• Title/Summary/Keyword: 예방적 대응적 방식

Search Result 66, Processing Time 0.027 seconds

A study on categorizating public-related conflicts in the port sector (항만 관련 공공갈등 유형화에 관한 연구)

  • Lee, HyeRyeong;Kim, GaHyun;Kim, SeWon
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.3
    • /
    • pp.141-153
    • /
    • 2023
  • Recently, conflict management has emerged as a major issue. Among them, public conflicts that occur in the process of promotion public policies can have negative social effects, so it is very important to manage conflicts effectively. Therefore, this study aimed to examine the characteristics of public conflicts related to ports in order to lay the foundation for the smooth promotion of public policies related to ports. The significance of this study is that it collected and categorized conflict cases in the port sector through various channels to examine the characteristics of port-related conflicts more closely. The results of this study are summarized as follows. First, this study categorized port-related public conflicts by considering the characteristics of actors, life cycles, and issues, which confirmed that conflicts over ports have various issues. Second, we found that many port-related public conflicts have been resolved in a highly coercive manner. Third, it is necessary to explore non-coercive approaches to induce conflict resolution. Fourth, it is necessary to establish a dual system of proactive and reactive measures to manage port-related public conflicts.

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

A Study on Continuous Monitoring Reinforcement for Sales Audit Using Process Mining Under Big Data Environment (빅데이터 환경에서 프로세스 마이닝을 이용한 영업감사 상시 모니터링 강화에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.123-131
    • /
    • 2016
  • Process mining in big data environment utilize a number of data were generated from the business process. It generates lots of knowledge and insights regarding implementation and improvement of the process through the event log of the company's enterprise resource planning (ERP) system. In recent years, various research activities engaged with the audit work of company organizations are trying actively by using the maximum strength of the mining process. However, domestic studies on applicable sales auditing system for the process mining are insufficient under big data environment. Therefore, we propose process-mining methods that can be optimally applied to online and traditional auditing system. In advance, we propose continuous monitoring information system that can early detect and prevent the risk under the big data environment by monitoring risk factors in the organizations of enterprise. The scope of the research of this paper is to design a pre-verification system for risk factor via practical examples in sales auditing. Furthermore, realizations of preventive audit, continuous monitoring for high risk, reduction of fraud, and timely action for violation of rules are enhanced by proposed sales auditing system. According to the simulation results, avoidance of financial risks, reduction of audit period, and improvement of audit quality are represented.

An Empirical Study on Measures for reducing Drunk Driving exploiting Psychological Characteristics of Inveterate Drunk Drivers (상습 음주운전자의 심리적 특성에 따른 음주운전 대책에 관한 실증적 연구)

  • Park, Won-Beom;Jang, Seok-Yong;Jeong, Heon-Yeong
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.5
    • /
    • pp.91-104
    • /
    • 2011
  • According to statistics, drunk drivers who repeatedly violate the DUI (Driving under influence) regulation have been continuously increased, and now the habitual drunk drivers become a societal problem. Employing a confirmative factorial analysis of structural equation model to analysis psychological characteristics of habitual drunk drivers and also seek countermeasures, this study identify the difference among three different groups of drivers: 1) sober drivers, 2) drivers with a DUI violation record, and 3) drivers with more than two records. The results of this study are as follows: First, remedies and educational contents to rectify drunk drivers can be differentiated according to their drunk driving records. Second, using defense mechanism (e.g., rationalization, projection, sublimation), drunk driving psychology (such e.g., sense of guilt, shame, embarrassment) and self-esteem (e.g., affirmation, denial) as theory variables, a Structural Equation is constructed to represent Psychological Characteristics of drunk driving according to records on drunk driving. Third, as a result of analysis of the Psychological Characteristics Model, measures for prevention and reduction of drunk driving suitable for the characteristics of respective group are also suggested. Forth, drunk driving measures based on drinking individuality are complemented by concurrence analysis on records of drunk driving records and National Alcoholism Screening Test (NAST) score. Also, two or more times recorded drunk drivers are classified as inveterate drunk drivers.

Violence against Nursing Students during Clinical Practice: Experiences, Perception, Responses and Coping with Violence (임상실습 중 간호대학생에 대한 폭력: 폭력에 대한 경험, 인식, 대응 및 대처)

  • Park, Jung-Eun;Kim, Dong-Hee;Park, Jung-Ha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.652-662
    • /
    • 2017
  • This study was conducted to evaluate nursing students' experiences with violence, as well as their responses and behaviors subsequent to being subjected to violence. A descriptive survey was conducted and data were collected from April 30 to July 6, 2012. Responses were obtained from the 290 nursing students studying at six universities in four cities using self-administered questionnaires. About 91% of the students were subjected to violence. Verbal violence (85.2%) was the most frequently encountered type of violence, followed by physical threats (74.8%), sexual violence (41.0%), and physical violence (26.2%). Participants were abused by patients or patients' family members, as well as clinical staff, such as nurses and doctors. After the nursing students were exposed to violence, they responded more negatively to psychological aspects than to biophysical or social aspects. Most students did "not react to the person inflicting violence and continued clinical practice" (51.7%), and this response was cited by students as their most frequently used method of coping (79.5%) after violent confrontations. Strategies should be taken to prevent the violence inflicted upon nursing students in clinical settings, and nursing students should be provided with information related to communication and methods to cope with violence during their education.

Implications of European Union's Groundwater Nitrate Management Policies for Korea's Sustainable Groundwater Management (유럽연합의 지하수 질산염 관리정책의 우리나라 지속가능한 지하수관리에의 시사점)

  • Junseop Oh;Jaehoon Choi;Hyunsoo Seo;Ho-Rim Kim;Hyun Tai Ahn;Seong-Taek Yun
    • Economic and Environmental Geology
    • /
    • v.57 no.2
    • /
    • pp.271-280
    • /
    • 2024
  • This study examines the European Union (EU)'s policies on managing nitrate contamination in groundwater and provides implications for the future groundwater management in South Korea. Initiated by the 1991 Nitrate Directive, the EU has pursued a multifaceted approach to reduce agricultural nitrate pollution through sustainable ('good') farming practices, regular nitrate level monitoring, and designating Nitrate Vulnerable Zones. Further policy integrations, like the Water Framework Directive and Groundwater Directive, have established comprehensive protection strategies, including the use of pollutant threshold values. Recently, the 2019 Green Deal escalated efforts against nitrates, aligning with broader environmental and climate objectives. This review aims to explore these developments, highlighting key mitigation strategies against nitrate pollution, and providing valuable insights for the future sustainable groundwater nitrate management in South Korea, emphasizing the importance of preventive measures and collaborative efforts to restore and improve groundwater quality.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Aviation Safety Regulation and ICAO's Response to Emerging Issues (항공안전규제와 새로운 이슈에 대한 ICAO의 대응)

  • Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.207-244
    • /
    • 2015
  • Aviation safety is the stage in which the risk of harm to persons or of property damage is reduced to, and maintained at or below, an acceptable level through a continuing process of hazard identification and risk management. Many accidents and incidents have been taking place since 2014, while there had been relatively safer skies before 2014. International civil aviation community has been exerting great efforts to deal with these emerging issues, thus enhancing and ensuring safety throughout the world over the years. The Preamble of the Chicago Convention emphasizes safety and order of international air transport, and so many Articles in the Convention are related to the safety. Furthermore, most of the Annexes to the Convention are International Standards and Recommended Practices pertaining to the safety. In particular, Annex 19, which was promulgated in Nov. 2013, dealing with safety management system. ICAO, as law-making body, has Air Navigation Commission, Council, Assembly to deliberate and make decisions regarding safety issues. It is also implementing USOAP and USAP to supervise safety functions of member States. After MH 370 disappeared in 2014, ICAO is developing Global Tracking System whereby there should be no loophole in tracking the location of aircraft anywhere in world with the information provided by many stakeholders concerned. MH 17 accident drove ICAO to install web-based repository where information relating to the operation in conflict zones is provided and shared. In addition, ICAO has been initiating various solutions to emerging issues such as ebola outbreak and operation under extreme meteorological conditions. Considering the necessity of protection and sharing of safety data and information to enhance safety level, ICAO is now suggesting enhanced provisions to do so, and getting feedback from member States. It has been observed that ICAO has been approaching issues towards problem-solving from four different dimensions. First regarding time, it analyses past experiences and best practices, and make solutions in short, mid and long terms. Second, from space perspective, ICAO covers States, region and the world as a whole. Third, regarding stakeholders it consults with and hear from as many entities as it could, including airlines, airports, community, consumers, manufacturers, air traffic control centers, air navigation service providers, industry and insurers. Last not but least, in terms of regulatory changes, it identifies best practices, guidance materials and provisions which could become standards and recommended practices.

A Study on the Measurement Method of Cold Chain Service Quality Using Smart Contract of Blockchain (블록체인의 스마트계약을 이용한 콜드체인 서비스 품질 측정 방안에 대한 연구)

  • Kim, ChangHyun;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2019
  • Due to the great advances in e-Marketplace and changes in type of items purchased from the online market, it has been dramatically increased the demand of the storage and transportation under the special conditions such as restricted temperature. Especially, the cold chain needs the way to transparently measure and monitor the entire network in realtime because it has a very complicated structure and requires totally different criteria at the every different steps and items. In this research, it has been presented the performance evaluation metrics to make contract using service level agreement (SLA), the way to apply the smart contract based on blockchain, the structure of blocks, service platform and application in order to build cold chain which can prevent the risk factors by measuring and sharing information in realtime using block chain technology. In addition, we have proposed the way to store the measured performance and reputation of each player in the block using smart contract based on SLA. With the presented framework, all players including service providers as well as users can secure the information for making the rational decisions. When the service platform is actually built and operated, it seems possible to secure the information in transparently and realtime. Also, it is possible to prevent the risk factors or prepare the preemptive plans to react on them.

An Improvement in Level of Facility Security Operation (시설보안 운영수준 향상방안)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.205-225
    • /
    • 2012
  • This study is to present an improvement of facility security through the evaluation of facility security operation level. To fulfill the purpose of the study, a survey of some facilities was conducted and the result was analyzed as follows; First, although security personnels were deployed in the facilities, the level of security personnel operation was relatively low. Second, job education training level was relatively proper, that is relevant to the result that show the level of service mind and the working mind of security personnel were proper, also relevant to the relatively good work shift system. Third, although situation room was operated well, the level of restricted area set-up and access control of visitor were low, and the level of article inspection and vehicle access control were very low. Forth, the level of security manual application that include detailed security method and procedure was proper. But accident prevention and response manual application was lower than security manual application, that show preparation for fire and negligent-accident is passive. For the improvement of facility security, the high level part and low level part in the survey result could be merged. For example, we could specify factors that show low level in the survey such as security personnel operation, access control of visitor and vehicle, article inspection, accident prevention and response in the security manual and promote education circumstance that show high level.

  • PDF