• Title/Summary/Keyword: National Authority Data

Search Result 251, Processing Time 0.027 seconds

The Family Policy of the Lee administration from the Social Investment Perspective : contents analysis and policy implication (사회투자론적 관점에서 본 새 정부의 가정정책 : 분석과 과제)

  • Sung, Mi-Ai;Song, Hye-Rim
    • Journal of Family Resource Management and Policy Review
    • /
    • v.12 no.4
    • /
    • pp.1-13
    • /
    • 2008
  • The purpose of this study is to analyze and assess the family policy of the Lee administration and to suggest agendas for sustainable future family policy. Traditionally, families are a unique unit of production and reproduction of family members and social laborers. In addition, families are the social safety net help people survive in a society. Therefore, family policies play an important role in contemporary society. In this context, we review the literature related to family and social policy, and the contents of Ministry for Health, Welfare and Family Affairs, which is the main authority in Korea. The results are as follow: Firstly, the Lee administration ignored the data showing that family policy should be a unique policy, and not a sub-division of welfare policy. Secondly, there is no difference between the active welfare policy of the Lee administration and policies of past administrations. Finally, this study suggests that subjects of future oriented family policy should focus on co-developing programs for the individual, family, and society, to develop problem-prevention and family needs- ordered policy, and to make integrated family policy through laws and delivery systems such as Healthy Family Centers.

  • PDF

Impact of Self-Determination Characteristic of Small Business Start-Up on Entrepreneurial Intention (소상공인의 자기결정성 특성이 창업의지에 미치는 영향)

  • Park, Se Eon;Hwang, Chan Gyu;Kwon, Do Soon
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.1-37
    • /
    • 2015
  • Micro small business start-ups are receiving financial and marketing support from government or public authority, but business closure rate is very high and it causes a hugh burden to households and national economy. This study aims to verify the causal relationship between the self-determination characteristic of small business start-ups and entrepreneurial intention through learning orientation and innovation ability. The man's intrinsic motivation of self-determination theory is expected to have an impact on the entrepreneurial intention of small business start-ups. The self-determination theory includes perceived autonomy, perceived competence, perceived relationship as independent variables. This study presented a research model for explaining the entrepreneurial intention of small business start-ups, and collected 260 survey responses from the small business start-ups In order to validate the proposed research model, PLS analysis is performed with valid 246 questionnaires. By PLS technique, the measurement reliability and validity of research variables are tested and the path analysis is conducted to do the hypothesis test. Path analysis shows that perceived autonomy does not significantly affect the learning orientation and innovation ability. On the other hand, perceived competence significantly influences learning orientation and innovation ability. Perceived relationships had significant influence on learning orientation. It is found that the parameters of learning orientation and innovation ability significantly influence the dependent variable of entrepreneurial intention. Based on the results, a policy and strategy for supporting small business start-up are presented.

Comparative Analysis of Regulations for Consumer Protection of Local Self-government (지방소비자행정 발전을 위한 광역자치단체의 소비자보호조례와 소비자정책심의위원회 운영 현황 비교분석)

  • 송인숙;제미경
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.9
    • /
    • pp.79-95
    • /
    • 2002
  • In this paper the consumer protection regulations of 16 wide area self-governments in Korea are studied. Status of consumer protection policy committees and their general policies for consumer protection of these wide area self-governments are also investigated. The data of consumer protection regulation were collected from the internet web-site of each self-government and the status of consumer protection policy committee and the general policy for consumer protection were obtained by requesting each self-government to report administration information during May through October in 200l. 13 of 16 wide area self-governments except Daegu, Inchon, and Jejudo have own consumer protection regulations. Major parts of these regulations conform the standard regulation of ministry of Government Administration and Home Affairs. Many of the consumer protection policy committees reported that they do not have meetings constantly. Moreover since the price of goods and services is the typical subject of meetings, the committees do not seem to properly play the role of a consumer protection policy authority. Contents of the general policy for consumer protection of many self-governments are simple description of detailed practicing plans according to the general consumer protection policy of the national government. By criticizing the problems aroused during the study of consumer protection policy of self-governments, suggestions are given which will help for the development of consumer policy of wide area self-governments.

The Definitions of Security Requirements for Control Access on the Step of Analysis (분석단계에서 접근 통제의 보안 요건 정의)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.97-103
    • /
    • 2014
  • The access control means the process to record and manage access restrictions and permits for protecting information in records. This paper emphasizes the control of access and authorization based on the roles and the data using activities of users as task performers. Also, it requires to gain the necessary approval in advance for important tasks such as mass inquiry and change on important information to influence the very existence of the whole organization. And then, it suggests that it is necessary to control some session of information with non-activity for certain time. Generally, this paper is to explain security elements of access control through various cases.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

Proposed Data-Driven Approach for Occupational Risk Management of Aircrew Fatigue

  • Seah, Benjamin Zhi Qiang;Gan, Wee Hoe;Wong, Sheau Hwa;Lim, Mei Ann;Goh, Poh Hui;Singh, Jarnail;Koh, David Soo Quee
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.462-470
    • /
    • 2021
  • Background: Fatigue is pervasive, under-reported, and potentially deadly where flight operations are concerned. The aviation industry appears to lack a standardized, practical, and easily replicable protocol for fatigue risk assessment which can be consistently applied across operators. Aim: Our paper sought to present a framework, supported by real-world data with subjective and objective parameters, to monitor aircrew fatigue and performance, and to determine the safe crew configuration for commercial airline operations. Methods: Our protocol identified risk factors for fatigue-induced performance degradation as triggers for fatigue risk and performance assessment. Using both subjective and objective measurements of sleep, fatigue, and performance in the form of instruments such as the Karolinska Sleepiness Scale, Samn-Perelli Crew Status Check, Psychomotor Vigilance Task, sleep logs, and a wearable actigraph for sleep log correlation and sleep duration and quality charting, a workflow flagging fatigue-prone flight operations for risk mitigation was developed and trialed. Results: In an operational study aimed at occupational assessment of fatigue and performance in airline pilots on a three-men crew versus a four-men crew for a long-haul flight, we affirmed the technical feasibility of our proposed framework and approach, the validity of the battery of assessment instruments, and the meaningful interpretation of fatigue and work performance indicators to enable the formulation of safe work recommendations. Conclusion: A standardized occupational assessment protocol like ours is useful to achieve consistency and objectivity in the occupational assessment of fatigue and work performance.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

Embodiment of PWM converter by using the VHDL (VHDL을 이용한 PWM 컨버터의 구현)

  • Baek, Kong-Hyun;Joo, Hyung-Jun;Lee, Hyo-Sung;Lim, Yong-Kon;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.11d
    • /
    • pp.197-199
    • /
    • 2002
  • The invention of VHDL(Very High Speed Integrated Circuit Hardware Description Language), Technical language of Hardware, is a kind of turning point in digital circuit designing, which is being more and more complicated and integrated. Because of its excellency in expression ability of hardware, VHDL is not only used in designing Hardware but also in simulation for verification, and in exchange and conservation, composition of the data of designs, and in many other ways. Especially, It is very important that VHDL is a Technical language of Hardware standardized by IEEE, intenational body with an authority. The biggest problem in modern circuit designing can be pointed out in two way. One is a problem how to process the rapidly being complicated circuit complexity. The other is minimizing the period of designing and manufacturing to survive in a cutthroat competition. To promote the use of VHDL, more than a simple use of simulation by VHDL, it is requested to use VHDL in composing logical circuit with chip manufacturing. And, by developing the quality of designing technique, it can contribute for development in domestic industry related to ASIC designing. In this paper in designing SMPS(Switching mode power supply), programming PWM by VHDL, it can print static voltage by the variable load, connect computer to chip with byteblaster, and download in Max(EPM7064SLCS4 - 5)chip of ALTER. To achieve this, it is supposed to use VHDL in modeling, simulating, compositing logic and product of the FPGA chip. Despite its limit in size and operating speed caused by the specific property of FPGA chip, it can be said that this method should be introduced more aggressively because of its prompt realization after designing.

  • PDF

Effect of repetitive pecking at working length for glide path preparation using G-file

  • Ha, Jung-Hong;Jeon, Hyo-Jin;Abed, Rashid El;Chang, Seok-Woo;Kim, Sung-Kyo;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.40 no.2
    • /
    • pp.123-127
    • /
    • 2015
  • Objectives: Glide path preparation is recommended to reduce torsional failure of nickel-titanium (NiTi) rotary instruments and to prevent root canal transportation. This study evaluated whether the repetitive insertions of G-files to the working length maintain the apical size as well as provide sufficient lumen as a glide path for subsequent instrumentation. Materials and Methods: The G-file system (Micro-Mega) composed of G1 and G2 files for glide path preparation was used with the J-shaped, simulated resin canals. After inserting a G1 file twice, a G2 file was inserted to the working length 1, 4, 7, or 10 times for four each experimental group, respectively (n = 10). Then the canals were cleaned by copious irrigation, and lubricated with a separating gel medium. Canal replicas were made using silicone impression material, and the diameter of the replicas was measured at working length (D0) and 1 mm level (D1) under a scanning electron microscope. Data was analysed by one-way ANOVA and post-hoc tests (p = 0.05). Results: The diameter at D0 level did not show any significant difference between the 1, 2, 4, and 10 times of repetitive pecking insertions of G2 files at working length. However, 10 times of pecking motion with G2 file resulted in significantly larger canal diameter at D1 (p < 0.05). Conclusions: Under the limitations of this study, the repetitive insertion of a G2 file up to 10 times at working length created an adequate lumen for subsequent apical shaping with other rotary files bigger than International Organization for Standardization (ISO) size 20, without apical transportation at D0 level.

A Study on Greenhouse Gas Emissions Estimation based on Mileage Through Accumulation of Activity Databases (활동자료 구축을 통한 주행거리 기반의 온실가스 배출량산정방법에 관한 연구)

  • Bae, Bo Ram;Kim, Gyeong Seok
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • The tier 3 methodology used in estimation of greenhouse gas emissions from road sectors is based on mileage data. However, such data can neither accurately represent the mileage of regional unit nor have sufficient integrated data reflecting the characteristics by region, vehicle type, fuel type and road type. Such estimation of greenhouse gas emissions is not reliable. Accordingly, the purpose of this study is, firstly to accumulate activity data based on distance traveled which enables us to accurately estimate the amount of green gas emitted by regional unit(emission point), and secondly, to develop a methodology for estimation of greenhouse gas emissions using these data. To do this, the study utilizes the mileage data of Korea Transportation Safety Authority(TS), statistics of registered motor vehicles, statistical yearbook of traffic volume from the Ministry of Land, Infrastructure and Transport(MLIT), the Korea Transport Database of the Korea Transport Institute(KOTI), and average road speed by local government. Methodology for estimation by local government level(emission point) is meaningful, because it reflects traffic pattern data including flow in and out and internal traffics. Finally, to verify the methodology presented in this study, it is applied to Seoul. Both greenhouse gas estimates, one by multiplying the average mileage and the number of registered vehicles and the other by multiplying traffic volume and road extension, are less than the amount estimated by the methodology presented in this study.