• Title/Summary/Keyword: 보호종료

Search Result 86, Processing Time 0.026 seconds

A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information (개인정보보호 강화를 위한 위탁 업무 보안관리 프레임웍 제안)

  • Ko, Youngdai-Dai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.383-393
    • /
    • 2015
  • Recently, the number of companies consigning their personal information management work has been increasing; they consign the work for various reasons and purposes, for example, in order to reduce costs related to personal information managers, improve efficiency through professional performance and to improve service quality. As such, since the cases where an consigning agency - not the personal information manager - handles personal information are increasing due to the increase of consigning of the personal information management work, we need to concerned with and pay attention to how much such agency makes efforts for personal information protection. In this regard, this study suggests a plan for efficient management of the agency during the course of consigning work as well as a list of requirements for personal information protection to be considered in each phase of the following; establishment of personal information protection framework for all consigning work processes, selection of consigning agency, execution of consigning contract, operation and management of consigning work, and termination of contract.

The Effect of Resiliency Training Program for Child Protection Agency Counselors to Prevent Secondary Traumatic Stress (아동보호전문기관 상담원을 대상으로 한 이차외상스트레스 예방을 위한 레질리언스 훈련 프로그램의 효과 연구)

  • Hyun, Jinhee;Kim, Heeguk
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.532-545
    • /
    • 2019
  • The objective of this study is to find out the effect of the secondary traumatic stress prevention program for counselors at child protection agencies. The quasi-experiment design was used for pre-test, post-test, and for follow-up test, performed 3 months after the program. Experimental group consisted of 9 counselors, while the comparison group consisted of 10 counselors. As a result, it was revealed that secondary traumatic stress prevention program was effective in decreasing the secondary traumatic stress and depression of the counselors, and also effective in increasing stress coping even though it was not statistically significant. Follow-up test did not present statistically significant changes in secondary traumatic stress, depression, and stress coping. It was found that, to achieve continued effect of the program, much longer and sustained program is required. Based on these findings, the necessity and application of the secondary traumatic stress prevention program were suggested.

Lock-up Expiration and VC Investments: Impact on Stock Prices (의무보유 종료와 VC투자가 주가에 미치는 영향)

  • Lee, Jinsuk;Hong, Min-Goo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.133-145
    • /
    • 2023
  • This paper examines whether investors have adapted to the venture capital(VC) investment style. VC firms invest in privately held companies and generate returns by selling them after the lock-up period expires. We analyze the impact on stock prices before and after the lock-up period expiration, and compare the Cumulative Abnormal Return(CAR) between the past period(2015-2017) and the recent period(2020-2022) to investigate the effect of the second venture boom. The main findings are as follows. First, unlike in the past, stock price returns around the lock-up period expiration have been lower than the KOSDAQ index in recent years. Second, the impact on stock prices is significant for both 1-month and 12-month lock-up periods. Specifically, it is confirmed that stocks held by venture capital and professional investors with a 1-month lock-up period respond in advance to their information after the second venture boom. Finally, we find that there is a difference in CAR depending on whether or not the company received VC investment after the second venture boom. Based on our findings, we suggest that VC firms need to revise their exit strategies to improve performance. This includes finding ways to reduce information asymmetry and fees, as well as developing strategies to mitigate market volatility. Additionally, the current lock-up period for VCs should be reconsidered as it may increase the risk of stock price decline. We recommend that the government revise the scope and duration of lock-up periods to protect investors after IPO.

  • PDF

The Effects of a School Zone Improvement Project on Crash Reduction Regarding Land Use Characteristics (토지이용 특성별 어린이 보호구역 개선사업의 교통사고 감소효과 분석)

  • Lee, Soo-Beom;Jung, Do-Young;Kim, Do-Gyeong
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.3
    • /
    • pp.109-117
    • /
    • 2008
  • The first phase of School Zone Improvement Project introduced to enhance the safety of school-routes were completed by 2007 and the second phase of the project will be continued from 2008 to 2012. Since a huge budget is required for the project, there is a need to evaluate how many child-related crashes were reduced through the project, prior to the implementation of the second phase. Therefore, this study aims to analyze the influence of the School Zone Improvement Project on reduction in child-related crashes with data collected from the database of the National Police Agency. This study employed a Before-and-After study with comparison group to assess how many crashes were reduced. The results showed that the number of child-related crashes were decreased by 10, which is about 39% reduction in crash frequencies. With respect to the land use characteristics of school zones, the number of reduced crashes in residential zone, commercial zone, and mixed zone were 2.41, 3.8, and 0.5, respectively. The results may provide a significant implication for the second phase of the project that there is a need to establish different plans for improvement project with respect to land use characteristics.

Protection Ratio between ATSC Digital Broadcasting and WiBro Systems (ATSC 디지털 방송시스템과 WiBro 시스템 간 보호비 도출 연구)

  • Lee, Hui-Soo;Kang, Dong-Hoon;Park, Hyo-Bae;Oh, Wang-Rok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.61-65
    • /
    • 2009
  • It is crucial to derive a protection ratio between two communication systems before deploying a new communication systems in the vicinity of frequencies occupied by the existing communication systems. In this paper, computer simulation based protection ratio estimating scheme between ASTC (Advanced Television Systems Committee) digital broadcasting systems and WiBro (Wireless Broadband Internet) systems is proposed. The proposed scheme can be effectively exploited when a new communication services are deployed in the surplus frequency band after the expiration of the analog television broadcasting scheduled in 2012 in Korea.

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.

Evaluation of Radiation Exposure to Medical Staff except Nuclear Medicine Department (핵의학 검사 시행하는 환자에 의한 병원 종사자 피폭선량 평가)

  • Lim, Jung Jin;Kim, Ha Kyoon;Kim, Jong Pil;Jo, Sung Wook;Kim, Jin Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.20 no.2
    • /
    • pp.32-35
    • /
    • 2016
  • Purpose The goal for this study is to figure out that medical staff except Nuclear Medicine Department could be exposed to radiation from the patients who take Nuclear Medicine examination. Materials and Methods Total 250 patients (Bone scan 100, Myocardial SPECT 100, PET/CT 50) were involved from July to October in 2015, and we measured patient dose rate two times for every patients. First, we checked radiation dose rate right after injecting an isotope (radiopharmaceutical). Secondly, we measured radiation dose rate after each examination. Results In the case of Bone scan, dose rate were $0.0278{\pm}0.0036mSv/h$ after injection and $0.0060{\pm}0.0018mSv/h$ after examination (3 hrs 52 minutes after injection on average). For Myocardial SPECT, dose rate were $0.0245{\pm}0.0027mSv/h$ after injection and $0.0123{\pm}0.0041mSv/h$ after examination (2 hrs 09 minutes after injection on average). Lastly, for PET/CT, dose rate were $0.0439{\pm}0.0087mSv/h$ after examination (68 minutes after injection on average). Conclusion Compared to Nuclear Safety Commission Act, there was no significant harmful effect of the exposure from patients who have been administered radiopharmaceuticals. However, we should strive to keep ALARA(as low as reasonably achievable) principle for radiation protection.

  • PDF

Battery Equalization Circuit using Charge Control Scheme (전하 제어법을 이용한 배터리 균등화 회로)

  • Chun, Chang-Yoon;Shin, Jong-Won;Kim, Jong-Hoon;Cho, Bo-Hyung
    • Proceedings of the KIPE Conference
    • /
    • 2010.07a
    • /
    • pp.422-423
    • /
    • 2010
  • 직렬 연결된 배터리는 각 셀의 내부 화학적 특성 차이로 인해 동일 전류로 충전 및 방전 과정을 진행하여도 셀 간에 미세한 전압 차이가 발생한다. 이러한 셀 간 전압 불균형은 배터리 셀에 해로운 영향을 끼치게 되는데, 2차 전지의 경우 배터리 용량의 변화를 야기한다. 이러한 문제를 해결하기 위해서 배터리 운용 범위를 제한하는 보호회로가 있지만 보호회로는 직렬 연결된 배터리 셀 중 가장 전압이 높거나 가장 낮은 셀을 기준으로 충전과 방전 사이클을 종료시키므로 배터리 팩의 용량을 최대한으로 사용하지 못하게 하는 문제를 발생시킨다. 배터리 균등화 회로는 셀 간의 전압 차이를 줄여 배터리의 최대 용량을 사용하고자 하는 목적을 가진다. 저항을 기반으로 하는 수동적인 방법과는 달리 스위칭 소자를 이용하는 능동적인 방법에서는 스위칭으로 인해 입출력 전압 변동이 발생하여 컨버터 내부에 흐르는 전류가 수시로 변하는 문제가 생긴다. 위 문제를 해결하기 위한 방법으로 본 논문에서는 배터리 균등화 회로에 전하 제어(Charge control)기법을 제안하고, 그에 따른 회로 설계 요소를 제시한다.

  • PDF

An Empirical Study of Security for API in Windows Systems (윈도우즈에서 제공되는 기본 API에 대한 안전성 고찰)

  • Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we test for security targeting on APIs of Windows as that is used by many people worldwide. In order to test APIs in DLL fils of Windows OS, we propose Automated Windows API Fuzz Testing(AWAFT) that can execute fuzz testing automatically and implemented the practical tool for AWAFT. AWAFT focuses on buffer overflows and parsing errors of function parameters. Using the tool, we found 177 errors in the system folder of Windows XP SP2. Therefore, AWAFT is useful for security testing of Windows APIs. AWAFT can be applied to libraries of third party software in Windows OS for the security.

A Study on the Establishment and Operation of the Electronic Research note system in a closed network (폐쇄망에서의 전자연구노트 시스템 구축 및 운영 방안에 관한 연구)

  • Kim, Youngin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.135-141
    • /
    • 2022
  • It is an important role of a researcher to preserve the research process and results as a record in the overall R&D from the planning stage to completion. This can be used as a basis to support the objectivity of the R&D process and results. This can be used as a basis to support the objectivity of the R&D process and results. The necessity of writing research notes is raised in terms of research ethics, records management, intellectual property rights protection, and research results protection according to 「National Research And Development Innovation Act」. Therefore, in this paper, the results of the systematic and practical management method of research notebooks operated by government-funded institutions are described.