• 제목/요약/키워드: Administrative Information

검색결과 1,274건 처리시간 0.024초

유치원 행정업무담당자의 직무스트레스와 스트레스대처방안에 관한 연구 -경상남도 O시 중심으로- (A Study on Job Stress and Stress Coping Strategies for Administrative Personnel working in Early Childhood Educational Institution - With a Focus on O City, Gyeonsangnam do -)

  • 신소정;조성제
    • 한국정보전자통신기술학회논문지
    • /
    • 제8권3호
    • /
    • pp.203-213
    • /
    • 2015
  • 본 연구 목적은 유치원 행정업무담당자의 직무스트레스와 스트레스대처 방안을 파악하고자 한다. 연구 대상은 경상남도 ${\bigcirc}$시에 소재하는 유치원 행정업무담당자 119명을 대상으로 2014년 9월 10일부터 12월 20일까지 설문조사를 실시하였다. 분석방법은 SPSS WIN 18.0프로그램을 이용하여 빈도분석, t-test, 상관분석, 다중회귀분석을 실시하였다. 분석결과는 인구사회학적 특성에 따른 연령, 결혼유무, 종교, 직급 등 요인별 차이가 있었다. 둘째, 상관관계에서 스트레스 대처방안의 하위변수인 경험자의 조언, 문제 상항에 대한 방어기제는 부적 상관이 있었다. 셋째, 회귀모형에서 직무스트레스와 음주회수, 직급이 통계적으로 유의미한 요인으로 나타났다. 본 연구는 유치원 행정업무 담당자의 업무 개선을 위한 기초자료가 될 것으로 판단된다.

노인 행정복지서비스 사각지대의 유형 구분에 관한 연구 (A Study on the Classification of Blind Spots in Administrative Welfare Service for the Elderly)

  • 김민호;이현경
    • 한국지리정보학회지
    • /
    • 제27권1호
    • /
    • pp.67-80
    • /
    • 2024
  • 노인인구가 지속적으로 증가함에 따라 향후 노인 행정복지서비스 사각지대가 더 증가할 것으로 전망된다. 본 연구는 노인인구가 증가하는 부산광역시 기장군을 대상으로 노인 행정복지서비스 사각지대 유형을 구분하고 유형별 정책방향을 제시하고자 하였다. GIS의 네트워크분석을 사용하여 읍·면 행정복지서비스 도달거리와 노인 이동가능거리를 분석하였다. 두 거리 간 비교를 통해 세 가지의 행정복지서비스 사각지대 유형(서비스공급사각지대, 이동불가사각지대, 이중사각지대)을 도출하였다. 기장군의 경우 노인 행정복지서비스 사각지대가 34.2%로 나타났다. 구체적으로 이동불가사각지대 21.5%로 가장 높았으며, 이중사각지대 9.5%, 서비스공급사각지대는 3.2%로 분석되었다. 분석 결과를 바탕으로 노인 행정복지서비스 사각지대 유형별 정책방향을 제시하였다.

의료기관의 정보보안 수준 측정을 위한 평가모형 개발 (A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations)

  • 안선주;권순만
    • 한국병원경영학회지
    • /
    • 제10권4호
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF

Establishing Required LOD and Positioning Accuracy for Indoor Spatial Information Applications in Public Administrative Works

  • Park, Junho;Lee, Jiyeong
    • 한국측량학회지
    • /
    • 제35권2호
    • /
    • pp.103-112
    • /
    • 2017
  • Due to the large size and high complexity of modern buildings, the interest and the studies about indoor spatial information are increasing. Previous studies related to indoor spatial information were mostly about relevant technologies, and the application of indoor spatial information has been less studied. In the present study, the public administrative work areas where indoor spatial information may be applied were identified by using a modified delphi technique. And the indoor LOD (Level of Detail) and indoor positioning accuracy for indoor spatial information applications considering user requirements was established as standards for efficiently establishing and providing services. The required LOD and positioning accuracy for services was established by reestablishing indoor LOD and positioning accuracy and classifying services with reference to those. The indoor LOD was reestablished from LOD 0 to 4 by focusing on service utilization and general recognition, and the positioning accuracy was reestablished in three levels by considering the accuracy of the present positioning technology and service utilization status.

Analysis of Measures against Personal Information Impact of Japanese Local Governments

  • Shin, Sanggyu
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 춘계학술발표대회
    • /
    • pp.135-138
    • /
    • 2018
  • In Japan, 24th May 2013, the Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure (From now on referred to as the My Number Act) had raised. My Number system is used to confirm that information on individuals possessed by multiple agencies such as administrative agencies and local governments are information of the same person. In this paper, we analyzed the all item assessment report of the Specific Personal Information Protection Assessment conducted in local governments in Japan, etc. We investigated two directions: (1) Adequacy of risk assessment and measures, (2) Reuse of the Assessment Report.

Information as An Object of Legal Regulation in Ukraine

  • Iasechko, Svitlana;Ivanovska, Alla;Gudz, Tetyana;Marchuk, Mykola;Venglinskyi, Oleksandr;Tokar, Alla
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.237-242
    • /
    • 2021
  • The article deals with the problematic issues of defining information as an object of private relations. Definitions that they are intangible and non-consumable by nature, are inextricably linked to a specific material carrier are/or secured by the subject that transmits them, messages, and information that have quantitative and qualitative characteristics, and are capable of having a freight or another value, and in case of its illegal usage causing damage and moral harm.

행정정보 데이터세트 이관도구 SIARD_KR의 개선방안 (Improvement of Administration Information Dataset Transfer Tools 'SIARD_KR')

  • 변우영;임진희
    • 정보관리학회지
    • /
    • 제39권1호
    • /
    • pp.195-217
    • /
    • 2022
  • SIARD_KR은 스위스 연방 기록보존소에서 개발한 관계형 데이터베이스 컨텐츠의 장기보존에 이용하는 기술인 SIARD를 우리나라의 실정에 맞게 일부 수정한 행정정보 데이터세트 보존 도구이다. 기존의 선행연구는 SIARD가 얼마나 관계형 데이터베이스안에 들어있는 모든 데이터를 손실 없이 잘 추출할 수 있는지에 초점이 맞춰져 있다. 하지만 데이터베이스에 들어있는 데이터 전부가 의미 있는 정보, 즉 행정정보 데이터세트는 아니다. 따라서 이 논문은 SIARD_KR이 행정정보 데이터세트의 특성을 반영하고 있는가에 대한 문제의식에서 시작한다. SIARD_KR이 단순히 DB에 저장된 데이터를 추출하는 도구가 아니고 의미 있는 정보만을 식별하여 추출할 수 있을지, 본래의 시스템에서 유리되어도 의미 있는 정보를 유지할 수 있을지 확인하려 한다. 본 논문은 SIARD_KR의 구조를 분석하고, 예상되는 문제점을 도출하여 그에 대한 개선방안을 제시하는 것을 목적으로 한다.

Information and Communications Technology, Economic Growth, and Carbon Emission Levels: The Case of South Korea

  • Lee, Jung-wan;Unger, Barry
    • 유통과학연구
    • /
    • 제10권6호
    • /
    • pp.7-15
    • /
    • 2012
  • The paper deals with the impact of information and communications technology on carbon emissions and economic growth in South Korea. The quarterly time series data from the first quarter of 1970 to the third quarter of 2010 (163 observations) are collected and retrieved from the Bank of Korea database. The paper examines long-run equilibrium relationships using cointegration techniques and Granger causality with vector error correction models. In directional causality tests, information and communications technology shows highly significant positive effects on economic growth and marginal effect on carbon emissions. Carbon emissions and economic growth exhibit an inverse relationship with each other; that is, carbon emissions have an inverse relation to economic growth and economic growth does not significantly affect carbon emissions in South Korea. We also note possible implications regarding growth policies and the information communications technology and "green" technology sectors for economies in the range represented by Korea's 1970 - 2010 data.

  • PDF

대학도서관에 있어서 사서중심의 장서개발은 가능한가\ulcorner-부산대학교 도서관을 중심으로-

  • 김정근
    • 한국도서관정보학회지
    • /
    • 제20권
    • /
    • pp.61-105
    • /
    • 1993
  • For decades, general services and accounting officers have been dominant forces in collection development activities in college and university libraries in Korea. The role of certified librarians has been rather peripheral. This has been allowed by the fact that library acquisitions departments had to be headed by non-librarian general administrative officers by the government regulation. The philosophy behind this regulation was that acquiring library materials was not any different from simple purchasing act of other useful goods in the marketplace. In affiliation with the element of general administrative officers, domestic book-sellers also had a great influence in collection building activities in college and university libraries in Korea. This has been made possible by the fact that no other people could su n.0, pply library materials, especially foreign library materials. It has been pointed out for years that the mechanism in which general administrative officers and domestic book-sellers had a greater say in library acquisitions activities was especially inefficient in acquiring wanted materials in wanted speed and in wanted price. In this mechanism, books and periodicals were mere goods. They were not perceived as intellectual property holding information and knowledge in them. Since the student movement to revolutionize the library system of the Pusan National University, September 1987 to December 1988, the creative and progressive elements in this university library have been making great efforts to change the acquisitions system in this library into a more efficient one by putting certified librarians at the center of the whole acquisitions process. These efforts have been successful to a certain degree. In this discursive study of the case of the Pusan National University Library, I have tried to achieve a social description of the library process in which progressively motivated librarians succeeded in alienating administrative officers and book-sellers and in grasping in their hands the hegemony in the collection building aspect of library activities. It has been discovered that this was possible only when the librarians were mature enough to have their kind of professionalism, i.e., professional ethics and craftsmanship.

  • PDF

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.