• Title/Summary/Keyword: problem-preventing policy

Search Result 33, Processing Time 0.032 seconds

The Family Policy of the Lee administration from the Social Investment Perspective : contents analysis and policy implication (사회투자론적 관점에서 본 새 정부의 가정정책 : 분석과 과제)

  • Sung, Mi-Ai;Song, Hye-Rim
    • Journal of Family Resource Management and Policy Review
    • /
    • v.12 no.4
    • /
    • pp.1-13
    • /
    • 2008
  • The purpose of this study is to analyze and assess the family policy of the Lee administration and to suggest agendas for sustainable future family policy. Traditionally, families are a unique unit of production and reproduction of family members and social laborers. In addition, families are the social safety net help people survive in a society. Therefore, family policies play an important role in contemporary society. In this context, we review the literature related to family and social policy, and the contents of Ministry for Health, Welfare and Family Affairs, which is the main authority in Korea. The results are as follow: Firstly, the Lee administration ignored the data showing that family policy should be a unique policy, and not a sub-division of welfare policy. Secondly, there is no difference between the active welfare policy of the Lee administration and policies of past administrations. Finally, this study suggests that subjects of future oriented family policy should focus on co-developing programs for the individual, family, and society, to develop problem-prevention and family needs- ordered policy, and to make integrated family policy through laws and delivery systems such as Healthy Family Centers.

  • PDF

A Design of MHS Access Control Policy for Preventing Cascade Vulnerability (캐스케이드 취약성 방지를 위한 MHS 접근통제 정책 설계)

  • 조인준;김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.117-128
    • /
    • 1997
  • When computer systems with mandatory access control mechanism are interconnected each other for enforcing the MHS(Message Handling System) security on the multilevel secure distributed network environment, illegal information flow may occurs due to the unexpected cascade vulnerability problem. In this paper, new MHS security policy and security property functions are proposed for preventing the cascade vulnerability.

The Need of Integrated Approach for Suicide Prevention (자살예방을 위한 통합적 접근의 필요성)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.29 no.1
    • /
    • pp.1-3
    • /
    • 2019
  • Suicide is a major problem in Korean health care and a serious social problem. In Korea, 12,463 people (24.3 per 100,000) lost their lives due to suicide in 2017. Although the government has established three National Comprehensive Plan of Suicide Prevention (2004, 2009, 2016), and National Action Plan of Suicide Prevention (2018), the suicide rate is still high. The suicide rate of the elderly is especially high. This is due to the economic vulnerability of the elderly in Korea. Therefore, in order to prevent suicide in Korea, mental health care approach and social welfare approach should be integrated. The intervention of preventing suicide of suicide attempters should include social welfare services as well as mental health program and should be based on community. There are many health problems, including prevention of suicide, which can not be solved only by the efforts of health care. Many health problems are social problems and the integrated approach is needed to solve them. In order to solve many health care problems and improve health, integrated approach of health, social science, and humanities is needed.

Preventing Fast Wear-out of Flash Cache with An Admission Control Policy

  • Lee, Eunji;Bahn, Hyokyung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.5
    • /
    • pp.546-553
    • /
    • 2015
  • Recently, flash cache is widely adopted as the performance accelerator of legacy storage systems. Unlike other cache media, flash cache should be carefully managed as it has peculiar characteristics such as long write latency and limited P/E cycles. In particular, we make two prominent observations that can be utilized in managing flash cache. First, a serious worn-out problem happens when the working-set of a system is beyond the capacity of flash cache due to excessively frequent cache replacement. Second, more than 50% of data has no hit in flash cache as it is a second level cache. Based on these observations, we propose a cache admission control policy that does not cache data when it is first accessed, and inserts it into the cache only after its second access occurs within a certain time window. This allows the filtering of data disruptive to flash cache in terms of endurance and performance. With this policy, we prolong the lifetime of flash cache 2.3 times without any performance degradations.

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

Research on John School as a policy to prevent recidivism of online sex trafficking

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.143-149
    • /
    • 2018
  • Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

A study on the improvement of BCM industry through legal systems (BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구)

  • Han, Jong-U
    • Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF

Corruption Risks in the System of Providing Economic Security of the State

  • Pinchuk, Vitaliy;Shaposhnykova, Iryna;Kuvakin, Serhiy;Kozak, Kateryna;Popova, Liubov;Lopashchuk, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.69-76
    • /
    • 2022
  • At the current stage of globalization and European integration of Ukraine, the aspects related to the effective fight against corruption in the system of economic security of our country are receiving more and more attention, as they become a prerequisite for continuing reforms based on international funding. In order to consider this issue and solve this problem, the necessary step is to develop and implement real mechanisms of the system for detecting and preventing corrupt behavior, which are based on international anti-corruption standards. The leading component of this system is the management of corruption risks in the system of economic security in order to identify them and implement measures to reduce them. This study analyzes the corruption perception index in Ukraine in recent years, which showed a positive, albeit somewhat slow dynamics of its growth, indicating a gradual increase in overcoming corruption through the introduction of a number of anti-corruption measures and changes. It is proved that the current stage of socio-economic development of the country contributes to strengthening the processes of combating corruption and preventing corruption risks, creating an effective and efficient anti-corruption system of the state. The concept of "corruption" was studied, it was found that in the field of public administration it is considered from different positions and is closely related to the concept of "corruption risks". The essence and features of corruption risks are studied, the preconditions of their occurrence are formulated, the relationship between the causes of corruption risks and economic security in the field of public authority has been established. The system of corruption risk management is considered and its components are characterized. It is proposed to increase the effectiveness of anticorruption policy through the implementation of measures aimed at investigating the causes of corruption risks, as well as developed effective and effective means of reducing corruption risks within the system of economic security

Economic benefits and management implications of reducing the harvest of juvenile mackerel in Korea

  • LEE, Jungsam;KIM, Dae-Young;SEO, Young-Il;KIM, Do-Hoon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.52 no.4
    • /
    • pp.386-393
    • /
    • 2016
  • It is essential to provide good environment for juvenile fish to grow and spawn in order to keep reproduction mechanism of fisheries resources. However, harvesting juvenile fish deprives adult fish of the opportunity to reproduce, thereby changing self-regulating renewable resources into non-renewable ones and preventing sustainable harvesting as well as reducing fishers' income. We reviewed the catch status of Korea on juvenile mackerel and analyzed how reducing the catch ratio of juvenile mackerel may affect the spawning stock and Korean fishermen's revenue. In addition, we analyzed the problem of caching juvenile mackerel in Korean fisheries and current efforts to protect and reduce the catch ratio of juvenile mackerel in Korea. Furthermore, we suggested future efforts to protect juvenile mackerel. The result of the study showed that reducing the catch ratio of juvenile mackerel from 44.4% to 30.0% would increase fishers' revenue by 60.6 billion KRW. We suggest the changing of purse seine fishery's catching methods from night operation to day operation, relocation of fishing vessels to move to other fishing grounds when fishing vessels meet high density of juvenile mackerel, and consumers' clever choice of consuming adult mackerel in order to accelerate the move toward protecting juvenile mackerel in Korea.