• Title/Summary/Keyword: proactive policy

Search Result 135, Processing Time 0.026 seconds

Factors Influent on Treatment Decision for the Need of Dental Implant (치과임플란트 대상환자의 치료결정에 영향을 미치는 요인)

  • Kim, Su-Gwan;Son, Soon-Yong;Jeong, Seon-A;Jeong, Mi-Ae
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.264-273
    • /
    • 2011
  • This study subject is to provide appropriately basic information about annually increased implant treatment by their lost teeth base on increasing old people and also analyze factors influencing implant treatment decisions for patient. For about 3 month from July on the 2010, This survey was carried out at 13 dental clinic as target of 217 patients on categorized into implant treatment-group and non-treatment-group in Seoul and Gyeonggi-do. Implant treatment-group showed highest portion at 50(30.3%), non- Implant treatment-group showed highest portion at 20's(35.7%), And The patients of implant treatment-group are good oral condition, and they showed a positive attitude. Result of analysis by multiple logistic analysis(regression), Factors of influencing implant treatment decision are age, gender, period of education, monthly income, condition of periodontal tissue, regular checkup, counseling attitude, trust in hospital. Therefore, proactive management about the necessity of regular dental check-up is needed the education and promotion. And medical team should have efforts to Improving technique of medical consultations and Improving the trust of the hospital's for implant treatment decision. Also, The patient's subjective determine rather than it is important to preparing to facilitate decision of specific clinical basis. And The government's financial support and policy alternatives are certainly required in order to be implant treatment without cost burden.

Suggestions for an Effective Earthquake R&D Strategy in Korea through an Analysis of Japan's Earthquake Disaster Prevention System (일본의 지진방재·대응 시스템 분석을 통한 효과적인 우리나라 지진 R&D 전략 제언)

  • Kim, Seong-Yong;Lee, Jae-Wook
    • Economic and Environmental Geology
    • /
    • v.53 no.3
    • /
    • pp.321-336
    • /
    • 2020
  • The Headquarters for Earthquake Research Promotion (HERP) represents the upper-most level of Japan's earthquake disaster prevention governance. Its policy committee establishes the national earthquake investigation research promotion plan. The earthquake investigation committee of HERP collects survey geo-data and evaluates the research results of each earthquake disaster prevention agency. The establishment of an earthquake-related geo-resilience research strategy is both necessary and desirable for Korea. The concept of geo-resilience entails the ability to improve disaster resilience through the application of research results and the convergence of geoscience with science and technology (S&T) including the humanities and social sciences. The achievement of geo-resilience requires a national long-term roadmap and strategy for earthquake prediction research, the development of earthquake disaster prediction and prevention technology, Geo-ICT convergence technology development, implementation of a geocyber physics system (Geo-CPS), the use of geo-mimetics, and geoscientific R&D as it relates to local communities. Through such efforts, the national research institutes of Korea will be able to develop earthquake prediction capacities in relevant fields, reinforce proactive response capabilities, enhance community-level confidence in geodata and its research results, foster next-generation geoscientific manpower, and expand geoscientific infrastructure.

Proposal of the Development Direction on the Special Act on Underground Safety Management for Preparation of the Proactive Underground Safety Management System (선제적 지하안전관리체계 마련을 위한 지하안전관리에 관한 특별법의 발전방향 제시)

  • Han, Yushik
    • Journal of the Korean Geotechnical Society
    • /
    • v.34 no.7
    • /
    • pp.17-27
    • /
    • 2018
  • Sinkholes have occurred in various places around the world and concerns about public safety have been raised in recent years. Particularly, a ground subsidence may occur due to a variety of conditions when developing underground spaces. Ground subsidence refers to the sinking of the Earth's surface caused by the loss of the soil constituting ground due to a certain artificial cause in the ground. Ground subsidence is induced by artificial causes such as the leakage of water supply/sewage pipes and groundwater disturbance, and it is different from a sinkhole, where the sinking of the Earth's surface is induced by the cavity formed due to the melting of limestone in the ground with limestone bedrock. In recent underground development in the urban areas of Korea, damages to surrounding buildings have frequently led to many difficulties with civil complaints and compensation issues, and the collapse of some buildings has resulted in the loss of lives and property. Accordingly, the central government has legislated the Special Act on Underground Safety Management, which will take effect from January 1, 2018. This law specifies an underground safety management system for securing underground safety, under which underground safety impact assessment is performed for projects involving underground excavation work that exceeds a certain size, and safety inspection is regularly performed for underground facilities and the surrounding ground. In this study, the contents of the special act on underground safety management are reviewed, and the direction of development of underground safety policy for preparing preemptive underground safety management preparation and response system is suggested.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Hydropower Development and Sustainability in the Mekong River Basin

  • Lee, Seung-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.37-37
    • /
    • 2012
  • The study aims to evaluate the complexity of relationships between the riparian states - China, Myanmar, Laos, Thailand, Vietnam and Cambodia - in the Mekong River Basin since the mid-1990s with special reference to the discourse on hydropower development. A special emphasis will be put on the influence of China on hydropower development. Although a variety of issues on the river basin have been discussed among the riparian states, none of them has been effectively implemented owing to the lack of China's commitment to the discussions for sustainable water management. Now, a new turning point is observed in the region with emergence of the issue on hydropower development, not only in the upper basin but also in the lower basin. The discourse on hydropower in Mekong has quickly drawn attention of the public, accelerated by the onset of construction of the Xayabury Dam in Laos since November 2010. The influence of China as the upstream country with its political, economic, and military power has increasingly grown in the region over the last few decades, and such trend recently intensifies together with an expansion of Chinese commercial interests in the region. Since the establishment of the Mekong River Commission (MRC) in 1995, the four MRC members have striven to push forward a sustainable use of water resources in the basin. But the legitimacy of the MRC system has been eroded due to the lack of participation by Myanmar and China, and in particular, the Chinese absence has made the four riparian states blind about the change of water regime due to the Chinese dams upstream. Environmental damages due to hydropower development might be possible, including a drop of fish yields, crop production, and damages to the river's ecosystems. Vietnam and Cambodia have already expressed their concerns over the dam construction towards China as well as Laos by pointing out detrimental impacts of the dams to their economies. China's move to collaborate with the other riparian states since 2010 has given a positive signal in terms of sustainable water management in the river. However, this phenomenon never confirms China's proactive contribution to the cooperative activities within the framework of the MRC system. Laos' initiative to build a new dam in the lower basin alarms those who are opposed to dam construction in the fear of its far-reaching damages to the environment. The question goes back to the year-long debate on policy priorities given to economic growth or the environment. The riparian states require wisdom based on a consensus about sustainable water use rather than hydropower development based on individual growth dreams.

  • PDF

A Study on Improvement Plan for Sediment Environmental Guidelines in the Sea Area Utilization Consultation System -Focused on Port and Fishery Harbor Development Case- (해역이용협의서 중 퇴적물 환경기준 개선방안 연구 -항만 어항개발사업 사례를 중심으로-)

  • Jun, Eun Ju;Ju, Hyun Hee;Tac, Dae Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.5
    • /
    • pp.584-593
    • /
    • 2021
  • The sediment makes up the sea floor and plays an important role as a habitats for living things in the sea. However, pollution of coastal sediment due to internal and external factors such as inflow of contaminants from land and self-pollution becoming more serious, the needs for management of sediment that play an important role in ecology, is increasing. In particular, the review and evaluation of the effects of sediment in marine development projects including reclamation and dredging, have significance in terms of proactive protection and management of surrounding ecosystems. This study proposed the improvement measures for marine sediment management standards on the sea area utilization consultation for the development of public water. For the purpose, The evaluation and management standards of domestic and overseas marine sediments were reviewed and compared. The sediment environment guidelines under the Marine Environment Management Act of Korea were reviewed. Accordingly, the cases of Canada and NOAA, which have various evaluation standards consist of comprehensive factors, were analyzed. For analysis of operational cases, the port and fishing port development projects for the last five years (2016-2020) that are considered to have the greatest impact on sediments among the sea area use consultations were also reviewed. Finally, this study suggested that the assessment factors for ecological hazards and potential human risks should be considered in the sediment environmental standards in the sea area utilization consultation system.

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.