• Title/Summary/Keyword: public security environment

Search Result 419, Processing Time 0.023 seconds

Revitalization of Elementary School Plots, as Small Public Parks -A Case Study of School Subject Parks in Seoul - (소공원으로서 초등학교부지의 활용방안 - 서울시 학교공원화사업 대상지를 중심으로 -)

  • Nam, Mi-A;Lee, Eun-Heui
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.9 no.1
    • /
    • pp.14-30
    • /
    • 2006
  • It is difficult to secure public lots in the downtown area, school lots can be made the best use of important source to increase the area of green land in the city. The tree-planting campaign for schools has been in force since 1999 by the city of Seoul and at present; it is currently established as the plan of school parks. Thereupon, the purpose of this study is to present some ways to revitalize elementary schools to be used as vest pocket parks through the research of elementary schools, which are subject to the plan of school parks in Seoul. The results of this study are as below : The subjects to revitalize school parks as vest pocket parks are as follows. First, the land has to be utilized for security of space. Second, in addition to the front and back gate, another passage to the park has to be set up for easy access. Third, the fence has to be formed as a hedge used outside the park. Fourth, selecting plants, species of trees suitable for the landscape of school and taking into consideration the aspect of ecology. Finally, it is urgent to enact socially and economically proper standard of law by the new standards of area for school landscape considering not only the building law and regulations of general landscape, but also specific characteristics of school landscape.

A Study on the Optimal Public Service for Environmental Satellite Observation data (환경위성 관측정보의 대국민 맞춤형 서비스 제공 방안 연구)

  • Choi, Won Jun;Eun, Jong Won;Kim, Sang-kyun;Choi, Gwang-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.56-61
    • /
    • 2017
  • Recently, the satellite development project in Korea has been changing from demand to focus on various purposes. Especially, it is proposed to process satellite data from a simple terrestrial image observation satellite and to produce high value added information. In order to expand demand for satellite information, it is necessary to develop customized information and to provide information that reflects the needs of the final target population. In this study, we conducted a questionnaire survey and analyzed the results to analyze the requirements for the customized services of environmental satellites. As a result, the environmental satellites were found to have a low awareness due to the launch and operation, but they were highly aware of the recent environmental issues such as fine dust. In addition, they are aware of the necessity of developing independent environmental satellites because they have a strong desire for environmental security, and they prefer to provide materials through media that are easy to publicize and access through the media.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

Improvement Plan of the Korean Electronic Medical Record (우리나라 전자의무기록의 개선방안)

  • Choi, Chan-Ho
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.18 no.3
    • /
    • pp.11-21
    • /
    • 2014
  • The rapid development and distribution of information communication industry facilitates the changes of hospital administration, introducing EMR(Electronic Medical Record) instead of paper-based medical record in the medical field. The developed countries such as U.S. have established EMR system after in the middle of 1970s because the primary advantages of EMR is to store and handle vast amounts of records efficiently and increase the quality of health care. Most of health organizations in Korea also apply medical record system to their administration. As the result, they have accomplished a scientific administration system through the use of medical record to handle a variety of patient's information including patient's confidentiality and privacy such as family history, social status, income level, and so on. However, access to and the misuse of EMR causes illegal infringement of patient's information and finally it becomes a very serious medical issue. Potential leakage and misuse of records may seriously infringe patient's privacy rights. In this respect, the related agencies in the public and private sector have been making efforts to prevent patient's records leakages. Especially, the revision bill of Medical Law in 2002 establishes the ways on the security and standards of electronic records. However, it does not provide the proper guidelines which is applied to the rapid changes of the medical environment. One of the most priorities in the hospital administration is the production and maintenance of an accurate medical records fulfilled by medical recorders. Therefore, it is very important for health care providers to hire ethical-based medical recorders. But, unfortunately most of hospitals overlook the importance of their roles. All parts including government, physician and patient must have more concerns on the problems related to EMR. Therefore, this study aims to propose the proper ways to resolve the problems coming from EMR.

Security Model Tracing User Activities using Private BlockChain in Cloud Environment (클라우드 환경에서 프라이빗 블록체인을 이용한 이상 행위 추적 보안 모델)

  • Kim, Young Soo;Kim, Young Chan;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.475-483
    • /
    • 2018
  • Most of logistics system has difficulties in transportation logistics tracking due to problems in real world such as discordance between logistics information and logistics flow. For the solution to these problems, through case study about corporation, suppliers that transport order items in shopping mall, we retain traceability of order items through accordance between logistics and information flow and derive transportation logistics tracking model. Through literature review, we selected permissioned public block chain model as reference model which is suitable for transportation logistics tracking model. We compared, analyzed and evaluated using centralized model and block chain as application model for transportation logistics tracking model. In this paper we proposed transportation logistics tracking model which integrated with logistics system in real world. It can be utilized for tracking and detection model and also as a tool for marketing.

The Effect of Health Behavior and Oral Health Behavior on Community Periodontal Index in Korean Adult (한국성인의 건강행위와 구강건강행위가 치주조직병자율(CPI)에 미치는 영향)

  • Bok, Hye-Jeong;Ahn, Bun-Sook;Lee, Hee-Sung
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.2
    • /
    • pp.93-100
    • /
    • 2013
  • This study sought to explore the relationships between health behavior, oral health behavior and community periodontal index away the adult in korea. The date of 'The fifth korean national health and nutrition examination survey 2010' was analyzed for this study. The questionnaire was measured regarding health behavior, oral health behavior, community periodontal index and socio-economic characteristics. For statistical analysis, the SPSS 19.0 for Windows was used. We determined frequencies, percentage and determining statistical significance using multiple regression analysis. General characteristics showed differences in community periodontal index associated with residence, gender, age, income level, education, division of basic livelihood security. Health behavior showed differences in community periodontal index associated with smoking, AUDIT. Oral health behaviors showed differences in community periodontal index associated with dental care treatment, utilization of dental hospitals, dental check up, tooth brushing, use oral health supplies. In conclusion, in order to reduce community periodontal index of the adult, the importance and needs of periodontal status should be emphasized. periodontal status related education and program for the adult should be operated.

Efficient Key Agreement Protocols using Proxy Server (Proxy 서버를 이용하는 효율적인 키 분배 프로토콜)

  • Yang Hyung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.29-36
    • /
    • 2005
  • A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. Several efficient and secure key agreement protocols have been proposed so far since Diffie-Hellman proposed a public key agreement system in 1976. But, since Diffie-Hellman based key agreement protocols need a lot of computation to establish the session key, they are not suitable for wireless Internet environment. In this paper, we propose the efficient key agreement protocol using Proxy server. The Proposed Protocol gives the security equivalent to that the Diffie-Hellman based Protocol and the computation work of mobile user can be decreased using proxy server.

Study on the introduction and assessment of the Life Cycle Carbon Emissions in Office Buildings

  • Park, Mincho;Lee, Byeongho;Shin, Sung-Woo
    • KIEAE Journal
    • /
    • v.14 no.1
    • /
    • pp.49-57
    • /
    • 2014
  • Global warming has become a major issue all over the world. Noting the carbon dioxide emissions as a main contributor to global warming, we studied on the methods to reduce the life cycle building carbon emissions. Green Building Certification Criteria(GBCC) has been implemented since 2002 in Korea, but it doesn't estimate the quantities of the $CO_2$ emissions. Therefore, we studied the ways to implement the $CO_2$ emissions in quantity to GBCC. We select a government building which was rated excellent by the GBCC. This office building was regarded to excellent building by GBCC but not good for energy consumption. It was found energy glutton buildings for research by the Ministry of Public Administration and Security in 2010. This part of GBCC is need to be improved.. Also LCA (Life Cycle assessment) was carried out to estimate on carbon footprint on this office building. So we need to implementing quantitative evaluation on the amount of carbon emissions by GBCC. And it is possible to implementing quantitative evaluation on the amount of carbon emissions. Through this study, we expect that quantitative assessment of life cycle carbon emissions of buildings by the GBCC. Also expect to reduce the carbon emissions of the building by improving the GBCC.

Integration System of Several Housing Improvement Programs for Low-Income with Housing Benefit Reorganization (주거급여 개편에 따른 유사 주거환경 개선사업의 통합 운영 방안)

  • Moon, Hyogon;Paik, Hae Sun
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.113-121
    • /
    • 2015
  • Several housing improvement programs for low-income have done by Ministry of Health & Welfare, Ministry of Trade, Industry & Energy, Ministry of Security and Public Administration, Ministry of Environment, and Ministry of Land, infrastructure and Transport up to now. Each program practiced separately based on each agency's function and territory, but there are also negative opinion on beneficiary duplication, beneficiary omission, and the inefficient execution of the government budget. This study analyzes the housing improvement programs of each agency on the aspects of coordination, and suggests the integration system with coordination and delivery system. We selected 3 indexes such as similarity, integration effect and availability for integration system and analyzed the effects of integrated programs into one based on cost, repair effect and management. We proposed that the similar housing improvement programs of each agency should be coordinated for integration. But it is not easy to integrate similar programs into one program, therefore similar programs which support the house owner are needed to integrate into housing benefit except same beneficiary who owned own house.