• Title/Summary/Keyword: industrial security

Search Result 1,731, Processing Time 0.024 seconds

Democratization, Marketization and Media Union Movements in South Korea (한국의 민주화, 시장화와 언론노조운동)

  • Shin, Kwang-Yeong
    • Korean journal of communication and information
    • /
    • v.57
    • /
    • pp.69-83
    • /
    • 2012
  • This paper attempts to explore the development of the media labor movement and its tasks. Due to the unique characteristics of information delivered by media, the media labor movement under the authoritarian regime was oppressed and regulated by the government. As democratization has proceeded, the state's oppression and regulation of media has been weakened. However, media workers should wage the struggle for union recognition and independence of editorship simultaneously. Because media unions as labor market organizations also seek for job security and wage increase, we need to understand both political dimension and economic dimension of union activities in media industry. While state's control over media has been diminished in the late 1900s, competition in media industry has been intensified. As small number of media corporations monopolizes the media market, the ecology of media has been completely transformed. Unions in media industry should respond to the change of the media ecology and should build solidarity among media workers at the same time. The achievement of the public nature of media as a part of democratization and building union federation of media industry as a response to the marketization of media still remain as an epochal task for media unions. Like the case of "Hope Bus" in the strike in Hanjin Heavy Industrial Corporation, solidarity between citizens and striking workers should be strengthened.

  • PDF

A Study on Implications of the naval Strategy in West Germany and Future Direction of Korean Navy (냉전기 서독해군 전략의 시사점과 향후 대한민국 해군의 방향성에 관한 연구)

  • Shin, Hong-Jung
    • Strategy21
    • /
    • s.46
    • /
    • pp.159-204
    • /
    • 2020
  • This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.

A Study of Damage Assessment Caused by Hydrogen Gas Leak in Tube Trailer Storage Facilities (수소 Tube Trailer 저장시설에서의 수소가스 누출에 따른 사고피해예측에 관한 연구)

  • Kim, Jong-Rak;Hwang, Seong-Min;Yoon, Myong-O
    • Fire Science and Engineering
    • /
    • v.25 no.6
    • /
    • pp.32-38
    • /
    • 2011
  • As the using rate of an explosive gas has been increased in the industrial site, the regional residents adjacent to the site as well as the site workers have frequently fallen into a dangerous situation. Damage caused by accident in the process using hydrogen gas is not confined only to the relevant process, but also is linked to a large scale of fire or explosion and it bring about heavy casualties. Therefore, personnel in charge should investigate the kinds and causes of the accident, forecast the scale of damage and also, shall establish and manage safety countermeasures. We, in Anti-Calamity Research Center, forecasted the scope of danger if break out a fire or/and explosion in hydrogen gas facilities of MLCC firing process. We selected piping leak accident, which is the most frequent accident case based on an actual analysis of accident data occurred. We select and apply piping leak accident which is the most frequent case based on an actual accident data as a model of damage forecasting scenario caused by accident. A jet fire breaks out if hydrogen gas leaks through pipe size of 10 mm ${\Phi}$ under pressure of 120 bar, and in case of $4kw/m^2$ of radiation level, the radiation heat can produce an effect on up to distance of maximum 12.45 meter. Herein, we are going to recommend safety security and countermeasures for improvement through forecasting of accident damages.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Financial Structure, Ownership, and Corporate Control (기업의 소유구조 및 지배력과 재무구조)

  • Rhieu, Sang-Yup;Cheong, Ki-Moon
    • Korean Business Review
    • /
    • v.11
    • /
    • pp.195-216
    • /
    • 1998
  • Ownership of an asset can be identified with the right to exercise "residual control" where the contract is silent about decision rights, or with the right to receive any "residual returns" that remain after contractual. obligations are fulfilled. Although the concept of "ownership" seems reasonably clear in many of the cases, the concepts of residual control and the residual returns that define ownership are actually quite elusive. For large corporations, there is really no single individual who owns both the residual returns and the residual control. Despite the limited qualifications, ownership is clearly. the most common and effective meas to motivate people to create, maintain, and improve the value of assets. In this paper, we try to clarify the relationships among financial structure, ownership, and corporate control with the concept of ownership defined as the residual control and the residual returns, Financial securities are not just claims to part of a firm's net income. They give the security holder certain rights. A careful matching of rights of control and returns can create incentives that increase total value of the firms. In the corporate firms, managers, lenders, and shareholders have different interests. And the financial structure affects how different those interests are and what decisions management will make. Managers are, in general, better informed than investors about the firm's prospects. The financial decisions by managers may affect investors' beliefs and, therefore, the price of shares and the value of the firm.

  • PDF

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

Determinants of Entrepreneurial Intentions : Individual Characteristics and Environmental Factors (창업 의지의 결정요인: 개인특성 및 환경요인)

  • Yoon, Bang-Seob
    • Korean Business Review
    • /
    • v.17 no.2
    • /
    • pp.89-110
    • /
    • 2004
  • This study examined individual characteristic factors and environmental factors as determinants of entrepreneurial intentions. As for individual characteristic factors, individuals' career orientations and entrepreneurial self-efficacy were examined. As for environmental factors, social supports and successful role models, classified as personal environmental factors, were examined, and social perceptions for entrepreneurs, classified as social environmental factors were also examined. Data were collected from undergraduates of business department, and graduates of the same department. The samples of 208 and 81 for each group were used for final analysis. Results showed that as a whole, career orientations affected entrepreneurial intentions. Specifically, entrepreneurial orientations had positive effects, and security orientations had marginally negative effects on entrepreneurial intentions, while, unexpectedly, autonomy orientations had no significant effects. Entrepreneurial self-efficacy had the strongest positive effects on entrepreneurial intentions. Social supports and successful role models, which were not identified as distinct variables by the respondents, were integrated as a new variable of 'network environments' for analysis in this study. Network environments positively affected on entrepreneurial intentions. Social perceptions for entrepreneurs, however, did not affect on entrepreneurial intentions. Based on the results of career orientations, self-efficacy, and network environment, the implications for activating entrepreneurship were discussed.

  • PDF

Accidents resulting in disability in vulnerable populations and their consequences: A study of vulnerable worker groups in South Korea (취약계층의 사고 후 장애 발생으로 인한 결과: 한국사회의 취약한 노동계층 중심으로)

  • Pak, Haeyong;Bahk, Jinwook;Paek, Domyung;Lee, Eun-Hee;Pak, Yun-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.225-232
    • /
    • 2017
  • This study aimed to identify worker groups that are to accidents and to track the changes in their socioeconomic status there after. We analyzed the Korean Labor and Income Panel Study (KLIPS) database(2001-2006) were recorded according to the participant's economic activity status at the beginning of follow-up, and economic activity status was. During the follow-up period, the unemployed group experienced more accidents that resulted in disability than the economically active group. Interestingly, the unemployed group also had the highest industrial accident rate. Among the employed, daily and unpaid family workers were more vulnerable to disabilities. After the accidents, the participants tended to become economically inactive or unemployed. Compared to other worker groups, the economically inactive, unemployed, and daily and unpaid family workers experienced higher rates of accidents and faced graver conditions as a result. Although they constitute a significantly large part of society, these vulnerable workers are not currently covered by any social security measures, such as accident surveillance, training, and accident insurance. Social policy should therefore be directed toward protecting these vulnerable worker groups.