• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.042 seconds

The Extension of Social Insurances to the Nonstandard Workforce : Issues and Policy Options (비정규 근로자'에 대한 사회보험 확대 : 쟁점과 정책)

  • Kim, Yeon-Myung
    • Korean Journal of Social Welfare
    • /
    • v.45
    • /
    • pp.72-100
    • /
    • 2001
  • Despite the rapid expansion of social security coverage in the 1990s, many wage earners in Korea, especially the majority of the nonstandard workforce are excluded in the social insurance programs. In this regards, the purpose of this paper is to analyze causes of the exclusion of nonstandard workers to the social insurance scheme and to suggest the feasible policy options. Through this paper, four arguments are addressed as follows. First, the main issue for exclusion from coverage of those workers is that they have no entitlement to social insurance. This is not an issue of that they fall below hours or income thresholds for the entitlement Second, the top-down process of the extension in the Korean social insurances have divided the wage earners into two groups, the insider (the included) and the outsider (the excluded). Many nonstandard workers belong to the latter category. Third, the social insurance systems have been designed for the regular workers who were characterized by a full-time with some degree of stability. Reform designed to cope with the growth of nonstandard workers must build on the existing structure of social insurance. Finally, the governance capacity by social security administration body must be improved in order to provide a basic social protection for those workers. For that, four separated social insurance administration bodies could be unified to one administrative body, or tax and contribution of social insurance could be collected by one integrated administration body, the National Tax Service.

  • PDF

Prospects of Dual Form of Teaching and Learning in the Realities of the Covid-19 Pandemic and the Post-pandemicPeriod

  • Bratitsel, Maryna;Kravchuk, Olena;Tishko, Liliya;Osiievskyi, Valerii;Bellie, Victoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.483-490
    • /
    • 2021
  • The COVID-19 pandemic has posed significant community challenges towards higher education around the world. The urgent and unexpected request for full-time university courses to switch over to online teaching was a particular challenge. Online learning and learning imply a certain pedagogical knowledge content (PKC), mainly related to the design and organization for better learning and the creation of unique learning environments using digital technologies. With the help of the present academic paper, we provide some expert opinion on the PKC connected with online learning with the aim of helping non-university professionals (that is, those with lack of online learning experience) navigate these challenging times. Our findings point to the planning of learning activities with certain features, a combination of three types of presence (social, cognitive and facilitative) and the need to adapt the assessment system to new learning requirements. We will conclude by contemplating on how responding to a crisis can improve teaching and learning practices in the post-digital era.

A Novel Approach to Predict the Longevity in Alzheimer's Patients Based on Rate of Cognitive Deterioration using Fuzzy Logic Based Feature Extraction Algorithm

  • Sridevi, Mutyala;B.R., Arun Kumar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.79-86
    • /
    • 2021
  • Alzheimer's is a chronic progressive disease which exhibits varied symptoms and behavioural traits from person to person. The deterioration in cognitive abilities is more noticeable through their Activities and Instrumental Activities of Daily Living rather than biological markers. This information discussed in social media communities was collected and features were extracted by using the proposed fuzzy logic based algorithm to address the uncertainties and imprecision in the data reported. The data thus obtained is used to train machine learning models in order to predict the longevity of the patients. Models built on features extracted using the proposed algorithm performs better than models trained on full set of features. Important findings are discussed and Support Vector Regressor with RBF kernel is identified as the best performing model in predicting the longevity of Alzheimer's patients. The results would prove to be of high value for healthcare practitioners and palliative care providers to design interventions that can alleviate the trauma faced by patients and caregivers due to chronic diseases.

Development on the Operating Technique for Delta CRL (델타 CRL 운영 기술 개발)

  • 김락현;엄희정;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.15-27
    • /
    • 2002
  • The purpose of this paper is to present both the specification of delta-CRL and the polices for delta CRL in order to solve the problem involved in issuing and maintaining the certificate revocation lists for the mobile communication network. If the user request to revoke the certificate issued by certification authority, the certification should be revoked and listed up in the certificate revocation list. In general, the certificate revocation list is issued regularly. Therefore PKI application should download the CRL and prove the validity of CRL. The traffic size of the exchanged traffic should be reduced for the mobile communication environment. The result if this paper can be used for the mobile communication various environments to reduce the size of CRL.

Development of the Recommender System of Arabic Books Based on the Content Similarity

  • Alotaibi, Shaykhah Hajed;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.175-186
    • /
    • 2022
  • This research article develops an Arabic books' recommendation system, which is based on the content similarity that assists users to search for the right book and predict the appropriate and suitable books pertaining to their literary style. In fact, the system directs its users toward books, which can meet their needs from a large dataset of Information. Further, this system makes its predictions based on a set of data that is gathered from different books and converts it to vectors by using the TF-IDF system. After that, the recommendation algorithms such as the cosine similarity, the sequence matcher similarity, and the semantic similarity aggregate data to produce an efficient and effective recommendation. This approach is advantageous in recommending previously unrated books to users with unique interests. It is found to be proven from the obtained results that the results of the cosine similarity of the full content of books, the results of the sequence matcher similarity of Arabic titles of the books, and the results of the semantic similarity of English titles of the books are the best obtained results, and extremely close to the average of the result related to the human assigned/annotated similarity. Flask web application is developed with a simple interface to show the recommended Arabic books by using cosine similarity, sequence matcher similarity, and semantic similarity algorithms with all experiments that are conducted.

A Study on Coexist with COVID-19 Teaching Methods for Learners (학습자 대상 위드 코로나 시대의 교수법 고찰)

  • Jung, Ae-ri;Cho, Young-bok
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.287-294
    • /
    • 2022
  • While online research is in full swing due to the COVID-19 pandemic, the Ministry of Education announced a plan to gradually switch face-to-face classes along with 'recovery of daily life'. As such, there is a need for an agreement that appropriately considers the position of promoting face-to-face classes, the position of studying online classes, and the position of students taking classes. Therefore, this paper intends to examine the teaching method of Coexist with COVID-19 centered on the student's position as the host of the class. It is expected that this study will be able to suggest directions for innovative teaching methods that reflect the considerations of teachers' teaching methods and analyze the needs of learners who are consumers.

Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.215-219
    • /
    • 2022
  • Bankruptcy is one of the major areas that have attracted the interest of many researchers in the American system, particularly in terms of the laws that oversee it. It provides a plan of reorganization that enables the debtor or the proprietor to discharge liabilities to the creditors through dividing the assets to settle debts. This activity is carried out under supervision to fairly protect the interests of the creditors. Bankruptcy protection systems are dynamic and complex in nature, in line with the economic sector, ensuring the protection of affected individuals from falling into huge losses. Some bankruptcy procedures give the debtor the opportunity to stay in operation or business activity and benefit from revenues until the debt is settled. This law allows some debtors to be relived from any financial burden after the distribution of assets, even if the debt is not paid in full. In light of the above information, this research paper seeks to explore the nature of the complexity of bankruptcy protection laws, their characteristics, and the justice system that regulate them. It also sheds more light on the decision-making powers on bankruptcy cases. There are specialized courts that cover bankruptcy cases located in district courts in every state.

Analyzing the Impact of Lockdown on COVID-19 Pandemic in Saudi Arabia

  • Gyani, Jayadev;Haq, Mohd Anul;Ahmed, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • The spread of Omicron, a mutated version of COVID-19 across several countries is leading to the discussion of lockdown once again for curbing the spread of the new virus. In this context, this research is showing the impact of lockdown for the successful control of the COVID-19 pandemic in Saudi Arabia. The outbreak of the COVID-19 pandemic around the globe has affected Saudi Arabia with around 2,37,803 confirmed cases within the initial 4 months of transmission. Saudi Arabia has announced a 21-day lockdown from March 23, 2020, to reduce the transmission of the COVID-19 pandemic. Machine Learning-based, Multinomial logistic regression was applied to understand the relationship between daily COVID-19 confirmed cases and lockdown in the 17 most-affected cities of KSA. We used secondary published data from the Ministry of Health, KSA daily dataset of COVID-19 confirmed case counts. These 17 cities were categorized into 4 classes based on lockdown dates. A total of three scenarios such as night lockdown, full lockdown, and no lockdown have been analyzed with the total number of confirmed cases with 4 classes. 15 out of 17 cities have shown a strong correlation with a confidence interval of 95%. These findings provide evidence that the COVID-19 pandemic may be partially suppressed with lockdown measures.

Role of Social Enterprises to Overcome Food Insecurity: Evidence from Ethiopia

  • BEKELE, Eshetu Tefera
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.11
    • /
    • pp.11-19
    • /
    • 2022
  • Purpose: Food security is a dynamic concept, which has continuously integrated new dimensions and levels of analysis over the years; this reflects the wider recognition of its complexities in research and public policy issues. Food insecurity is a major challenge for Ethiopia and for many African countries. This paper aims to identify the roles of social enterprises to overcome food insecurity. Research design, data and methodology: The research has focused on one primary question. What are the role of social enterprises to overcome food insecurity? The survey questionnaire was developed and an interview was made using enumerators. A total sample size of 400 sample households was selected randomly using the method of sampling with probability proportionate to size. Descriptive and inferential statistical analysis methods were used for data analysis. Results: Results of the regression analysis show that all of the hypothesized independent variables are significantly and positively affecting post membership income of the sample households. Conclusions: all stakeholders as government, development actors and academic institutions should closely monitor and support social enterprises/cooperatives technically, financially and materially. By doing so, the full potential and contributions of social enterprises in reducing unemployment and solving the social and environmental problems can be effective.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.