This paper attempts to explore the development of the media labor movement and its tasks. Due to the unique characteristics of information delivered by media, the media labor movement under the authoritarian regime was oppressed and regulated by the government. As democratization has proceeded, the state's oppression and regulation of media has been weakened. However, media workers should wage the struggle for union recognition and independence of editorship simultaneously. Because media unions as labor market organizations also seek for job security and wage increase, we need to understand both political dimension and economic dimension of union activities in media industry. While state's control over media has been diminished in the late 1900s, competition in media industry has been intensified. As small number of media corporations monopolizes the media market, the ecology of media has been completely transformed. Unions in media industry should respond to the change of the media ecology and should build solidarity among media workers at the same time. The achievement of the public nature of media as a part of democratization and building union federation of media industry as a response to the marketization of media still remain as an epochal task for media unions. Like the case of "Hope Bus" in the strike in Hanjin Heavy Industrial Corporation, solidarity between citizens and striking workers should be strengthened.
This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.
As the using rate of an explosive gas has been increased in the industrial site, the regional residents adjacent to the site as well as the site workers have frequently fallen into a dangerous situation. Damage caused by accident in the process using hydrogen gas is not confined only to the relevant process, but also is linked to a large scale of fire or explosion and it bring about heavy casualties. Therefore, personnel in charge should investigate the kinds and causes of the accident, forecast the scale of damage and also, shall establish and manage safety countermeasures. We, in Anti-Calamity Research Center, forecasted the scope of danger if break out a fire or/and explosion in hydrogen gas facilities of MLCC firing process. We selected piping leak accident, which is the most frequent accident case based on an actual analysis of accident data occurred. We select and apply piping leak accident which is the most frequent case based on an actual accident data as a model of damage forecasting scenario caused by accident. A jet fire breaks out if hydrogen gas leaks through pipe size of 10 mm ${\Phi}$ under pressure of 120 bar, and in case of $4kw/m^2$ of radiation level, the radiation heat can produce an effect on up to distance of maximum 12.45 meter. Herein, we are going to recommend safety security and countermeasures for improvement through forecasting of accident damages.
The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.
Ownership of an asset can be identified with the right to exercise "residual control" where the contract is silent about decision rights, or with the right to receive any "residual returns" that remain after contractual. obligations are fulfilled. Although the concept of "ownership" seems reasonably clear in many of the cases, the concepts of residual control and the residual returns that define ownership are actually quite elusive. For large corporations, there is really no single individual who owns both the residual returns and the residual control. Despite the limited qualifications, ownership is clearly. the most common and effective meas to motivate people to create, maintain, and improve the value of assets. In this paper, we try to clarify the relationships among financial structure, ownership, and corporate control with the concept of ownership defined as the residual control and the residual returns, Financial securities are not just claims to part of a firm's net income. They give the security holder certain rights. A careful matching of rights of control and returns can create incentives that increase total value of the firms. In the corporate firms, managers, lenders, and shareholders have different interests. And the financial structure affects how different those interests are and what decisions management will make. Managers are, in general, better informed than investors about the firm's prospects. The financial decisions by managers may affect investors' beliefs and, therefore, the price of shares and the value of the firm.
More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.
Korean Journal of Construction Engineering and Management
/
v.17
no.5
/
pp.78-88
/
2016
Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.
Journal of the Korea Society of Computer and Information
/
v.15
no.6
/
pp.111-120
/
2010
Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.
This study examined individual characteristic factors and environmental factors as determinants of entrepreneurial intentions. As for individual characteristic factors, individuals' career orientations and entrepreneurial self-efficacy were examined. As for environmental factors, social supports and successful role models, classified as personal environmental factors, were examined, and social perceptions for entrepreneurs, classified as social environmental factors were also examined. Data were collected from undergraduates of business department, and graduates of the same department. The samples of 208 and 81 for each group were used for final analysis. Results showed that as a whole, career orientations affected entrepreneurial intentions. Specifically, entrepreneurial orientations had positive effects, and security orientations had marginally negative effects on entrepreneurial intentions, while, unexpectedly, autonomy orientations had no significant effects. Entrepreneurial self-efficacy had the strongest positive effects on entrepreneurial intentions. Social supports and successful role models, which were not identified as distinct variables by the respondents, were integrated as a new variable of 'network environments' for analysis in this study. Network environments positively affected on entrepreneurial intentions. Social perceptions for entrepreneurs, however, did not affect on entrepreneurial intentions. Based on the results of career orientations, self-efficacy, and network environment, the implications for activating entrepreneurship were discussed.
Pak, Haeyong;Bahk, Jinwook;Paek, Domyung;Lee, Eun-Hee;Pak, Yun-Suk
Journal of Digital Convergence
/
v.15
no.2
/
pp.225-232
/
2017
This study aimed to identify worker groups that are to accidents and to track the changes in their socioeconomic status there after. We analyzed the Korean Labor and Income Panel Study (KLIPS) database(2001-2006) were recorded according to the participant's economic activity status at the beginning of follow-up, and economic activity status was. During the follow-up period, the unemployed group experienced more accidents that resulted in disability than the economically active group. Interestingly, the unemployed group also had the highest industrial accident rate. Among the employed, daily and unpaid family workers were more vulnerable to disabilities. After the accidents, the participants tended to become economically inactive or unemployed. Compared to other worker groups, the economically inactive, unemployed, and daily and unpaid family workers experienced higher rates of accidents and faced graver conditions as a result. Although they constitute a significantly large part of society, these vulnerable workers are not currently covered by any social security measures, such as accident surveillance, training, and accident insurance. Social policy should therefore be directed toward protecting these vulnerable worker groups.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.