• Title/Summary/Keyword: 대처 행위

Search Result 192, Processing Time 0.026 seconds

Active Coping of Spouses of Domestic Violence Perpetrator who Completed Batterer Intervention Program and Recidivism: Study of Follow-up Evaluation for Domestic Violence Batterer Intervention Program (가정폭력 치료 프로그램 이수자 아내의 능동적 대처가 재폭력에 미치는 영향 : 아내의 문제해결과 도움요청의 조절효과를 중심으로)

  • Kim, Jae Yop;Jung, Yun Kyoung;Song, Ahyoung
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.4
    • /
    • pp.217-238
    • /
    • 2011
  • This study aims to investigate the effects of active coping of spouses on recidivism of domestic violence. In order to obtain better study results, 21-month follow up interview was conducted for spouses of batterers who completed domestic violence batterer intervention program. Spouses were interviewed for three times; 9-month, 15-month, and 21-month after program completion. Finally, data till 15-month follow-up was used to manage sample size problem. As a results, a total number of 76 spouses were included for final analysis. Data was collected from 2008 to 2009. Based on sample size and study objects, PLS(Partial Least Square) analysis was used. the prevalence rates of emotional abuse was 77.6% at the first interview but 41.3% at the second interview. For physical violence each rate were 43.1% and 18.4%. For emotional violence, problem-solving strategy among active coping shows significant moderating effects on reducing emotional violence(p<.001) while help-seeking among active coping has significant effects on decrease physical violence(p<.01).

A study on the school health education curriculum development focused on the health education course in primary school (국민학교 보건교육 교과과정의 개선방안에 대한 연구)

  • Kim, Hwa-Joong;Lee, In-Sook
    • Journal of the Korean Society of School Health
    • /
    • v.5 no.1
    • /
    • pp.36-63
    • /
    • 1992
  • The purpose of this study was development of school health education curriculum in primary school based on analysis of the textbooks published in 1991. 1) The health education curriculum in primary school consisted of four major components such as health education aspects of the healthful school environments, health education aspects of school health services, health education course, and health instruction in related subjects. However, health instruction taught by physical education, biology, and other health related subjects was not systematic organization for health care. 2) A considerable amount of health knowledge and attitude, and some health practices was learned as the result of experiences in other courses, where there was little or no reference to health. It must be developed health edcation course separated from health related subjects. 3) Direct health insruction was represented by the health education course. The health education courses must be considered to be heart of the school health education curriculum. 4) The health education course developed by this study was consisted of eight health units and problems in the early elementary grade or health classes in the higher years. 5) The health education course developed by this study provided the opportunity for acquring new knowledge, attitude, and practice, for discarding the unhealtful attitude and strengthening the healthful attitude and practices of primary school students.

  • PDF

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

A Study on the need of the Implementation for Criminal Penalty of Stalking (스토킹 처벌규정 도입의 필요성에 대한 고찰)

  • Jang, Jeongbeom;Lee, Sangcheol
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.220-228
    • /
    • 2014
  • A stalking is becoming more diverse and the methods are developing over time as the society has changed over time due to the advancement of information technology but an initial countermeasure seems to be difficult as there is no sufficient legislations against such crimes as stalking. Our country passed laws regulating such stalking at 1999 and four more additional bills were proposed until the 18th National Assembly but they failed to become legalized. Two more additional bills were proposed during 19th National Assembly which are still pending. Crimes such as stalking violates and invades physical and psychological freedom of the victims and the crimes are severely inveterate and intentional. Advanced countries such as the United States, the Great Britain, Germany, and Japan enacted legislations that strictly regulates stalking and also appropriate responses. As these exemplary cases show, it is essential that our country also requires an effective legislations against crime of stalking and protecting a victim of the crime.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

The Study of Protective Solution and People in Technology Outflow about SMEs (중소기업 기술유출 및 기술인력 방지제도에 관한 연구)

  • Chung, Jason
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.133-152
    • /
    • 2015
  • Cause of the technology leakage and trade secrets can be leaked to the lack of infrastructure, lack of coping skills of SMEs. In addition, small businesses can avoid technology outflow and re-experience the same half of the damage, even when the external leak developed after the fact and does not demonstrate such technology leakage time for the technology and situation which did not take any action, security, infrastructure investments difficult, work-related knowledge, lack of security, trade secret protection dedicated staff, inadequate legal and institutional measures have been identified as such complaints to date. For subcontracting, etc. mid-sized transactions, hinder the growth of SMEs, SME cross-technology leakage to the increase in unfair practices, including useful, and this has been accompanied by growth-based business-to-business it weakened.

  • PDF

Intermediator Pattern for Interoperability of Business Components (비즈니스 컴포넌트의 상호운용성을 위한 Intermediator 패턴)

  • 이창목;유철중;장옥배;문윤호
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.4
    • /
    • pp.443-454
    • /
    • 2001
  • Software design patterns are reusable solutions to recurring problems that occur during software development. As programmers gain experience, they recognize the similarity of new problems to problems they have solved before. With even more experience, they recognize that solutions for similar problems follow recurring patterns. In this paper, as one of these reusable design-patterns, the Intermediator pattern for the efficient communication between business component is designed and implemented. Existent business components were way that follow Facade pattern. But Facade pattern is almost like the existing Interface pattern in that the communication of all the object outside the set is done by only one representative object, and this causes the traffic system to be overloaded. Therefore, the Intermediator pattern supplements the traffic overloads by improving the inefficient system of business components' communication through multi-interface, and make all communication behavior between objects done by Intermediator object which controls all actual behavior by way of Intermediator method implementation. Consequently, the Intermediator pattern is designed and implemented in this paper can bring down the level of coupling and raise the cohesion among objects, and refer to many of other object flexibly through several interfaces.

  • PDF

A Study on the Countermeasures of Cyber Crimes Among Nations - Focusing on the Global Governance - (국가간 사이버범죄 대응체제 구축에 관한 연구 - 글로벌 거버넌스적 측면에서 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.307-318
    • /
    • 2005
  • Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. It was not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.

  • PDF

A Study on Utilization and its Model of the Private Military Companies(PMCs) in Introducing the Legal System in Korea (민간군사기업의 법제화 필요성과 그 모델에 관한 연구)

  • Kwak, SunJo
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.149-161
    • /
    • 2018
  • The private military company(PMC) or the private military industry may be one of the most important, but little understood developments in security studies to have taken place over the last decade. This new industry, where firms not only supply the goods of warfare, but rather fulfill many of the professional service functions, is not only significant to the defence community, but has wider ramifications for global politics and warfare. The private military industry emerged in the early 1990s. Its underlying cause was the confluence of three momentous dynamics - the end of the Cold War and the vacuum this produced in the market of security, transformations in the nature of warfare, and the normative rise of privatization. In order to introduce MPFs(Military Provider Firms) into Korea, where in principle private citizens are prohibited to own a gun, unlike the United States, a special law should be enacted which allows them to possess weapons and fight in combat. Therefore, the National Assembly of Korea has been submitting and discussing "the Act on the Prevention and Conduction of Practice of Piracy" since 2014.

  • PDF

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.