• Title/Summary/Keyword: 생활 안전 보장

Search Result 81, Processing Time 0.024 seconds

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

Authentication Protocol of Private Code-based for Advanced Security of RFID System (RFID 시스템 보안 강화를 위한 비공개 코드 기반의 인증 프로토콜)

  • Jang, Bong-Im;Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.737-744
    • /
    • 2010
  • The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.

A Study on the Regional Resources Facilities Tax (지역자원시설세에 관한 연구 -구 공동시설세를 중심으로-)

  • Kim, Jin-Dong;Cha, Jong-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3223-3231
    • /
    • 2013
  • Fire service budget must be increased continually to supply sufficient fire service for safety life of people. A way to increases fire service budget is to plan and improve regional resources facilities tax system. The purpose of this articles is to analyzes the relationship between regional resources facilities tax and fire service budget, fire service investment budget, socioeconomic factor, fire service demand. To do this, this study sets up five hypotheses based on the theoretical backgrounds and the past research. The statistical methods used for the verification of hypotheses are multiple regression analysis and t test. The analysis showed that regional resources facilities tax was positive significant variable for fire service investment budget and fire service budget and socioeconomic factor was a positive significant variable for regional resources facilities tax. And the analysis showed that fire and rescue variable of fire demand factor were positive significant for regional resources facilities tax.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

The Intelligent Information Service Model of Urban Spatial Information for u-UIS - Focused on Urban Ground and Underground Facilities (u-UIS 도시공간정보 연계통합 모델 - 지상.지하시설물을 중심으로 -)

  • Kim, Eun-Hyung;Choi, Hyun-Sang;Kim, Tae-Hoon
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.189-194
    • /
    • 2009
  • With the rapid development of information and telecommunication technologies, the adoption of ubiquitous technologies is increasing for the realization of new effective u-City services. u-City is defined as a next-generation informatization city that can innovate a city's various functions, such as improving the welfare of the citizenry, ensuring safety based on systematic urban management, improving the quality of lives, and increasing convenience in city life, by merging cuttingedge information and telecommunication infrastructures and ubiquitous information services with urban space. There is therefore a need to recognize that a successful u-City implementation strategy involves developing the previous UIS into a ubiquitous technology-based UIS and integrating UIS's various urban informations with effective u-City services. In this paper, for UIS-based u-City implementation, the intelligent integration model of urban spatial information based on interoperability is proposed.

  • PDF

A Study on the Overseas Expansion Strategy of u-City based on BIM/GIS (BIM/GIS 기반 u-City 해외진출 전략 연구)

  • Na, Joon Yeop;Lee, Woo Sik;Hong, Chang Hee;Hwang, Jung Rae
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2012
  • u-City is next generation city which can innovate functions of city. It can realize increase of convenience, improvement of life quality and safety guarantee by convergence of information technologies and ubiquitous service with urban space. Market of u-City is in range of rapid growth and u-City can make enormous synergy effects by accompanying construction technologies with spatial information, sensor technologies, communications network and related equipments. In this study, we analyzed the domestic/abroad status, researches and element technologies involved in u-City. And, we suggested overseas expansion strategy of u-City such as selection and analysis of target nations, packaging method of u-City service models and application of BIM/GIS connection technologies in terms of u-City construction and operation.

Characteristics of Lithium-ion(Li-ion) Batteries according to Charging and Discharging by Scenario (시나리오별 충방전에 따른 리튬이온(Li-ion) 배터리 특성)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.171-176
    • /
    • 2023
  • In the modern society of the 21st century, portable electronic products using secondary batteries are continuously becoming lightweight and miniaturized. And along with this trend, we are active in the era of the Fourth Industrial Revolution, where we collect and share information in our daily lives using wearable electronic devices. Therefore, the role of secondary batteries that can be recharged while using small home appliances and digital devices is increasingly important. Along with this increase, secondary battery performance tests require various test methods such as characteristics, lifespan, failure diagnosis, and recycling. In addition, the construction of a battery test system to ensure the safety and proper functioning of the battery, along with guidelines and correct basic knowledge are being considered. Therefore, in this paper, we will examine the characteristics of the secondary battery Li-ion battery according to the charging and discharging scenarios directly connected to the performance of the battery.

A Comparative Legal Study on Safety and Transportation Convenience of Mobility Disadvantaged Persons (항공교통약자 안전 및 이용편의를 위한 비교법적 연구)

  • Hwang, Ho-Won;Cho, Jeong-Hyeon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.1
    • /
    • pp.63-97
    • /
    • 2016
  • Ago the passenger who using a wheelchair was denied boarding from the airline. The ACT ON THE PROHIBITION OF DISCRIMINATION AGAINST DISABLED PERSONS prohibits discriminatory treatment of persons with disabilities in transportation. But there are situations that limits the movement on persons with reduced mobility. The international community promote to protect disabled persons and persons with reduced mobility against discrimination and to provide them with assistance when travelling by air. According to news report, the governing Council of the International Civil Aviation Organization (ICAO) has established new global core principles on air transport consumer protection. The principles cover three phases of a customer's experience: before, during and after travel, and will now be considered by ICAO's 191 Member States when they develop or review their applicable national regimes. The international community are recognizing that passengers can benefit from a competitive air transport sector, which offers more choice in fare-service trade-offs and which may encourage carriers to improve their offerings, passengers, including those with disabilities, can also benefit from consumer protection regimes. In accordance with these we will also be provided to regulations that can prevent and protect the air passenger. In this paper analyze the regulations of the international air passenger rights, point out the lack of policy.

Analysis on Factors of Traffic Accident on Roads having Width of Less than 9 Meters (폭원 9m 미만 도로 내 교통사고 영향 요인 분석)

  • Lim, You-Jin;Moon, Hak-Ryong;Kang, Won-Pyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.3
    • /
    • pp.96-106
    • /
    • 2014
  • Necessarily traffic policies have been biased in car than pedestrian, so pedestrian's environment is getting worse. Result of this situation our accident rate is high as 36.4%, compared to OECD member countries with average rate of 17.8%(in 2009). Increasing interest for pedestrians environment improvement, and it make an effort to build environment to guarantee walk and safety of pedestrians. Analysis on the binary logistic regression(BLR) was used. The dependent variable is occurring from the road width of less than 9m accident, and independent variable extracted can be obtained from the traffic accident data. Traffic accident on roads having width of less than 9 meters affecting variables is when the driver is straight, when the driver is female, when the pedestrian is walk driveway, and so on. To prevent it, efforts is demanded to protect handicapped, to build safe pedestrians environment using C-ITS and to decrease speed of going straight vehicle on roads having width of less than 9 meters.

A Study on the Current State of the Integrated Human Rights of the Elderly in Rural Areas of South Korea (농촌지역 거주 노인의 통합적 인권보장 실태에 관한 연구)

  • Ahn, Joonhee;Kim, MeeHye;Chung, SoonDool;Kim, SooJin
    • 한국노년학
    • /
    • v.38 no.3
    • /
    • pp.569-592
    • /
    • 2018
  • This study purported to investigate the current state of human rights of older adults residing in rural areas of Korea. The study utilized, as an analytic framework, 4 priority directions (1. "older persons and development", 2. "rural area development", 3. "advancing health and well-being into old age", and 4. "ensuring enabling and supportive environments") with 13 task actions recommended by Madrid International Plan of Action on Ageing (MIPAA). Furthermore, the study examined gender differences in all items included in the analytic framework. Data was collected by the face-to-face survey on 800 subjects aged 65 and over. Statistical analyses were conducted using STATA 13.0 program. The main results were summarized in order of 4 priority directions as follows. First, average working hours per day were 6.2, and men reportedly participated in economic activities and needed job training more than women, while women participated in lifelong education programs more than men. Awareness of fire and disaster prevention facilities was low in both genders. Second, accessibility to the support center for the elderly living alone as well as protective services for the vulnerable elderly was found to be low. IT-based services and networking were used more by men than women, and specifically, IT-based financial transactions and welfare services were least used. Third, medical check-ups and vaccinations were well received, while consistent treatments for chronic illnesses and long-term care services were relatively less given. In addition, accessibility to mental health service centers was considerably low. Fourth, although old house structures and the lack of convenience facilities were found to be circumstantial risk factors for these elders, experiences of receiving housing support services were scarce. The elderly were found to rely more on informal care, and concerns for their care were higher in women than men. Plus, accessibility to elderly abuse services was markedly low. Based on these results, discussed were implications for implementing policies and practical interventions to raise the levels of the human rights for this population.