• Title/Summary/Keyword: 대처 행위

Search Result 190, Processing Time 0.027 seconds

Optimum Arrangement of Groundwater monitoring well (하천변 지하수 관측정 최적 배치 방안)

  • Lee, Seung-Hyun;Park, Joon-Hyeong;Kim, Gyoo-Bum
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.423-427
    • /
    • 2012
  • 지하수 관측이란 지하수위 하강, 수질오염 등 지하수 장해로부터 지하수를 보전 관리하고 대책을 수립하기 위하여 정기적 및 장기적으로 지하수위, 수질 등 부존된 지하수 특성의 상태와 변화하는 추이를 관찰하여 측정하는 행위를 말한다. 지하수는 지하의 보이지 않는 지층구조에서 매우 천천히 유동하므로 수위하강 및 수질오염 발생을 늦게 인지할 경우 원상회복이 불가능할 수 있고, 지하수 장해를 인지한 이후의 대처과정에서도 기존의 관측자료가 없거나 부족할 경우에는 원인분석과 대책수립이 지연되거나 불가능할 수 있으므로 지하수관리에 있어 관측정호를 설치하고 정기적으로 지하수의 부존 및 유동특성, 배경수질 등의 지하수 관측은 기본적이며 필수적인 요소이다. 따라서 지하수 관측망을 설치하고 운영하기 위해서는 관측 목적을 명확히 정의하고 관측 프로그램이 이를 만족시키도록 구성되어야하며 시간적, 공간적으로 지하수가 변동되는 것을 고려하여 관측 지역 대수층의 유형과 특성 등이 완전히 파악되어야 한다. 필요시 기존 관정을 활용하여 관측하며 관측 항목, 관측 유형, 위치측량 및 관측 주기 등은 관측의 목적에 부합되도록 한다. 관측 데이터의 생성, 전송 및 분석 진행과정 등이 완벽하게 정립되어 데이터의 생성에서부터 활용까지 체계화되어야 하고 지하수와 지표수는 연계된 단일 수자원으로서 지하수 관측은 지표수 관측과 연계되어 설계되고 분석되어야 한다. 또한 취득된 데이터의 정확성은 지속적으로 검토 확인되어야 하며 전문가의 능력을 활용하여 관련 자료의 분석이 이루어지고 데이터의 정도를 높이기 위한 후속조치들이 병행되어야 한다. 그리고 지하수위, 수질 등 관측 자료가 자연적인 지하수 유동 체계에 의하여 변화되는 것이라고 인식될 경우에는 관측 시스템 전반을 재평가하여 보다 효율적인 관측 시스템으로 발전시켜야 한다.

  • PDF

The Mobile Security Diagnostic System against Smart-phone Threat (스마트폰 악성코드 대응을 위한 모바일 보안 진단 시스템)

  • Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.537-544
    • /
    • 2012
  • With wireless network infrastructure, the number of smart-phone users is remarkably increasing in the world and the amounts of damage due to the smart-phone malwares are also raised. Many security solutions for wireless network have come into the market but these solutions are for companies or large enterprises, therefore, the public users of smart-phone don't feel easy to select as their solutions and it is difficult to detect unknown malwares. In this paper, we propose the mobile security diagnostic system for public smart-phone users, which provides functions like smart-phone system check, comparison with blacklist of applications and collecting malwares.

A Comparative Study on Radiation Safety Management Knowledge, Attitudes and Behavior of Career Dental Hygienists and New Dental Hygienists (경력 치과위생사와 신입 치과위생사의 방사선안전관리 지식, 태도 및 행위에 대한 비교조사 연구)

  • Yoon, Jung-Ae
    • Journal of dental hygiene science
    • /
    • v.11 no.3
    • /
    • pp.173-179
    • /
    • 2011
  • This study identified knowledge, attitudes and behavior for radiation safety managemen of career dental hygienists and new dental hygienists. Results obtained from this study are as follows. 1. Regarding the knowledge level of radiation safety management, average score was $8.25{\pm}2.47$ for career dental hygienists and $7.42{\pm}2.77$ for new dental hygienists from 15 scale test.(p<.001). In addition, knowledge level of radiation safety management by general characteristics showed statistically significant difference according to health status(p<0.01). 2. Regarding the attitude level of radiation safety management, average score was $4.35{\pm}0.55$ for career dental hygienists and $4.19{\pm}0.60$ for new dental hygienists from 5 scale test.(p<0.01). 3. Regarding the behavior level of radiation safety management, average score was $3.14{\pm}0.98$ for career dental hygienists and $3.33{\pm}0.99$ for new dental hygienists from 5 scale test.(p<0.05). In addition, the behavior level by general characteristics showed statistically significant difference according to attendance rate of radiation safety management training (p<0.01) and defences of clinic (p<.001). 4. Based on the survey of relationship among knowledge, attitude and behavior of radiation safety management, we found that the higher the knowledge level of radiation safety management was, the higher the level of attitude was(p<.001).

An Interpretive Study on Delinquency Experiences of Runway Youths (가출 청소년의 비행 경험에 대한 해석적 연구)

  • Kim, Ji-Hye
    • Korean Journal of Social Welfare
    • /
    • v.54
    • /
    • pp.99-121
    • /
    • 2003
  • The purpose of this study is to explore the process that youths get involved in delinquent behavior after runaway. The experiences of runaway youths are studied interpretively, so that interactive features between situations and the youths are revealed. In this way, it is expected that directions in social services to prevent and intervene with delinquent behaviors of runaway youths can be suggested. Eleven youths who have experienced running-away participated in the in-depth interviews. Their narratives are interpreted through the procedures of interpretive interactionism by Denzin(1989). Five phases of the delinquency process have been discovered: Using personal resources, getting help from new relationships, exploring alternatives to survive, learning delinquent way of living, and living independently through delinquency. Interpreted contextually, it has been founded that delinquency is a behavior to survive and a developmental process on the street, taking place in a situation of blocked communication, nevertheless within people's networks. Thus, it is suggested that the problem of runaways are not to be treated narrowly as responsibilities of the youths themselves or their families, but to be approached from the viewpoint of providing social service systems that work as a safety network and offer alternatives for the youths to survive, to resolve their troubles, and to keep healthy lives.

  • PDF

A Study on the Qualifications of Designated Person on the Maritime Safety Act (해사안전법상 안전관리책임자 및 안전관리자의 자격요건에 관한 연구)

  • Jin, Ho-Hyun;Kim, Jin-Kwon
    • Journal of Navigation and Port Research
    • /
    • v.37 no.5
    • /
    • pp.519-526
    • /
    • 2013
  • In managing shipping business, the concept of seaworthiness of the vessel has developed in accordance with the development of the shipping industry. However, despite of the development of the vessel's seaworthiness, marine accident has continuously occurred at sea. International Maritime Organization(IMO) has paid attention to the research and investigation of Human Error in shipping operations in addition to physical seaworthiness of the vessel. In 1994, IMO adopted the "International Management Code for the Safe Operation of Ships and for Pollution Prevention(ISM code)" of "SOLAS 1974" Annex, to take countermeasure against this human error. In 1999, Korea adopted the 'ISM Code' and then enacted the Maritime Safety Act (previously Maritime Traffic Safety Act). The Maritime Safety Act regulates necessary qualifications of the Human Resources of shipping companies for establishment and implementation of the safety management system. However, there has been a discrepancy between shipowners and ship management companies in interpreting the legislative texts, finally causing confusion. In this paper, I would like to examine the deficiencies in the regulation on the standard of qualifications of the Designated Person under the Maritime Safety Act and thereby suggest any possible improvements in it.

A Study on Airlines' Choice Behavior of Aircraft Size (항공사의 항공기 용량 선정 행위에 관한 연구)

  • Kim, Bong-Gyun;Yoo, Kwang-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.4 no.2
    • /
    • pp.114-131
    • /
    • 2000
  • An airline should consider the number of seats or size of aircraft, when it composes fleet or selects a type of aircraft for some routes. There are two major factors considered for this choice problem under the assumption that the objectives of an airline is a profit maximization: the operating cost and revenue from the aircraft operated. This research tries to solve the problem of aircraft size selection by airline. The study applies four steps to get optimal choice of aircraft size: (1) cost analysis for the relationship between airline operation cost and aircraft size: (2) market share and revenue analysis: (3) flight segment-level analysis, based on the derived cost, demand and revenue functions: and (4) network-level analysis to see how airlines make choice of aircraft size systematically at a network level. An airline can accommodate the increasing air travel demand by either increasing operation frequency, or increasing aircraft size that is represented by seat capacity, or both. Airport runway capacity and productivity depend on the size of aircraft used at airport. This paper presents the understanding of how airlines make decisions on the size of aircraft to operate, how they will adjust their choices when airport capacity is constrained, and how public regulation such as policy for landing fees could influence airlines' aircraft choice.

  • PDF

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

A Teaching-Learning Model for Cultivating Consciousness of Information and Communication Ethics by the Establishment of Ego Identity on Cyberspace (사이버 공간상의 자아정체성 확립을 통한 정보통신윤리 의식 함양 교수-학습 모형)

  • Sin, Mi-Jin;Lee, Jae-Woon;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.3
    • /
    • pp.97-107
    • /
    • 2006
  • The deviant behaviors on cyberspace in Korea are increased recently because of the unbalanced development between the social ethics and the technological improvement on information and communication technology. To overcome this, educations on information and communication ethics are executed in school. However most of the educations is to deliver the knowledge on the disfunction of informationization and rules of netiquette without the analysis of the psychological characteristics on the cyberspace. Therefore, educations on information and communication ethics, in which the changes of social behaviors and value attitude are essential, is ineffective by making the students as passive and enervated users. In this research, we developed a teaching-learning model for cultivating consciousness of information and communication ethics by the establishment of ego identity on cyberspace and then proved the effectiveness by the experiment in school. Students can raise their abilities on active dealing with the given situation and context according to this teaching-learning model.

  • PDF

From Environmental Movement to Smart Growth Policy - The Case of Austin, Texas -

  • Jung, Ju-Chul
    • Journal of Environmental Policy
    • /
    • v.5 no.1
    • /
    • pp.71-97
    • /
    • 2006
  • This paper explores the history of environmental movements and policymaking in the city of Austin, TX and addresses the most recent element of the city's environmental policy, the Smart Growth Initiative. Austin's intense growth over the last 35 years has increased a growing awareness of environmental impacts by humans. The Austin municipal government has tried to adopt environmental measures and various policy initiatives ranging from comprehensive plans to its latest Smart Growth Initiative. The long history of comprehensive planning and watershed protection ordinances indicate that while environmental issues have continually presented as priority issues, it has failed to integrate as a part of the municipal government. This shows that the efforts of political actors have not been sufficient to sustain progressive environmental regimes with environmental issues despite the initial motivation of the state.

  • PDF