• Title/Summary/Keyword: critical incidents

Search Result 76, Processing Time 0.023 seconds

A Critical Review on C. Norberg Schulz's Theory of the 'Placeness' - Centering around Heidegger's Thought of "Openness" - (노베르그-슐츠(C. Norberg-Schulz)의 '장소성' 이론에 대한 비판적 고찰 - 하이데거(Martin Heidegger)의 "개방성(Openness)"과 "틈새내기(Rift-design)" 사유를 근거로 -)

  • Lee, Seung-Heon;Lee, Dong-Eon
    • Journal of architectural history
    • /
    • v.12 no.3
    • /
    • pp.149-162
    • /
    • 2003
  • Schulz accepted the existentialist view based on Heidegger's thought and at the same time the objectivist view making fixed this living world, evoking controversies for discussion. He could not see various presentations of the meaning of place because he perceived elements of this world individually. Thus Schulz's mixed system of understanding is sternly different from Heidegger's thought. First, Heidegger suggests that place as existential space represents the occasion revelation of incidents in Dasein. While Schulz recognizes that place is a systematic space predetermined for Dasein. Second, Heidegger interprets the placeness as creative openness in which elements comprising this world face and interact with each other into one. In contrast, Schulz defines each of the elements through signification and regards it as invariable and static. Third, Heidegger perceives that the placeness is expressed with sustainable, complex images through "rift-design" which seeks dynamic interactions between the ground and the world. While Schulz attempts to take "Genius Loci" or "habituated scene" through "gathering" as a concept he regards static and then visualize such structural two factors, producing certain internal images of place. However, limits of Schulz's theory prevent us from exerting complete imagination and discovering the inner creative world of the object. Thus the ultimate goal of paying attention to the placeness, that is, the recovery of individual identity, fails due to the prevalence and abstraction of objectified thinking. In contrast, Heidegger's thought about "openness" is a useful means of realizing the placeness. Openness may be referred to a dynamic coordination in which the earth and the world sustain each other under incessant mutual tensions, but not sticking o each other. "Rift-design" is an openness strategy to cause tense relations by preventing structuralization intentively. This is a creative design that allows seeing original seams of the object.

  • PDF

Development and Validation of a Situational Judgment Test for a Competencey of Public Ethics: A Case of an University in South Korea (대학생 상황판단형 공적윤리 역량 진단도구 개발과 타당화: S대학교를 중심으로)

  • Song, Youngsook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4478-4488
    • /
    • 2015
  • This paper aims to develop and validate a situational judgement test to diagnose the Competencey of public ethics for undergraduates. A criterion group composing of high performers was formed. Critical incidents and responses were developed from interviews with members of the criterion group. Also an expert committee was composed of six university members who have professional knowledge and experience on Competencey based selection or education. This committee reviewed all the items developed and selected some of them for the final test. Item validity and reliability were examined through the final test that 519 college students took. The result of the confirmatory as well as exploratory factor analysis showed that the Competencey of public ethics consisted of 2 sub-elements which were work ethics and democratic citizenship. The correlation between results of the test and the HEXACO model was statistically significant. Overall, the findings of the study highlight that a situational judgement test can be developed and utilized to diagnose Competencey levels of public ethics for undergraduates.

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Analysis of the Correlation between Narrative and Emotions Displayed by Movie Characters through a Quantitative Analysis of Dialogues in a Movie (영화 대사의 정량적 분석을 통한 등장인물의 감정과 서사간의 상관성 연구)

  • You, Eun-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.95-107
    • /
    • 2013
  • A linguistic element found in a movie, dialogue, plays a critical role in building up narrative structure. Still, analyses conducted on movies mostly focus on images due to the nature of a movie that conveys a story through its visual images while dialogue has either been underestimated or received less spotlight despite their importance. This study highlights the significance of lines in a movie. This study calls attention to dialogue, which has stayed out of the main focus and been on the periphery thus far when analyzing movies, so as to see how they contribute to constructing a narrative. It then spotlights the significance of dialogue in the movie. To this end, the study sorts out emotional expressions articulated by actors through their dialogues then to make polarity classification into affirmation and negation, followed by a quantitative analysis of how the polarity proportion of emotional expressions changes depending on the narrative structure. The study also suggests a narrative's relevance with emotions by pointing to dynamic emotional changes that shift between affirmation and negation depending on incidents, conflicts and resolution thereof throughout a movie.

Distribution Characteristics of High Seas Watch and Warning in Korea (우리나라 풍랑특보의 분포 특성)

  • Seol, Dong-Il
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.103-108
    • /
    • 2017
  • This paper analyzed the distribution characteristics of incidents of high seas watches and warnings using data from 2010 to 2014. High seas watches and warnings are critical to the vessels and marine operators of the region, etc. because they affect the ability to safely maneuver. High seas often appear at the southern and middle regions of the East Sea and the eastern region of the South Sea. This phenomenon is closely connected to an extratropical cyclone's development and migration, as well as monsoon intensity. They occur primarily in winter(December ~ January) and spring(March ~ April). The statistical analysis of monthly high seas watches and warnings in both inshore and offshore areas shows a strong positive correlation.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

GIS Application for 1-1-9 Caller Location Information System (GIS를 이용한 신고자 위치표시 시스템 개발)

  • Hahm, Chang-Hahk;Jeong, Jae-Hu;Ryu, Joong-Hi;Kim, Eung-Nam
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.97-103
    • /
    • 2000
  • The main purpose of 1-1-9 Caller Location Information System is to identify and display the precise location of emergency incidents such as natural or man - made fires, medical emergencies and accidents. The state - of- the - art technologies such as Am (Automatic Number Identification), GIS(Geographical Information System) and GPS (Global Positioning System) were applied and integrated in the system for efficient and effective location identification. It displays a radius of 25M, 50M and 100M on the map after location identification. The system can also provide the shortest path to an incident location from a fire station or a fire engine. In case of a fire breakout in or near a building, the attribute information of the building, called a building attribute card, is displayed along with the map location. The system then matches the information with the fire situation and sends an alert to a responsible fire station by phone or fax in order to help promptly react to the problem. An attribute card includes the critical information of a premise such as building's location, number of stories, floor plans, capacity, construction history, indoor fire detection and Prevention facilities, etc.

  • PDF

The Temperature Distribution and the Smoke Flow Behaviour During Road Tunnel Fire (도로터널내 화재시 온도분포 및 연기 유동 분석 연구)

  • Choi, Tae-Hee;Yeun, Young-Pyo;Yun, Chul-Uk;Kim, Myung-Bae;Choi, Jun-Seok;Lee, Seung-Ho;Kim, Nag-Young
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.4 no.1
    • /
    • pp.37-43
    • /
    • 2002
  • Recently, the construction of tunnels longer than one kilometer has increased rapidly. Considering characteristic of limiting structure of longer tunnel, if fires inside tunnel broke out because of vehicle incidents, the catastroph would have high possibility to take place due to toxic smoke and heat of fire. In case of highway tunnel, safety facilities which can cope with tunnel fire are installed in the tunnel but according to rapid increase of heavy good traffic, dangerous goods and enlargement of tunnel magnitude, the research has to carry out about heat fluxes and smoke behaviour during tunnel fire. Therefore, through full-sized fire experiment the paper analyzed temperature distribution, wind velocity, smoke behaviour during tunnel fire.

  • PDF

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Rakhine Muslims(Rohingya) Dilemma Revisited: The Background and Causes of Religio-Ethnic Conflict (미얀마 여카잉 무슬림(로힝자)의 딜레마 재고(再考): 종교기반 종족분쟁의 배경과 원인)

  • PARK, Jang Sik
    • The Southeast Asian review
    • /
    • v.23 no.1
    • /
    • pp.235-276
    • /
    • 2013
  • Recent incidents of lethal violence in the Rakhine State of Myanmar between the majority Buddhist Rakhine and the Muslim Rohingya have been the source of much concern for the international community. Unlike the past, the killings and incendiary attacks by both communities have intensified to a critical level, proving to be a great liability for the forward-thinking Myanmar government, whose recent transition to civilian rule after a long military one has made it eager to move on. The roots of the conflict trace back to the military regime, who branded the Rohingyas living in Rakhine state as illegal immigrants and refused to confer upon them official recognition as Myanmar citizens. The discord then moved to an ethnic conflict, pitting the Rohingya not merely against the Myanmar government but rather the majority Buddhist Rakhine. The conflict, as it has developed into the present, is an immensely complicated one that simultaneously encompasses ethnic and religious issues, all intertwined together. This study aims to see how the two ethnic groups have come to resort to such violence, despite having lived in each other's presence for many centuries, and why the violence persists. It will attempt to reconcile the fact that Rakhine had historically been a place of convergence for two groups, the Buddhist Rakhine and the Rakhine Muslim(the Rohingya). Based on the argument, this study also seeks to uncover, identify, and understand the Rohingya identity with the extreme arguments exhibited by both sides, and from there, locate the underlying causes of the greater religio-ethnic conflict in Rakhine that has so ravaged the place as of recent.