• Title/Summary/Keyword: information Security

Search Result 17,883, Processing Time 0.047 seconds

Police security measures for foreign criminals : Focusing on Suwon (외국인범죄자에 대한 경찰의 치안대책 : 경기도 수원시를 중심으로)

  • Park, Chanhyeok;Seo, Bongsung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.622-633
    • /
    • 2015
  • With recent news reports on violent crimes committed by foreigners, public hatred toward foreign criminals and fear about such crimes are growing, calling into question public safety measures implemented by the police and the immigration system. At the same time, due to globalization and structural changes in the labor market, it is certain that the influx of migrant workers will continue to increase. Against this backdrop, this paper seeks to examine the current status of foreign nationals staying in Korea and their criminal records focusing on Suwon city, and propose public safety measures the police could take with regard to crimes committed by foreigners. Also, the paper looks into public safety measures of the Korea Immigration Service and Suwon city, and suggests short- and long-term measures to prevent crimes committed by foreigners. The paper begins by examining the current public safety measures of the police and Suwon City concerning crimes committed by foreign nationals residing in Korea. Based on such examination, it points out insufficient patrol and investigation personnel as problems, and recommends short- and long-term measures for future improvement. This paper maintains that for the Korean society to successfully deal with the increasing number of foreigners in Korea, the current immigration system and public safety measures of the police will have to change. While the police alone cannot reduce the crime rates at local and national levels, nonetheless, proactive measures by the police are needed given the growing number of migrant workers and immigrants in Korea. Also important are mindset changes not only of relevant authorities, but also of the public. The paper recommends a set of short-and long-term public safety measures the police should institute to efficiently deal with crimes committed by foreigners.

A Survey of Needs and Types of Home Physical Therapy, Visiting Physical Therapy and School Physical Therapy (가정.방문물리치료 및 학교물리치료의 필요성 및 유형실태에 대한 조사연구)

  • Kwon, Hei-Jeoung
    • Journal of Korean Physical Therapy Science
    • /
    • v.18 no.4
    • /
    • pp.31-46
    • /
    • 2011
  • The purpose of this survey was to give data and information about type and needs of Home Physical Therapy, Visiting Physical Therapy and School Physical Therapy for physical and nurse. The subjects were 154(99 physical therapists and 55 nurses) who were working at geriatric rehabilitation hospitals and children hospitals. The period of questionary collection was from the 15 of August to the 15th of September 2011. And data was analysis from 99 articles such as journals related to physical therapy, and searched with keyword 'home and visiting physical therapy' by web site and Korea National Assembly Library from 1991 to 2011. The data was analysis with percentage, mean, standard deviation and ANOVA by SPSS PC 12.0. The results were as follows; 1. The definition of 'Home Physical Therapy' has been community based on physical therapy service for the patient who had diagnosis by medical doctor, has been based on medical law. The definition of 'Visiting Physical Therapy' has been community based on physical therapy service at home for the patient who had diagnosis by medical doctor, for the national basic living security, and senior citizen over 65 years who lives alone, has been based on law for community health and law of long term health insurance. The definition of 'School Physical Therapy' has been school based on physical therapy service at school after class for the disabled children who are studying at school, has been based on special education law article 28. 2. As for the knowledge of the Home and Visiting and School Physical Therapy, both groups PT and nurse were 'I do not know'125(81.3%) of the difference the concept of 3 definitions, so it means to need education and information about the different concept of three physical therapy. As for the needs of home and visiting physical therapy, both groups of PT and Nurse were 'needs' 151(98.1%). Physical therapist showed of 'Needs' on visiting physical therapy 35(35.4%), home physical therapy 32(32.3%), and schole physical therapy 32(32.3%). Nurse showed of 'Needs' on home physical therapy 23(41.8%). visiting physical therapy 19(34.5%), school physical therapy 13(23.6%). Therefore it is necessary to have home and visiting physical therapy as for the elderly and disabled person. 3. As for the qualification of Home and Visiting physical therapist, both PT and nurse groups showed as follows; take post graduation education program for home and visiting therapy after became PT : home physical therapist 108(70.1%), visiting physical therapist 106(68.8%). So it means education center or university can be developed post graduation program for home and visiting physical therapist. 4. As for the 'Needs' of school physical therapy, both groups of PT and nurse showed as follows; 'Needs' 142(92.2%), 'Needs superviser education program' 148(96.1%), in PT group showed 'I will participate of education program' 92(92.9%). 5. As for the present states of research papers or report of home, visiting, and school physical therapy was as follows; the 103 papers for 8 fields about' the needs of home and visiting physical therapy' from 1991 to 2011, the 13 papers for 2 fields about school physical therapy from 2001 to 2011, so total papers were 114 articles.

  • PDF

An Investigation of Social Commerce Service Quality on Consumer's Satisfaction (소셜커머스의 서비스품질과 소비자 만족도의 상관관계 분석)

  • Shin, Seung-Soo;Shin, Miyea;Jeong, Yoon-Su;Lee, Jihea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2015
  • Recently, service-related products have gained more attention than general products on the existing social commerce sites. Based on the situation, the effect that the service quality of social commerce has on customer satisfaction was analyzed in this study. It is a study that analyzes how much the service quality affects the customer satisfaction after the purchase, targeting consumers who have made purchases of social commerce products. In the case of social commerce, it is well-known that the diversity and convenience of products have a significant effect on customer satisfaction. Social commerce is currently being dumped beyond the 900 sites and dozens of cases of news, real-time searches of popular portal sites appeared not to be bored enough to related sites to drive the popularity coming quickly dug into our everyday lives of human beings. Yet the perception of social commerce seems not properly established because of the new concept was suddenly going to go through penetration without a collective interpretation and acceptance process. Most of the companies that often mimic the syoseol commerce is large, the blame did not depart from the forms of social shopping. We believe that personal and exhibit their skills and talents, and to wonder to see the social rather than the individuals who make unilateral companies.

  • PDF

Relationship between Prevalence of Musculoskeletal Symptoms and Occupational and Personal Factors among Street Cleaners (일부 거리환경미화원의 근골격계 증상 유병률과 직업적 및 개인적 요인의 관련성)

  • Jung, Suk-Chul;Lee, Kyung-Sun;Jung, Myung-Chul;Lee, In-Seok;JungChoi, Kyung-Hee;Bahk, Jin-Wook;Kim, Hyun-Joo
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.169-179
    • /
    • 2010
  • The aim of this study was to investigate occupational and individual risk factors and working conditions in relation to musculoskeletal symptoms in street cleaners. Investigation was conducted through a survey of 395 male street cleaners employed by the government office in Seoul, Gyeonggi and Chung-Nam from July to August of 2009. The control group was comprised of 143 male drivers and security guards. Risk factors for musculoskeletal symptoms in street cleaners were investigated by multiple logistic regression analysis and also evaluated ergonomic risk factors by assessing working conditions of 4 street cleaners. As a result of symptom questionnaires, all of the prevalent rates of musculoskeletal symptoms in street cleaners had significantly higher results than those of the control group(p<0.05). On binary logistic regression analysis of musculoskeletal symptoms, street cleaners showed significant higher odds ratio as 18.84(95%CI: 6.56-54.12) in the arm/elbow, 10.49(95%CI: 4.29-25.65) in the hand/wrist compared to the control group. Both absence of rest breaks and exposure to ergonomic risk factors showed to be important internal risk factors of musculoskeletal symptoms among street cleaners. The exposure levels of QEC(Quick exposures checklist) in street cleaners were revealed to be higher on the shoulder/arm, wrist/hand, and neck than back, or from stress. The findings appear to show that street cleaners were high-risk group of work-related musculoskeletal disorders. Therefore street cleaners require a holistic interventional strategy, including adequate arrangement of rest breaks, improvement of working tools and control of individual risk factors such as obesity and smoking.

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Illegal Issuing Practices of Switched Bill of Lading and Precautions against their Potential Risks (스위치선하증권의 불법적 발행 관행에 따른 위험과 그 대책)

  • Park, Sae-Woon
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.389-409
    • /
    • 2012
  • The Switched Bill of Lading(SBL) has been in frequent use in recent years as intermediary trade increases with the growing number of companies' overseas subsidiaries. Its frequent use, though, has brought about disputes regarding its illegal issue. Although there are several legal cases regarding this, studies on this issue are hard to find. Therefore, this study tries to provide countermeasures and precautions against unlawful issues of SBL through examining the legal cases resulting from illegal issuing practices of SBL. When the Switched Bill of Lading is issued, the shipper, consignee, port of loading and unloading, and shipping date of the original bill of lading are usually changed. Statements which may put the shipper at a disadvantageous position may also be deleted and/or the bill of lading may be either divided or integrated when it is issued. However, if the carrier issues the SBL 1)without withdrawing original BL, 2)indicating the shipping date, port of loading and port of discharge falsely, or 3)deleting the statements which may give him disadvantages, it may be regarded as an illegal issue. These unlawful issues of SBL may pose a huge threat to the shipper, banks and the parties relating to the trade. That is, the shipper may take a substantial loss when the goods can be delivered to a third party by SBL without his collecting the proceeds. The issuing bank and the negotiating bank may also have their security rights to the goods hampered by the illegal and improper issue of SBL. In most cases, the carrier has no choice but to issue the SBL without collecting the original BL for fear of hurting the relationship with the intermediary traders. This practice of issuing more than two sets of BL may pose a potential risk to the carrier.

  • PDF