• Title/Summary/Keyword: national authorization

Search Result 103, Processing Time 0.028 seconds

The Effect on Network Diversity and Network Strength of Social Enterprise Member with the Developmental Model (사회적 기업구성원의 네트워크 다양성과 네트워크 강도가 기업발전모형에 미치는 영향)

  • Chung, Dae-Yong;Kim, Min-Sug
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3772-3778
    • /
    • 2010
  • The leaders such as The Robert Foundation of the U.S., Social Firms U.K., EMES European Research Network worldwide are groping for the survival strategies of social enterprises and of their developmental methods with the utilization of social capital. Along with the way the world economy goes on, this study is first of all to empirically analyze how the diversity and strength of network as independent variables work with the studies of the survival of enterprises of Granovetter Mark, Burt Ronald, Coleman James, Peter Witt, Andreas Schroeter, Christin Merz, Helen Haugh, mainly concerned with the increase in employment, the increment in sales, delegation of authorization as dependent variables and secondly it is to present a theoretical possibility of optimizing the development of social enterprises. The object of this study consists of 25 companies recommended by experts out of the current national 295 social enterprises in 2009 through the analysis of sources of SPSS 12.0, appropriateness, reliability, interrelation, etc; besides, hypotheses are proved by multiple regression analysis. A result of the investigation indicates that there is the necessity of network in all the processes of the survival of enterprises, the growth in employment, the increase in sales, delegation of authorization; especially, it suggests that it is necessary to manage, maintain and develop primary factors relating to a variety of networks to improve sales, and relating to the intensity of network for the survival of corporations. At last, I think that this study could be a help to the strategies of utilizing social capital in order for many companies or nonprofit social organizations in Korea to develop into constant enterprises.

A Cost-Benefit Analysis on the Introduction of EU REACH to Korea (EU 신화학물질정책(REACH) 도입에 대한 비용편익 분석)

  • Cheong, Hoe-Seog
    • Journal of Environmental Policy
    • /
    • v.8 no.3
    • /
    • pp.53-79
    • /
    • 2009
  • This study conducted a regulatory impact analysis regarding the introduction of the Korean version of REACH(Registration, Evaluation and Authorization of Chemicals). The direct cost of the Korean REACH is estimated at a total of 101 billion Korean won over the 11 year period. The cost includes pre-registration, testing, registration, Chemical Safety Assessment(CSA) and Chemical Safety Report(CSR), evaluation, and the authorization costs of 15,223 chemical substances produced and imported more than 1 ton per year in Korea in 2006. With regard to the benefit, the only public health benefit is included in the estimation. Based on the available foreign and domestic data, this study estimated that the economic values of public health benefits are in the range of 33.2~138.6 billion Korean won if only the savings of the National Health Expenditures are considered and it reaches 203.9~1,640.3 billion Korean won if the willingness to pay(WTP) for disease prevention is included. This study proved that the Korean REACH passed the cost/benefit criteria. The benefit-cost ratio of the Korean REACH, however, is estimated to be lower than its EU counterpart. Thus it is suggested that a rigorous study to reduce the costs to industry be required before the Korean government introduces the Korean REACH.

  • PDF

Analysis of the Organization Structure and Learning Objectives of High School Informatics Textbooks (고등학교 정보 교과서의 구성체계 및 학습목표 분석)

  • Kang, Oh-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.3
    • /
    • pp.9-15
    • /
    • 2020
  • This study analyzed high school informatics textbooks that were developed based on the 2015 Revised National Curriculum. Content analysis was adopted to analyze the organization system of the textbooks. Learning objectives were also analyzed according to Anderson's taxonomy of educational objectives. Through content analysis, it was revealed that the textbooks were composed of activities, differentiated learning, and small group learning to promote core competencies. The analysis of learning objectives of the textbooks showed that 'understanding' (41%), 'developing' (20%), and 'applying' (18%) were the three highest criteria in terms of cognitive processes; in terms of type of knowledge, conceptual knowledge accounts for the highest(45%), followed by procedural (32%), and factual (12%). Further methods to improve the textbook quality is proposed based on the results from this analysis.

Breeding of Productive Bivoltine Hybrid, CSR16${\times}$CSR17 of Silkworm Bombyx mori L.

  • Reddy, N.Mal;Basavaraja, H.K.;Kumar, N.Suresh;Joge, P.G.;Kalpana, G.V.;Dandin, S.B.;Datta, R.K.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.8 no.2
    • /
    • pp.129-133
    • /
    • 2004
  • The breeding work was initiated by utilizing two Japanese hybrids namely C135${\times}$N134 and N137${\times}$C146 along with two evolved Indian breeds, J14 and A24. The breed CSR16 which is characterized with marked larvae and white dumbbell cocoons was evolved from the Japanese hybrid C135${\times}$N134 by crossing with J14, while the breed CSR17 which is characterized with plain larvae and white oval cocoons was evolved from the Japanese hybrid N137${\times}$C146 by crossing with A24. The hybrid of these evolved breeds i.e., CSR16${\times}$CSR17 has shown superior over control hybrid $KA{\times}{NB_4}{D_2}$ and on par with the ruling hybrid of CSR2${\times}$CSR4. The hybrid CSR16${\times}$CSR17 was authorized during 1999 by Central Silk Board, Bangalore, Government of India for commercial exploitation during favourable months based on national level race authorization test.

Perceptual Differences between Managers and Practitioners on Competencies of Information Security Consultants (정보보호컨설턴트 역량에 대한 관리자와 실무자의 인식차이)

  • Kim, Se-Yun;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.227-235
    • /
    • 2016
  • As various measures of law observance obligations such as mandatory obligation of privacy impact assessment (PIA) for public institutions and authorization of information security management system (ISMS) are put into practice, increase in demand for information security consulting and securement of information security consultants are emerging as a major issue. The purpose of this study is to empirically investigate what core competencies information security consultants should possess and how much they actually possess them. By analyzing the differences in perception between practitioners and managers on core competencies, this study understands difference of views between the two groups and suggests ideas for cultivation of information security consultants.

Optimization of Shark (Squatina oculata) Cartilage Hydrolysis for the Preparation of Chondroitin Sulfate

  • Jo, Jin-Ho;Do, Jeong-Ryong;Kim, Young-Moung;Kim, Dong-Soo;Lee, Taek-Kyun;Kim, Seon-Bong;Cho, Seung-Mock;Kang, Suk-Nam;Park, Douck-Choun
    • Food Science and Biotechnology
    • /
    • v.14 no.5
    • /
    • pp.651-655
    • /
    • 2005
  • Enzymatic hydrolysis of shark (Squatina oculata) cartilage (SC) was optimized by response surface methodology (RSM) for chondroitin sulfate (CS) preparation. Among 11 commercial proteases, Maxazyme NNP showed highest productivity (CS yield per enzyme cost) of CS. Optimal hydrolysis conditions determined by RSM were 1.63% and 2.87 hr for enzyme concentration and hydrolysis time ($r^2\;=\;0.9527$, p<0.0l), respectively and highest yield of hydrolysate under the conditions was 42.3%. The yield ($43.1{\pm}2.1%$) and CS content ($24.8{\pm}0.1%$) of hydrolysate at optimal condition verified statistical optimization of SC enzymatic hydrolysis was valid.

Analysis of Recognition Difference Regarding Informatics Textbook (정보 교과서에 대한 인식 차이의 분석)

  • Kang, Oh-Han
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.191-198
    • /
    • 2011
  • In this paper, we examine the different viewpoints of teachers and undergraduates on middle school informatics textbook. For this research, a survey is conducted on middle school informatics teachers and undergraduates who are preparing the state examination for informatics-computer teachers. Items of the survey were chosen to investigate the level of completion on the contents and structure of the textbook and to examine overall satisfaction with the textbook. Seven items concerning the level of completion are based on national textbook authorization criteria. A t-test was performed to analyze meaningful difference in perception of textbook between the teacher and student groups. The result shows there is meaningful difference on two items which are 'compliance with informatics curriculum' and 'content selection and organization'.

Common Criteria of statistics using DEVS Modeling (DEVS 모델링을 이용한 보안제품 공동평가 통계)

  • Lee, Ki Sung;Kim, Tae Kyung;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.71-80
    • /
    • 2010
  • This thesis is purposed on developing security product co-evaluation statistics administrate program which is can administrate or analysis CC accreditation product using by DEVS modeling via portal site of member of CCRA. Via developing security product evaluation statistics administrate program, it can analysis the trend of all countries of the world in many ways, and noticed the ways of evaluation and accreditation of most countries via scheme analysis. Except this, it can analysis the situation of accreditation trend of any countries via data analysis of ICCC 2009. Also, For trend analysis to evaluation technique of CCRA member, it analyzed up to date technology and policy of the evaluation organization and the Certification Authority of most countries. And it peformed analysis the most trend of information security of evaluation authorization in CCRA member countries. In this program, It provide the function of trend statistics analysis which can statically analyzed the evaluation accreditation trends of most countries and automatical statistics by categorization ( by Product, Class and statistics in national) and report creation functions which can easily extraction and use the needed data. It has been updated the related informations until latest accredited product using by CC(Common Criteria) portal home page's data.

The Definitions of Security Requirements for Control Access on the Step of Analysis (분석단계에서 접근 통제의 보안 요건 정의)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.97-103
    • /
    • 2014
  • The access control means the process to record and manage access restrictions and permits for protecting information in records. This paper emphasizes the control of access and authorization based on the roles and the data using activities of users as task performers. Also, it requires to gain the necessary approval in advance for important tasks such as mass inquiry and change on important information to influence the very existence of the whole organization. And then, it suggests that it is necessary to control some session of information with non-activity for certain time. Generally, this paper is to explain security elements of access control through various cases.

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.