• Title/Summary/Keyword: Active Protection

Search Result 596, Processing Time 0.032 seconds

Consumer Movements, Consumer Policies, and Firms' Policies for Consumer Satisfaction in Japan (일본의 소비자운동, 소비자정책, 소비자지향적 경영에 관한 소고)

  • 허경옥
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.3
    • /
    • pp.173-190
    • /
    • 1998
  • This study reviewed both consumer movement and consumer policy of government in Japan. Their evolution since the Second World War will be reviewed and compared multiple periods, after the Second World war till the late 1960s, the period of the 1970s, the period after 1980s. In addition, firms' consumer satisfaction policies were briefly reviewed in order to fully understand consumer protection activities in japan. This study found four major characteristics of consumer protection activities led by both voluntary consumer organizations and government. First, consumer protection policy of government in Japan after the late 1960s was more active than that of consumer movement by consumer organizations. Second, major concerns for consumer protection were variant over time. The major goal in the first stage of period(during the 1960s) was to protect consumer safety from defective and dangerous goods and services, whereas the goal after the late 1970s was extended to cover various areas concerning the quality of life. Those areas refer to the quality of services, the way of sales and marketing, pollution of environment, and the quality of consuming life. Third, this study found that computer networks, aiming at collecting and analyzing the very useful to improve the consuming life of Japanese by providing sufficient consumer information to encourge rational choices of consumers. Forth, a close cooperation between the central and local administrations was crucial for the successful outcome In Japan This paper gives us useful guideline regarding how to improve consumer movement and govemments' policies for protecting consumer in Korea. In addition, other lessons on successful consumer satisfaction policies of Japanese firms may enable Korean firms to shape effective consumer policies of enhancing their competitiveness.

  • PDF

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

Ag2Se Modified TiO2 Heterojunction with Enhanced Visible-Light Photocatalytic Performance

  • Zhu, Lei;Tang, Jia-Yao;Fan, Jia-Yi;Sun, Chen;Oh, Won-Chun
    • Korean Journal of Materials Research
    • /
    • v.31 no.12
    • /
    • pp.657-664
    • /
    • 2021
  • To build a highly active photocatalytic system with high efficiency and low cast of TiO2, we report a facile hydrothermal technique to synthesize Ag2Se-nanoparticle-modified TiO2 composites. The physical characteristics of these samples are analyzed by X-ray diffraction, scanning electron microscopy with energy dispersive X-ray analysis, transmission electron microscopy and BET analysis. The XRD and TEM results show us that TiO2 is coupled with small sized Ag2Se nanoplate, which has an average grain size of about 30 nm in diameter. The agglomeration of Ag2Se nanoparticles is improved by the hydrothermal process, with dispersion improvement of the Ag2Se@TiO2 nanocomposite. Texbrite BA-L is selected as a simulated dye to study the photodegradation behavior of as-prepared samples under visible light radiation. A significant enhancement of about two times the photodegradation rate is observed for the Ag2Se@TiO2 nanocomposite compared with the control sample P25 and as-prepared TiO2. Long-term stability of Ag2Se@TiO2 is observed via ten iterations of recycling experiments under visible light irradiation.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Analysis results of the Anti-islanding Function for PV-AF System (액티브 필터기능을 갖는 3상 태양광 발전시스템의 단독운전 방지기능의 분석)

  • Kim, Gyeong-Hun;Seo, Hyo-Ryong;Jang, Seong-Jae;Park, Sang-Soo;Park, Min-Won;Yu, In-Keun;Jeon, Jin-Hong;Kim, Seul-Ki;Jo, Chang-Hee;Ahn, Jong-Bo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1085-1086
    • /
    • 2008
  • Shunt active filter can compensate harmonic current of utility results from non-linear loads such as rectifiers, cycloconverters and arc furnaces. It has the same structure as photovoltaic(PV) generation system. So, It was proposed the system that generates PV power and also has active filter function. It is called PV-AF(Photovoltaic and Active Filter) power generation system. Islanding can be occurred in an inverter based dispersed generation system, when the system disconnected from utility and loads are entirely supplied by PV system only. Islanding may result in interference to grid protection devices, equipment damage, and even personnel safety hazards. Therefore, islanding has to be detected and protected. The conventional anti-islanding methods have NDZ(None-Detection Zone) or power quality degradation. But PV-AF power generation system has the function of not only shunt active filter but also anti-islanding method without NDZ. In this paper, a novel anti-islanding method for PV-AF system is proposed and analysed in detail.

  • PDF

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

Analysis of Care Types in Long-term Care Facilities from the View of Active Ageing (활동적 노화의 관점에서 본 장기요양시설의 돌봄 유형 분석)

  • Kim, Hyun-Jeong
    • 한국노년학
    • /
    • v.41 no.1
    • /
    • pp.85-105
    • /
    • 2021
  • The purpose of this research is to analyze care types in long-term care facilities with the view of Active Ageing by using Q-methodology. In-depth interviews were conducted to grasp various thoughts on care of long-term care facilities in three areas of WHO's active aging: health, safety, and participation. 35 people participated in the interview, including the elderly living in long-term care facilities, adult children of the elderly living in long-term care facilities, the elderly living in the community, service providers, and long-term care professionals. Of the 451 Q populations, 63 Q samples were extracted, and a total of 43 P samples were used for final data analysis. Data were analyzed using the QUANL program, and as a result, three factor structures (4 types) were found to be suitable and accounted for 30.15% of the total variance. Current care types in long-term care facilities were analysed into 4 types: protection-oriented care (type 1), participation-oriented care (type 2), medical-connected care (type 3), and human-centered care (type 4). Based on the results of this study, institutional and practical suggestions and implications were presented for the qualitative change of care in long-term care facilities.

Scope of Protection of Choreography Copyright utilizing the Delphi Techniques (델파이기법을 이용한 안무저작권의 보호범위)

  • Hong, Misung
    • 한국체육학회지인문사회과학편
    • /
    • v.55 no.6
    • /
    • pp.625-641
    • /
    • 2016
  • The purpose of this study was to establish unified standards on the scope of protection of choreographic works and to suggest methods for the protection of choreography copyright. 20 experts was selected among dance experts or copyright experts and depth interview method, Delphi method and AHP analysis were used. The result was summarized as follows : First, 50 percents of the experts thought pure dance works and popular dance works should be protected by same standard, while 45 percents of the experts suggested different standard. Second, 55 percents of the experts claimed required fixation on certain medium, while 40 percents did not claim required fixation but only expression. Requirement of originality was to independently create choreography and to reflect creative characteristic(65%). 70 percents of experts were positive on defining dance choreography as independent work, while 25 percents were negative. Elements of the choreography protection scope were in following order of importance: pattern of movement, creative and concrete plot, combination of movements and steps, and movement pattern with specific space. Third, methods for the protection of dance copyright in hierarchical classification were in following order of importance : 'copyright education', 'activation of organization of dance copyright trust management', 'choreography registration' and 'inducement of social concern. Fourth, 'Active participation of dance copyright trust management organization' was thought as the most important development plan. 'Improvement of dancers' awareness of copyright', 'inducement of choreography registration', and 'reinforcement of copyright education' followed in order.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.