• Title/Summary/Keyword: Key issue

Search Result 1,218, Processing Time 0.025 seconds

A study on the selection of the target scope for destruction of personal credit information of customers whose financial transaction effect has ended (금융거래 효과가 종료된 고객의 개인신용정보 파기 대상 범위 선정에 관한 연구)

  • Baek, Song-Yi;Lim, Young-Bin;Lee, Chang-Gil;Chun, Sam-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.163-169
    • /
    • 2022
  • According to the Credit Information Act, in order to protect customer information by relationship of credit information subjects, it is destroyed and stored separately in two stages according to the period after the financial transaction effect is over. However, there is a limitation in that the destruction of personal credit information of customers whose financial transaction effect has expired cannot be collectively destroyed when the transaction has been terminated, depending on the nature of the financial product and transaction. To this end, the IT person in charge is developing a computerized program according to the target and order of destruction by investigating the business relationship by transaction type in advance. In this process, if the identification of the upper relation between tables is unclear, a compliance issue arises in which personal credit information cannot be destroyed or even information that should not be destroyed because it depends on the subjective judgment of the IT person in charge. Therefore, in this paper, we propose a model and algorithm for identifying the referenced table based on SQL executed in the computer program, analyzing the upper relation between tables with the primary key information of the table, and visualizing and objectively selecting the range to be destroyed. presented and implemented.

Phenomenological Study on the Victim's Life after May 18 1980 and the Experience of Testimony Therapy (5·18민주화운동 참여자의 80년 5월 이후 삶과 증언치료 경험에 관한 현상학적 연구)

  • Moonsun Kim ;Moonminseo Kang
    • Korean Journal of Culture and Social Issue
    • /
    • v.23 no.4
    • /
    • pp.451-473
    • /
    • 2017
  • This study explores the aftermath of state violence and the meaning of its healing by analyzing testimony therapy designed to deal with trauma of the victims of May 18 democratization movement("May 18"). In order to have a point of view that May 18 had catastrophic impacts on many individuals and communities and to observe the after-effects of such event to individuals' lives, this study analyzed the contents of testimony therapy sessions of four people who were tortured, arrested and detained after their participating in May 18 in 1980. The experiences of those participants with their testimony therapy and the interactions they had with the audience during the sessions made sure what are the key factors to healing the trauma from state violence. Nineteen topics were drawn from analyzing the statements made in the therapy process, and out of them, seven subjects below were chosen as the most significant; 'repetitive pain', 'social and economic damage', 'isolation and disconnection', 'transition of suffering to other generations', and 'Safety', 'healing through connections', 'obligation as a survivor'. Based on its findings, this study also examined the characteristics of trauma caused by state violence and made suggestions for healing such trauma.

A Cluster Based Energy Efficient Tree Routing Protocol in Wireless Sensor Networks (광역 WSN 을 위한 클러스팅 트리 라우팅 프로토콜)

  • Nurhayati, Nurhayati;Choi, Sung-Hee;Lee, Kyung-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.576-579
    • /
    • 2011
  • Wireless sensor network are widely all over different fields. Because of its distinguished characteristics, we must take account of the factor of energy consumed when designing routing protocol. Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In BCDCP, all sensors sends data from the CH (Cluster Head) and then to the BS (Base Station). BCDCP works well in a smallscale network however is not preferred in a large scale network since it uses much energy for long distance wireless communication. TBRP can be used for large scale network, but it weakness lies on the fact that the nodedry out of energy easily since it uses multi-hops transmission data to the Base Station. Here, we proposed a routing protocol. A Cluster Based Energy Efficient Tree Routing Protocol (CETRP) in Wireless Sensor Networks (WSNs) to prolong network life time through the balanced energy consumption. CETRP selects Cluster Head of cluster tree shape and uses maximum two hops data transmission to the Cluster Head in every level. We show CETRP outperforms BCDCP and TBRP with several experiments.

GIS Based Distributed Flood Damage Assessment (GIS기반의 분포형 홍수피해산정 기법)

  • Yi, Choong Sung;Choi, Seung An;Shim, Myung Pil;Kim, Hung Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3B
    • /
    • pp.301-310
    • /
    • 2006
  • Typically, we needs enormous national budget for the flood control project and so the project usually has big influence on the national economy. Therefore, the reliable estimation of flood damage is the key issue for the economic analysis of the flood control project. This study aims to provide a GIS based technique for distributed flood damage estimation. We consider two aspects of engineering and economic sides, which are the inundation analysis and MD-FDA (Multi-Dimensional Flood Damage Analysis), for the flood damage assessment. We propose the analysis framework and data processing using GIS for assessing flood damages. The proposed methodology is applied to the flood control channel project for flood disaster prevention in Mokgamcheon/Dorimcheon streams and this study presents the detailed GIS database and the assessment results of flood damages. This study may have the worth in improving practical usability of MD-FDA and also providing research direction for combining economic side with the engineering aspect. Also this distributed technique will help decision-making in evaluating the feasibility of flood damage reduction programs for structural and nonstructural measures.

Life Revaluation of Korean Housekeepers in Midlife (한국사회 중년기 전업주부의 삶의 재평가)

  • Jeon, Kyung-Sook ;Jung, Taeyun
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.1
    • /
    • pp.19-44
    • /
    • 2013
  • The present study aimed at investigating how Korean housekeeper in midlife revaluate their lives. For this purpose, 14 housekeepers whose youngest child was at least older than high school students were interviewed in a semi-structured retrospective method. The interview was focused on relational, psychological, and economical aspects of the participants before and after marriage each. The interview usually continued one and a half to two hours. The phenomenological method describing personal meaning of experiences was referred to for data analyses by transforming retrospective life story of participants into key meaningful units. According to main retrospective contents of each stage of development, the participants' childhood and adolescence was characterized by familial circumstances, formation of personality and value, and career choice. Main themes of their early adulthood were spouse selection and marriage, marital adaptation, and family relationships. Their midlife focused on children, economic and emotional stability, family relationships, acceptance of their spouse and themselves, and health and religion. Life styles of the participants were analyzed in terms of turning events, meanings of current life, and cumulative effects of life events. These findings were discussed in terms of developmental pattern in relation to the established theory of development.

Condom negotiation strategies of Korean college students: Interactive perspective of Sexual-risk behavior (한국대학생들의 콘돔협상전략 탐색: 콘돔연구에서 협응적 관점의 제안)

  • Taekyun Hur;Ja Ee Cho
    • Korean Journal of Culture and Social Issue
    • /
    • v.13 no.1
    • /
    • pp.43-61
    • /
    • 2007
  • Most previous research on safer sex and condom use has been mainly focused on individual's dispositional factors such as attitudes, perceived control, intention, and etc. However, a few researchers recently started to propose that condom use is not a matter of individual behavioral decision but a product of serious interactive negotiation processes and condom negotiation would be the proximal key-determinant of condom use behaviors. The present research categorized condom-negotiation strategies and preferences of Korean college students and examined relationship between the strategies and other sex-related concepts. 186 participants' strategies on a free-response questions of condom negotiation revealed 7 types of persuasion strategies for condom use; Pregnancy risk, responsibility, care for partner, withholding sex, sexual disease, direct request, and sexual satisfaction (in order of preference). 6 types of persuasion strategies for condom avoid were abstracted: Pregnancy free, Sexual satisfaction, responsibility, direct request, unfaith toward condom, and withholding sex (in order of preference). The effects of gender, sexual experience, and culture were found and discussed in their implications for sexual education,

  • PDF

An Analysis of Urie Consciousness and Behavioral Pattern in Close Relationships of the Korean People (한국인의 대인관계에서의 기본도덕으로서의 의리분석 : 한국인에게 진정한 친구는 의리있는 친구인가)

  • Kibum Kim;Mee Hee Kim;Sang-Chin Choi
    • Korean Journal of Culture and Social Issue
    • /
    • v.8 no.1
    • /
    • pp.79-101
    • /
    • 2002
  • The present study was to investigate the psychological characteristics of Urie(義理; interpersonal morality) in Korean interpersonal relationships in terms of qualitative approach and quantitative approach. In study 1, the authors developed an open-ended questionnaire focused on Urie behavior and not Urie behavior. The results revealed that helping, trusting, and caring behaviors and historicality were the key elements of Urie relationships. On the other hand, selfish and distrusting behaviors disrupted Urie relationships. In study 2, the authors conducted video experiment in order to study how the subjects interpret and understand Urie phenomenon. This video stimulus composed of love and friendship. The main characters showed their conflicts between love and friendship. Thus, subjects were asked to answer their interpretations and understandings about what was going on according to the scene. In study 3, we made three kinds of scenarios which were constituted in conflict situation between close friends who works together at their own company. If one asks some favors to you against social justice, how do you do? Most subjects evaluated the whistle blowing behavior as moral and just. However, they evaluated the insider as not good friend. They evaluated one who did favor even though that behavior was socially unjust as good friend and having Urie. Consequently, Korean people emphasize on their human relationships in everyday life. Urie relationship is built in close and Cheong relationship.

  • PDF

College students' implicit theory of Korean creativity and creative environment (한국적 창의성과 창의적 환경에 대한 대학생들의 암묵적 이론)

  • Eun-Hyun Sung ;SoonMi Han ;JooHyun Ha ;JeongKyu Lee;HyungSeon Ryu ;YunYung Han ;Byung-Gee Bak
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.367-390
    • /
    • 2008
  • The primary purpose of this study is to investigate the college students' implicit theory of Korean creativity. This study deals with the degree to which the students exploit the creativity, and the obstacles for them to exploit the creativity. Another purpose of this study is to explore their implicit knowledge of Korean creative environments. The results are as follows. The implicit knowledge of Korean creativity could be characterized by the following key words: 'flexibility', 'application', 'transformation', 'originality', 'perseverance', 'not being stereotyped', 'esthetic flavor' and 'understanding-new-by-exploring-old'. Students thought themselves to be more or less creative. Students in art and physical education, and male students estimated themselves more creative than other discipline and female. They thought that socio-institutional factors such as educational system focused on the college entrance test are the most serious obstacles against creativity. About half of the students thought the creative persons would have been raised in poor family whereas other students thought differently. The home environment of the creative person was thought to be characterized by the words such as democratic, free and encouraging. Creative persons were thought to be maladaptive school life, but good at peer relations. This study will be used as a pioneer research which suggest a model of Korean creativity.

  • PDF

The Policy Package Related to Essential Medical Service: The Key Is Elaboration and Solidification (필수의료 정책 패키지, 내실화가 관건이다)

  • Sun-Hee Lee
    • Health Policy and Management
    • /
    • v.34 no.1
    • /
    • pp.1-3
    • /
    • 2024
  • Currently, the issue of poor accessibility to essential medical services has been brought to light as a social discontent. In order to strengthen the essential medical service system, the government has announced the "the policy package related to essential medical service" as a comprehensive solution and has vowed to invest more than 10 trillion won by 2028. As it contains crucial elements for changing the framework of the healthcare system, I would like to present several points to consider in policy implementation. Given that this package contains important elements for changing the framework of the healthcare system, there are a few issues to consider in policy implementation. First, a mechanism to prevent politicization should be established when designing the physician training system. Second, changing from a hospital centered on residents to one centered on specialists means that the society bears the cost of training residents, while paying a high price for specialist services. The willingness of society to pay for the costs incurred by such a change should be carefully considered, and an appropriate budget must be prepared. Third, as the operation of shared human resources and inter-organizational networking, among other detailed policy measures, are still at a level of conceptual discussion, various issues should be solidly reviewed and considered for in the mid to long term to suit the conditions of the domestic healthcare system.

Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules (HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사)

  • Dongho Lee;Younghoon Ban;Jae-Deok Lim;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.335-345
    • /
    • 2024
  • In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.