• Title/Summary/Keyword: protection

Search Result 25,972, Processing Time 0.042 seconds

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Study on the Transient Phenomenon Protection System Development for Fire Alarm System Control Unit (화재 수신기용 과도현상 보호시스템 개발에 관한 연구)

  • Lee, Dong-Myung
    • Fire Science and Engineering
    • /
    • v.23 no.2
    • /
    • pp.55-61
    • /
    • 2009
  • This study has been carried on the transient phenomenon protection system to become fire alarm system control unit of high reliance which can be protected from transient phenomena for surge or transient overvoltage, and constructed engineering base that can develop transient phenomenon protection system by proving performance of protection system in a experimental. This study developed 1 step and 2 step protection system that can be protected from transient phenomenon with process thesis and theory for development of transient phenomenon protection system. It established engineering data construction and a source technology that can develop transient phenomenon protection system as gets satisfied result and test with all performance condition that present in fire protection law and connection regulation.

The Role of Mothers in Children's Privacy Protection on the Internet (인터넷에서의 아동의 프라이버시 보호와 어머니의 역할)

  • Kim, So-Ra
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.2
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

The study of method local scour protection to the existing piers bridge (기존 교각주변의 국부세굴 방지공법에 관한 연구)

  • Park, Sang-Kil;Chang, Tae-Rae;Park, Byung-Yul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.598-602
    • /
    • 2006
  • Local scour is associate with particular local types of vortex around bridge piers. This paper is method of protection local scour for the existing Busan City subway 3 Line bridge piers and Gupo large bridge piers. In order to take design of protection of local scour this bridge piers, We calculate the local scour hole of depth , scour width, riprap construction , filter construction by formulas. We had experimental hydraulic model test for this bridge piers in order to take proof for the calculation of local scour. We knew that the vortex intensifies the local flow velocities and acts to erode sediment from the scour hole and transport it downstream. As the result of hydraulic model test, we could suggest three types method of protection local scour this bridges. We knew that FHWA HEC-18(Richardson et al. 2001: Modified CSU) Formula is useful to checking calculation as application of field. One is pier protection using the sheet piles and riprap, the others are pier protection using the riprap with filter and to make renew Wall-caisson. The best method of protection for the existing Busan City subway 3 Line bridge piers and Gupo large bridge piers is pier protection using the sheet piles and riprap.

  • PDF

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

A Study on the Management Plan of Fire Protection System Utilizing Urban Spatial Information (공간정보를 활용한 소방시설의 관리방안 연구)

  • Bang, Changhoon
    • Fire Science and Engineering
    • /
    • v.33 no.3
    • /
    • pp.98-104
    • /
    • 2019
  • This study examined the efficient management of a fire protection system using spatial information, and basic data for the development of related firefighting industry were obtained. To overcome the problems of malfunction and management failure, which are the major issues of fire protection system management, this study analyzed the related laws and regulations on building spatial information of a fire protection system to introduce spatial information to the fire protection system field. For efficient management of the fire protection system, it is necessary to revise the related laws of the fire protection system, such as protection system-related laws including space information technology, and maintain the standardization, effectiveness, and consistency of fire protection system spatial information.

Protection of Minority Shareholder Investment in the Small and Medium-sized Enterprises

  • KANTHAPANIT, Chinnapat;KANTHAPANIT, Chutiya
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.8
    • /
    • pp.451-459
    • /
    • 2020
  • This study aims to examine the relationship of the four factors that increase the protection of minority shareholder investment. The factors are non-controlling shareholders, corporate governance, free cash flow, and shareholder wealth. The data for this study is obtained from the 2017 annual reports of 136 Thai public companies listed in the Market of Alternative Investment of Thailand (MAI). The analysis uses a multiple regression model to determine which factors encourage and which inhibit the protection of minority shareholder investment. The study tests four hypotheses. The results rejected H1 because non-controlling shareholders have negatively correlated with minority shareholder investment protection (beta -0.155 and p-value 0.050). The results accepted H2, H3 and H4 as follows. H2: corporate governance has positively correlated with minority shareholder investment protection (beta 0.17 and p-value 0.031). H3: free cash flow has positively correlated with minority shareholder investment protection (beta 0.214 and p-value 0.007). H4: shareholder wealth has positively correlated with minority shareholder investment protection (beta 0.318 and p-value 0.000). The major findings suggest strong minority shareholder investment protection was enhanced by increasing corporate governance, free cash flow and shareholder wealth. The protection of minority shareholder investment needs to reduce non-controlling shareholding pattern.

Protection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks

  • Kim, Dae-Ub;Ryoo, Jeong-dong;Lee, Jong Hyun;Kim, Byung Chul;Lee, Jae Yong
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.18-29
    • /
    • 2016
  • In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection-linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes - tree protection and hybrid protection - are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.

A Study on the Copyright Survey for Design Protection in Metaverse Period

  • Kim, Gokmi;Jeon, Ju Hyun
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.181-186
    • /
    • 2021
  • Among human intellectual creations, the right granted by law to what is worth protecting is defined as intellectual property rights. Copyright is a legal right to creative finished products made by individuals, and in recent years, this legal right has been recognized as very important. In other words, copyright is a system created to protect the rights of individuals who created creations and to recognize their efforts. Works subject to copyright vary from poetry, thesis, novels to designs, paintings, music, and architecture, and the scope of the subject is gradually expanding. Recently, research has begun on how far the Metaverse design area absorbed into the real world among works. Computer-generated video productions and software program works are also subject to digital copyright protection, but it is also true that the interpretation of the author protection law for works, designs, and trademarks in the virtual world is unclear. This study aims to analyze copyrights based on case studies and theoretical backgrounds on copyright protection and to discuss the protection limitations of Metaverse design in the virtual world. In other words, the direction for the protection of Metaverse design is presented through clear distinction and definition of copyright protection in the tertiary virtual world. This study aims to present methods for design copyright protection in the era of Metaverse, respect copyright holders' creative activities, and develop our culture through protection of creations.

Advanced Real Time Simulation Platform for Control and Protection Studies of LSIS 80kV 60MW Jeju HVDC System

  • Iwa, Kartiwa;Lee, Kyung-Bin
    • Proceedings of the KIPE Conference
    • /
    • 2013.11a
    • /
    • pp.85-86
    • /
    • 2013
  • This paper describes the physical configuration and features of the advanced control and protection devices, and operation control and monitoring system that are connected to a real time simulator for LS Industrial System 80kV 60 MW Jeju HVDC Pilot Project. Highlight of simulation result are provided to demonstrate the control and protection functionality.

  • PDF