study aims first, to investigate the real picture of women's using the subway and their attire, second, to look into the amount of information on such crime obtained and the level of its awareness, third, to analyze the characteristics of the fear of sexual crime in the subway system, and lastly, to empirically examine the relationship between women's regular women's regular attire/their level of information on such crime obtained and their fear of sexual crime. As a quantitative research method to discover facts, this study utilizes reality-analyztical and technical research methods, and for its final statistical analysis, uses questionnaire answered and returned by 509 women, out of a total of 520 female commuters on the Seoul metropolitan subway system who had originally been requested to participate in the survey. The result of this study demonstrates that the level of women's fear of sexual crime on the subway is relatively high. In detail, the higher their monthly income is, the more fearful women feel on the subway; it has also been found that women living in housing they own or in leased housing on deposits (Jeonse) fear sexual crime on the subway more than those living in the other forms of housing. However, the level of fear has been found to be low for those types of sexual crime judged to be relatively unlikely to be committed. Lastly the result of the relationship between women's regular attire/their level of information on such crime obtained and their fear of sexual crime is relatively high and very effective.

  • PDF

The Problem of Space Debris and the Environmental Protection in Outer Space Law (우주폐기물과 지구 및 우주환경의 보호)

  • Lee, Young Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.205-237
    • /
    • 2014
  • Last 50 years there were a lot of space subjects launched by space activities of many states and these activities also had created tremendous, significant space debris contaminating the environment of outer space. The large number of space debris which are surrounding the earth have the serious possibilities of destroying a satellite or causing huge threat to the space vehicles. For example, Chinese anti-satellite missile test was conducted by China on January 11, 2007. As a consequence a Chinese weather satellite was destroyed by a kinetic kill vehicle traveling with a speed of 8 km/s in the opposite direction. Anti-satellite missile tests like this,contribute to the formation of enormous orbital space debris which can remain in orbit for many years and could interfere with future space activity (Kessler Syndrome). The test is the largest recorded creation of space debris in history with at least 2,317 pieces of trackable size (golf ball size and larger) and an estimated 150,000 debris particles and more. Several nations responded negatively to the test and highlighted the serious consequences of engaging in the militarization of space. The timing and occasion aroused the suspicion of its demonstration of anti-satellite (ASAT) capabilities following the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris. Therefore this breakup seemed to serve as a momentum of the UN Space Debris Mitigation Guidelines and the background of the EU initiatives for the International Code of Conduct for Outer Space Activities. The UN Space Debris Mitigation Guidelines thus adopted contain many technical elements that all the States involved in the outer space activities are expected to observe to produce least space debris from the moment of design of their launchers and satellites until the end of satellite life. Although the norms are on the voluntary basis which is normal in the current international space law environment where any attempt to formulate binding international rules has to face opposition and sometimes unnecessary screening from many corners of numerous countries. Nevertheless, because of common concerns of space-faring countries, the Guidelines could be adopted smoothly and are believed faithfully followed by most countries. It is a rare success story of international cooperation in the area of outer space. The EU has proposed an International Code of Conduct for Outer Space Activities as a transparency and confidence-building measure. It is designed to enhance the safety, security and sustainability of activities in outer space. The purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security. Of the space issues, the space debris reduction and the space traffic management require some urgent attention. But the current legal instruments of the outer space do not have any binding rules to be applied thereto despite the incresing activities on the outer space. We need to start somewhere sometime soon before it's too late with the chaotic situation. In this article, with a view point of this problem, focused on the the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris and tried to analyse the issues of space debris reduction.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

'Open Skies' Agreements and Access to the 'Single' European Sky;Legal and Economic Problems with the European Court of Justice's Judgment in 'Commission v. Germany'(2002) Striking Down the 'Nationality Clause' in the U.S.-German Agreement (항공(航空) 자유화(自由化)와 '단일(單一)' 유럽항공시장(航空市場) 접근(接近);유럽사법재판소(司法裁判所)의 미(美) ${\cdot}$ 독(獨) 항공운수협정(航空運輸協定)상 '국적요건(國籍要件)' 조항(條項)의 공동체법(共同體法)상 '내국민대우(內國民待遇)' 규정 위반(違反) 관련 '집행위원회(執行委員會) 대(對) 독일연방(獨逸聯邦)' 사건 판결(判決)(2002)의 문제점을 중심으로)

  • Park, Hyun-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.15 no.1
    • /
    • pp.38-53
    • /
    • 2007
  • In a seminal judgment of November 2002 (Case C-476/98) relating to the compatibility with Community laws of the 'nationality clause' in the 1996 amending protocol to the 1955 U.S.-German Air Services Agreement, the European Court of Justice(ECJ) decided that the provision constituted a measure of an intrinsically discriminatory nature and was thus contrary to the principle of national treatment established under Art. 52 of the EC Treaty. The Court, rejecting bluntly the German government' submissions relying on public policy grounds(Art. 56, EC Treaty), seemed content to declare and rule that the protocol provision requiring a contracting state party to ensure substantial ownership and effective control by its nationals of its designated airlines had violated the requirement of national treatment reserved for other Community Members under the salient Treaty provision. The German counterclaims against the Commission, although tantalizing not only from the perusal of the judgment but from the perspective of international air law, were nonetheless invariably correct and to the point. For such a clause has been justified to defend the 'fundamental interests of society from a serious threat' that may result from granting operating licenses or necessary technical authorizations to an airline company of a third country. Indeed, the nationality clause has been inserted in most of the liberal bilaterals to allow the parties to enforce their own national laws and regulations governing aviation safety and security. Such a clause is not targeted as a device for discriminating against the nationals of any third State. It simply acts as the minimum legal safeguards against aviation risk empowering a party to take legal control of the designated airlines. Unfortunately, the German call for the review of such a foremost objective and rationale underlying the nationality clause landed on the deaf ears of the Court which appeared quite happy not to take stock of the potential implications and consequences in its absence and of the legality under international law of the 'national treatment' requirement of Community laws. Again, while US law limits foreign shareholders to 24.9% of its airlines, the European Community limits non-EC ownership to 49%, precluding any ownership and effective control by foreign nationals of EC airlines, let alone any foreign takeover and merger. Given this, it appears inconsistent and unreasonable for the EC to demand, $vis-{\grave{a}}-vis$ a non-EC third State, national treatment for all of its Member States. The ECJ's decision was also wrongly premised on the precedence of Community laws over international law, and in particular, international air law. It simply is another form of asserting and enforcing de facto extraterritorial application of Community laws to a non-EC third country. Again, the ruling runs counter to an established rule of international law that a treaty does not, as a matter of principle, create either obligations or rights for a third State. Aside from the legal problems, the 'national treatment' may not be economically justified either, in light of the free-rider problem and resulting externalities or inefficiency. On the strength of international law and economics, therefore, airlines of Community Members other than the designated German and U.S. air carriers are neither eligible for traffic rights, nor entitled to operate between or 'free-ride' on the U.S. and German points. All in all and in all fairness, the European Court's ruling was nothing short of an outright condemnation of established rules and principles of international law and international air law. Nor is the national treatment requirement justified by the economic logic of deregulation or liberalization of aviation markets. Nor has the requirement much to do with fair competition and increased efficiency.

  • PDF

Study on the Legal Issues of New Draft of Civil Aviation Law in China (중국 민용항공법 개정 최근 동향과 주요 법적쟁점)

  • Lee, Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.2
    • /
    • pp.177-214
    • /
    • 2016
  • During more than 20 years of practice, Civil Aviation Law has experienced three times of amendments since it was enacted in 1995. But these revisions are limited to the technical level. The problems and limitations have become increasingly prominent in its implementation. Firstly, the civil aviation law is the result of interests game among several departments and some legal issues was left behind and the regulation was very vague as a result. Secondly, the process of aviation legislation is the process that the country has undergone profound changes and social transformation. The 20 years is long enough for the society to undergo tremendous changes and 1995 version of civil aviation law does not keep pace of development of economy. There was a serious lag between reality and the law. In order to actively promote the development of the aviation industry and overcome implementation issues of the Civil Aviation Law, Civil Aviation Administration of China (CAAC) initiated modification procedure the law and published new draft of Civil Aviation Law in August 2016. The spirit of this modification is to learn and absorb new achievements of domestic and foreign legislation and the International Convention on civil aviation. Furthermore, the purpose of the revision is to provide favorable policy for the development of civil aviation industry and improve aviation safety and supervision, strengthen and protection of consumer rights and interests, to enhance the safety of civil aviation activities, and promote the development of general aviation. This revision concerned to the 78 articles which are revised or deleted and 24 articles added. The highlights of the draft include but not limited to the enhancement of security management, clarification of the main responsibility for production safety. And also it added the provisions related to the construction of effective tracking capability of public air transport enterprises and license system on the transport of dangerous goods. Compared with the existing civil aviation law, the draft has made a great improvements. But there are several deficiencies and limitations in the drafts. These problems need to be supplemented and perfected through further amendments in near future.

A Study on the Governance of U.S. Global Positioning System (미국 글로벌위성항법시스템(GPS)의 거버넌스에 관한 연구 - 한국형위성항법시스템 거버넌스를 위한 제언 -)

  • Jung, Yung-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.3
    • /
    • pp.127-150
    • /
    • 2020
  • A Basic Plan for the Promotion of Space Development (hereinafter referred to as "basic plan"), which prescribes mid- and long-term policy objectives and basic direction-setting on space development every five years, is one of the matters to be deliberated by the National Space Committee. Confirmed February 2018 by the Committee, the 3rd Basic Plan has a unique matter, compared to the 2nd Basic Plan. It is to construct "Korean Positioning System(KPS)". Almost every country in the world including Korea has been relying on GPS. On the occasion of the shooting down of a Korean Air flight 007 by Soviet Russia, GPS Standard Positioning Service has been open to the world. Due to technical errors of GPS or conflict of interests between countries in international relations, however, the above Service can be interrupted at any time. Such cessation might bring extensive damage to the social, economic and security domains of every country. This is why some countries has been constructing an independent global or regional satellite navigation system: EU(Galileo), Russia(Glonass), India(NaVic), Japan(QZSS), and China(Beidou). So does South Korea. Once KPS is built, it is expected to make use of the system in various areas such as transportation, aviation, disaster, construction, defense, ocean, distribution, telecommunication, etc. For this, a pan-governmental governance is needed to be established. And this governance must be based on the law. Korea is richly experienced in developing and operating individually satellite itself, but it has little experience in the simultaneous development and operation of the satellites, ground, and users systems, such as KPS. Therefore we need to review overseas cases, in order to minimize trial and error. U.S. GPS is a classic example.

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

Application and Effectiveness of a Preceptorship for the Improvement of Clinical Education (임상실습 교육개선을 위한 일 실습지도자 활용모델 (preceptorship model)의 적용 및 효과에 관한 연구 -암센타, 재활센타, 중환자실 실습을 중심으로-)

  • 이원희;김소선;한신희;이소연;김기연
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.3
    • /
    • pp.581-596
    • /
    • 1995
  • Clinical practice in nursing education provides an opportunity for students, through the process of ap-plying theoretical knowledge to practice, and to learn nursing skills as well as being socialized into nursing and as such decrease the reality shock of actual nursing practice. Because of a shortage of nursing faculty, the job of achieving the objectives of the clinical practice had been turned over to the head nurses. This resulted in many problems, such as, unclear location of responsibilities and inadequate feedback from head nurses. Therefore this study was done to introduce and evaluate the use of preceptors as a way to minimize the above problems, and to maximize the achievement of the clinical practice objectives. Using an adaptation of Zerbe's (1991) three-tiered team model, clinical practice was done using a preceptor, a head nurse and a clinical instructor, each with different and well defined roles. The subjects of this study were 67 senior students of the College of Nursing of Y University in Seoul whose clinical practice in adult nursing was carried out between May 1, 1994 and December 8, 1994. There were 22 preceptors who had at least two years of clinical experience and who were recommended by their head nurses. They were given additional education on the philosophy and objectives of the College of Nursing, on communication skills, on the theory and practice of education, and on nursing diagnosis and education evaluation. The role of the preceptor was to work one-to-one with students in their practice. The role of the head nurse was to supervise and evaluate the preceptors. The role of the clinical instructor was to provide the education program for the preceptors, to provide ad-vice and suggestions to the preceptors and to maintain lines of communication with the college. With each of these roles in place, it was thought that the effectiveness and efficiency of the clinical practice could be increased significantly. To evaluate the effectiveness of the preceptorship, the three - tiered model, Lowery's Teacher Evaluation Opinion Form translated and adapted to Korea was used to measure student statisfaction. The Clinical Practice Compentency Evaluation Tool developed by Lee et ai was also used to measure student competencies. The results of this study are as follows 1. The satisfaction with clinical practice was higher with the introduction of the perceptors than it was before they were used. (t=-5.96, p=<.005) 2. The clinical practice competencies were higher with the introduction of the preceptors than it was before they were used(t=-5.l3, p<.005) 3. In order to analyze areas not measured by the quantitative tools additional analysis of the open questions was done. The results of this analysis showed that : 1) The students felt positive about their sense of security, confidence, handling of responsbility, and being systematic. They also felt positive about improvements in knowledge, opportunities for direct care, and socialization. 2) The students felt negative about the technical part of their role, lack of knowledge by the preceptor, unprofessional attitudes on the part of the preceptor, difficulty in the role of the professional nurse(student). 3) The preceptors felt positive about their responsibility, motivation, and relationship with the college. 4) The preceptors felt negative about their bur-den. Introduction of the preceptorship model will lead to change and improvement in the negative factors discussed above, solve problems in the present clinical education system, increase continuity in the education of the students, help with socialization of the students and motivation of the preceptors to up-grade their education and increase their confidence. These objectives must be obtained to further the development of professional nursing, and thus, making the preceptorship a reality is our job for the future.

  • PDF