• Title/Summary/Keyword: 계정

Search Result 447, Processing Time 0.026 seconds

스웨덴 연금개혁 고찰에 따른 시사점

  • Choe, Su-Ji
    • Journal of Teachers' Pension
    • /
    • v.2
    • /
    • pp.243-274
    • /
    • 2017
  • 최근 우리나라는 유례를 찾아볼 수 없을 정도로 고령화 진행속도가 빠른 나라로 공적 연금재정과 연금제도의 지속가능성에 대한 관심이 증가하고 있는 상황이다. 따라서 사회보장제도 개혁에 성공한 국가로 잘 알려진 스웨덴 사례를 통해 사학연금제도의 유지 및 장기적 재정안정화에 시사하는 바를 찾고자 한다. 스웨덴 정부는 인구고령화에 따른 위험에 상대적으로 안전한 '명목확정기여(Notional Defined Contribution)'방식을 도입하여, 개인의 연금계좌에 연금보험료를 적립하여 수급시점에 본인이 부담한 보험료 상당액을 연금으로 돌려받을 수 있도록 운영하고 있다. 또한 경제상황이 예상 수준보다 침체되고 연금 재정수지가 악화될 경우 이와 연계하여 자동으로 연금가입자의 부담금을 높이고, 지출되는 급여액을 감소시키는 '자동재정균형장치(Automatic Balancing System)'를 도입하였다. 상기와 같이 기여와 급여를 명확하게 연계시키는 스웨덴의 명목확정기여 방식의 연금제도는 장기적 재정안정은 물론이고 안정적인 연금 급여를 제공한다고 평가되고 있다. 스웨덴은 연금개혁 후 확정기여(DC)제도로 전환하여 장기적인 제도 안정성을 추구하지만 사학연금은 확정급여(DB)제도를 유지하면서 급여수준의 하향조정과 보험료율을 점진적으로 상향시켜 재정안정성을 확보하는 것이 가장 큰 차이점이다. 스웨덴의 연금제도와 같이 공적연금의 틀을 유지하면서 사적연금의 장점을 최대로 수용한 명목확정기여 방식의 연금제도를 도입한다면 급격한 재정부담 없이 장기적으로 지속가능한 연금재정 안정화에 기여할 수 있을 것이다. 일견 스웨덴의 정치, 경제상황 및 문화적 특성 차이로 인해 스웨덴의 연금제도 방식을 획일적으로 사학연금제도에 적용하는 것은 불가능하다. 경제상황을 고려한 기여와 급여의 연계 강화를 개혁의 기본방향으로 설정한 스웨덴의 사례를 벤치마킹하여 사학연금 또한 거시경제상황과 조화를 이루는 제도개선 및 자동안정장치를 마련해 보는 것도 고려해 봄직 하다. 지속적으로 스웨덴 및 연금제도 선진 국가들의 연금개혁안을 재검토하여 사학연금제도에 현실적으로 적용할 수 있는 방안과 시사점들을 찾는 노력이 필요할 것이다.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

Study on the Shear Characteristics by using the Hot Mechanical Piercing during the Hot Stamping Process (열간 기계적 피어싱을 이용한 핫스탬핑 전단특성 연구)

  • K. J. Park;J. M. Park;J. Y. Kong;J. Y. Kim;S. C. Yoon;J. S. Hyun;Y. D. Jung
    • Transactions of Materials Processing
    • /
    • v.32 no.2
    • /
    • pp.81-86
    • /
    • 2023
  • The hot stamping process is widely used for high strength of vehicle parts, with heating 900 ℃ or higher in a furnace and in-die quenching to achieve strength above 1.5 GPa of the quenchable boron alloyed steel 22MnB5. First of all, the hot stamping process consisted of heating, forming, quenching and trimming. In the trimming process case, the laser method has been conventionally adopted. For laser trimming process, it has the problems pertaining to low productivity and high cost while the hot stamping process, accordingly the trimming process need to investigate the research for alternative method. In order to overcome these issues, many research groups have studied the mechanical trim solution on the hot stamped parts at high temperature. In this study, the mechanical piercing was performed during the hot stamping process at the high temperature for overcome the disadvantages of laser cutting. Also, the process parameters such as piercing time after die closing, clearances of between die and punch were controlled for obtaining the reasonable shear characteristics.

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

Stand Water Balance and Stream Water Quality in Small Forested Watershed Yangpyong Gyeonggido (경기도(京畿道) 양평지역(陽平地域) 산림(山林) 소류역(小流域)의 수수지(水收支)와 계류수(溪流水)의 수질특성(水質特性))

  • Kim, Jung-You;Han, Sang-Sup
    • Journal of Forest and Environmental Science
    • /
    • v.17 no.1
    • /
    • pp.18-28
    • /
    • 2001
  • This study was carried out to investigate the characteristics of water quality variations by stand water balance in YangPyong-Gun Gejung-Lee small forest watershed. Water quantity. pH, $Cl^-$, $NO_3{^-}$, $SO_4{^{2-}}$, $Na^+$, $NH_4{^+}$, $K^+$, $Mg^{2+}$, $Ca^{2+}$ were monitored in open rainfall for one unit storm and long-term stream water in small forest watershed from January. 1998 to December. 1999. The results were summarized as follows: The runoff rate was 46.4% in 1998 and 52.2% in 1999. The average pH values of rainfall were 4.8 to 6.2 and those of stream water were 6.4 to 7.1 in small forest watershed. Total amount of input anion and cation values (kg/ha) in rainfall were $SO_4{^{2-}}>NO_3{^-}>Ca^{2+}>NH_4{^+}>Cl^->Na^+>K^+>Mg^{2+}$ and in stream water were $NO_3{^-}>Ca^{2+}>SO_4{^{2-}}>Na^+>Cl^->K^+>Mg^{2+}>NH_4{^+}$ in the order, respectively. The dissolved $NH_4{^+}$ was stored 5.29kg/ha and output of the other contents were more flow than input in small forest watershed.

  • PDF

Application of CBM-CFS3 Model to Assess Carbon Stock and Age Class Changes Over Long Term Forest Planning in a Korea's National Forest (산림탄소축적을 고려한 국유림 장기경영계획 수립을 위한 CBM-CFS3 모델의 적용)

  • Jang, Kwangmin;Won, Hyun-Kyu;Kim, Young-Hwan;Tak, Kwang-IL;Shin, Man Yong;Lee, Kyeonghak
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.4
    • /
    • pp.591-597
    • /
    • 2011
  • Forest carbon stock changes in a national forest were assessed by CBM-CFS3 model with different management scenarios to support decision making for a long term forest planning. Management scenarios were composed with 4 different levels of timber harvesting - current harvesting level (scenario1), 30% increment in each period (scenario2), 3 times increment (scenario3), and 5 times increment (scenario4). For each scenarios, changes in total carbon stocks, carbon stocks of each carbon pools, carbon stocks of harvested wood products (HWP) and age class structure were estimated over 100-year planning horizon. The estimated total carbon stock including HWP at the end of final period (100 years) was 433.1 tC/ha under scenario 1, but the age class structure has skewed right to the upper classes, which is not desirable for sustainable forest management. Under the scenario 4, however, the total carbon stock decrease to 385.5 tC/ha and the area of old growth forest show a significant decline. The estimated total carbon stock under scenario 2 and 3 were 411.7 tC/ha and 410.5 tC/ha respectively, and it was able to maintain the initial level of the forest carbon stocks during the planning horizon. Also the age class structures under the scenario 2 and 3 were evenly distributed from class 1 to class 8. Overall, scenario 2 and 3 were the most acceptable forest management options, in terms of carbon stock changes and age class structure.

Growth Environment and Vegetation Structure of Native Habitat of Corydalis cornupetala (쇠뿔현호색 (Corydalis cornupetala Y.H.Kim et J.H.Jeong) 자생지의 생육환경과 식생구조)

  • Sung, Jung-Won;Yi, Myung-Hoon;Yoon, Jung-Won;Kim, Gi-Song;Shin, Hyun-Tak;Kim, Yong-Shik
    • Korean Journal of Environment and Ecology
    • /
    • v.27 no.3
    • /
    • pp.271-279
    • /
    • 2013
  • The species of Corydalis cornupetala Y.H.Kim et J.H.Jeong Which is belong to the Corydaliaceae is only distributed at the Gyaejeong Forest in Gyeongsan. As one of the spring ephemeral plants, this species has limited growing period. The present study is on site characteristics and vegetation structure in the wild habitats of Corydalis cornupetala Y.H.Kim et J.H.Jeong and offers basic information on habitat conservation including recovery plan. The soil texture is silty loam and soil acidity is ranged as pH 5.4~5.9. The electric conductivity was 0.22-0.50 ds/m and soil organic content is ranged as 7.61~15.78 %. Fifty nine vascular plants were identified from 5 quadrats. According to the two way cluster analysis applied by the PC-ORD, the community was classified as Acer ginnala, Vicia amoena and Stellaria aquatica. The habitat of Corydalis cornupetala Y.H.Kim et J.H.Jeong was determined by the dissimilarity indices rather than the species number of appearance. Species diversity was 1.26, and dominance and evenness were found to be 0.08 and 0.92, respectively.

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

Development of Software Education Support System using Learning Analysis Technique (학습분석 기법을 적용한 소프트웨어교육 지원 시스템 개발)

  • Jeon, In-seong;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.2
    • /
    • pp.157-165
    • /
    • 2020
  • As interest in software education has increased, discussions on teaching, learning, and evaluation method it have also been active. One of the problems of software education teaching method is that the instructor cannot grasp the content of coding in progress in the learner's computer in real time, and therefore, instructors are limited in providing feedback to learners in a timely manner. To overcome this problem, in this study, we developed a software education support system that grasps the real-time learner coding situation under block-based programming environment by applying a learning analysis technique and delivers it to the instructor, and visualizes the data collected during learning through the Hadoop system. The system includes a presentation layer to which teachers and learners access, a business layer to analyze and structure code, and a DB layer to store class information, account information, and learning information. The instructor can set the content to be learned in advance in the software education support system, and compare and analyze the learner's achievement through the computational thinking components rubric, based on the data comparing the stored code with the students' code.