• 제목/요약/키워드: protection management

검색결과 2,977건 처리시간 0.028초

남.북한의 천연기념물 관리제도 비교 (A Comparative Study on the Natural Monument Management Policies of South and North Korea)

  • 나명하;홍윤순;김학범
    • 한국조경학회지
    • /
    • 제35권2호통권121호
    • /
    • pp.71-80
    • /
    • 2007
  • Korea began preserving and managing natural monuments in 1933 under Japanese Colonization, but North Korea and South Korea were forced to establish separate natural monument management policies because of the division after the Korean Independence. The purpose of this study is to compare and analyze the natural monument management policies of both south and North Korea between 1933 and 2005 to introduce new policies for Korea unification. The following are the results: First, South Korea manages every type of cultural asset, including natural monuments, through the 'Cultural Heritage Protection Act,' whereas North Korea managing its cultural assets through the 'Cultural Relics Protection Act' and the 'Landmark/Natural Monument Protection Act.' Second, South Korea preserves and utilizes natural monuments for the purpose of promoting the cultural experience of Korean people and contributing to the development of world culture, whereas North Korea uses its natural monuments to promote the superiority of socialism and protect its ruling power. Third, North and South Korea have similar classification systems for animals, plants, and geology, but North Korea classifies geography as one of its natural monuments. Unlike South Korea, North Korea also designates imported animals and plants not only for the preservation and research of genetic resources, but also for their value as economic resources. Fourth, North Korea authorizes the Cabinet to designate and cancel natural monuments, whereas South Korea designates and cancels natural monuments by the Cultural Heritage Administration through the deliberation of a Cultural Heritage Committee. Both Koreas' central administrations establish policies and their local governments carry them out, while their management systems are quite different. In conclusion, it is important to establish specified laws for the conservation of natural heritages and clarified standards of designation in order to improve the preservation and management system and to sustain the diversity of natural preservation. Moreover it is also necessary to discover resources in various fields, designate protection zones, and preserve imported trees. By doing so, we shall improve South Korea's natural monument management policies and ultimately enhance national homogeneity in preparation for the reunification of the Koreas in the future.

국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구 (Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management)

  • 이성중;이영재
    • Journal of Information Technology Applications and Management
    • /
    • 제16권4호
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

일 지역 종합병원 종사자들의 환자 의료정보 보호에 관한 인식도와 실천도 (A Study on Perception and Practice of Protecting the Patient Medical Information in Some General Hospital Employees)

  • 정은영;정상진
    • 보건의료산업학회지
    • /
    • 제8권4호
    • /
    • pp.35-45
    • /
    • 2014
  • This study aimed to identify the relationship between the awareness of employees in medical institutes on the protection of medical information and their practice, and basic data of the development of a protection policy is presented. The subjects of the study were 433 employees of general hospitals located in G city and they were interviewed to ascertain their awareness of the protection of medical information and their practice level. The collected data was analysed with a t-test, a dispersion analysis, a Pearson analysis, and a multi-regression analysis. The mean scores on the awareness of protection of medical information was $4.0{\pm}0.7$, and that for the proficiency level was $3.7{\pm}0.7$. As a relevant factor for awareness and proficiency, education in medical information protection was significantly related to awareness. Education experience in medical information protection and the daily mean number of patients in hospitals had a significant relationship with scores on awareness.

자동화재 탐지설비의 비화재보 감소방안 (A Study about False Alarm of Automatic Fire Detection System)

  • 이종화;이춘하;김시국;공하성
    • 대한안전경영과학회지
    • /
    • 제13권1호
    • /
    • pp.41-49
    • /
    • 2011
  • The automatic fire detection system is an important facility installed with focusing on minimizing the damage from a fire. This paper presents in the followings as the methods to reduce the false alarm of the automatic fire detection system; first, to prepare for legal standard so that revised legal standard can be applied to the fire fighting property prior to revision; second, to introduce the performance based fire detection protection design in the law based fire protection design; third, to maintain the wiring of worn-out detector; forth, to introduce an evaluation system to the education for the fire warden; fifth, to extend the standard of MTBF(meantime between failure) of the detector; sixth, to extend of installing the analog type detector; seventh, to improve the structure of reset switch.

「문화유물보호법」을 통해 본 북한의 문화유산 (Cultural Property in the territory of the North Korea considered from 'the law of the Democratic People's Republic of Korea on Protection of Cultural Property')

  • 지병목
    • 헤리티지:역사와 과학
    • /
    • 제36권
    • /
    • pp.39-67
    • /
    • 2003
  • In this paper we examine cultural properties of the North Korea from 'the law of the Democratic People's Republic of Korea on Protection of Cultural Property". This law was adopted the Resolution of the Standing Committee of the Supreme People's Assembly of DPR of Korea in 1994. For our study, some other laws or rules established after the end of Japanese colonial occupation (1910-1945) in North Korea were examined. The policy on protection and conservation of cultural property in North Korea seems to have taken place a relatively rapid. The purpose of this law is to carry out the policy with a view to contributing to establishment of strict system and order for protection and management of cultural property, to their preservation in original state, to their proper inheritance and development, and to enhancement of national pride and confidence among the people. This law consists of 6 chapters (52 articles): (1) Fundamentals of the law on protection of cultural property, (2) Archaeological excavation and collection of cultural relics, (3) Evaluation and registration of cultural property, (4) Preservation and management of cultural property, (5) Restoration of cultural property, and (6) Guidance and control of cultural property protection. Nevertheless, it is difficult to find the evidence of efforts to exploit the cultural properties from an academic point of view in North Korea since the late 1980s.

보호동기이론(PMT)과 건강신념모델(HBM)을 이용한 관광객 위기대응 행동 분석: COVID-19 위기 (Examining Tourists' Behavior Using Protection Motivation Theory and Health Belief Model: Covid-19 Crisis)

  • 우은주;이상탁
    • 아태비즈니스연구
    • /
    • 제13권1호
    • /
    • pp.301-315
    • /
    • 2022
  • Purpose - The main objective of this study was to investigate tourists behavior by applying protection motivation theory and health belief model during COVID-19 pandemic. Specifically, the study examined how risk perception of COVID-19 affects tourists' protection motivation and travel avoidance intention. Design/methodology/approach - The empirical data was collected by self-administered questionnaires to obtain perception and behavior regarding COVID-19 pandemic situation. A total of 486 questionnaires were used for data analysis and SEM analysis was applied in order to examine seven hypotheses. Findings-The results showed that COVID-19 risk perception is a significant antecedent of threat appraisal, coping appraisal, and cue to action (H1, H2, H6). Moreover, protection motivation is affected by threat appraisal and coping appraisal (H3, H4) and influences on travel avoidance intention (H5). However, cue to action does not affect protection motivation (H7). Research implications or Originality - This study provides insightful implications for tourism industry practitioners who will prepare the post-corona field and the results enrich knowledge of the tourist behavior during pandemic situation.

중소기업 기술보호 개선방안에 대한 연구 (A Study on Improvement Plans for Technology Protection of SMEs in Korea)

  • 이장훈;신완선;박현주
    • 산업경영시스템학회지
    • /
    • 제37권2호
    • /
    • pp.77-84
    • /
    • 2014
  • The purpose of this research is to identify and develop technology protection plans for small and medium-sized enterprises (SMEs) by analyzing past technology leakage patterns which were experienced by SMEs. We identified factors which affect the technology leakage, and analyzed patterns of the influences using a data mining algorithms. A decision tree analysis showed several significant factors which lead to technology leakage, so we conclude that preemptive actions must be put in place for prevention. We expect that this research will contribute to determining the priority of activities necessary to prevent technology leakage accidents in Korean SMEs. We expect that this research will help SMEs to determine the priority of preemptive actions necessary to prevent technology leakage accidents within their respective companies.

Applicability of abrasive waterjet cutting to irradiated graphite decommissioning

  • Francesco Perotti ;Eros Mossini ;Elena Macerata;Massimiliano Annoni ;Michele Monno
    • Nuclear Engineering and Technology
    • /
    • 제55권7호
    • /
    • pp.2356-2365
    • /
    • 2023
  • Characterization, dismantling and pre-disposal management of irradiated graphite (i-graphite) have an important role in safe decommissioning of several nuclear facilities which used this material as moderator and reflector. In addition to common radiation protection issues, easily volatizing long-lived radionuclides and stored Wigner energy could be released during imprudent retrieval and processing of i-graphite. With this regard, among all cutting technologies, abrasive waterjet (AWJ) can successfully achieve all of the thermo-mechanical and radiation protection objectives. In this work, factorial experiments were designed and systematically conducted to characterize the AWJ processing parameters and the machining capability. Moreover, the limitation of dust production and secondary waste generation has been addressed since they are important aspects for radiation protection and radioactive waste management. The promising results obtained on non-irradiated nuclear graphite blocks demonstrate the applicability of AWJ as a valid technology for optimizing the retrieval, storage, and disposal of such radioactive waste. These activities would benefit from the points of view of safety, management, and costs.

Routing and Wavelength Assignment in Survivable WDM Networks without Wavelength Conversion

  • Lee, Tae-Han;Park, Sung-Soo;Lee, Kyung-Sik
    • Management Science and Financial Engineering
    • /
    • 제11권2호
    • /
    • pp.85-103
    • /
    • 2005
  • In this paper, we consider the routing and wavelength assignment problem in survivable WDM transport network without wavelength conversion. We assume the single-link failure and a path protection scheme in optical layer. When a physical network and a set of working paths are given, the problem is to select a link-disjoint protection path for each working path and assign a wavelength for each working and protection path. We give an integer programming formulation of the problem and propose an algorithm to solve it. Though the formulation has exponentially many variables, we solve the linear programming relaxation of it by using column generation technique. We devise a branch-and price algorithm to solve the column generation problem. After solving the linear programming relaxation, we apply a variable fixing procedure combined with the column generation to get an integral solution. We test the proposed algorithm on some randomly generated data and test results show that the algorithm gives very good solutions.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • 제27권2호
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.