• Title/Summary/Keyword: Permission Management

Search Result 187, Processing Time 0.022 seconds

A Study on the Necessary Spaces and Area Standards of Integration Facility for Early Childhood Education and Care (영유아 교육·보육 통합시설의 필요 공간과 면적기준에 관한 연구)

  • Cho, Jin Il;Choi, Hyeong Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.17 no.2
    • /
    • pp.22-37
    • /
    • 2018
  • This study suggests desirable disaster safety education curriculum through analyzing the operational status of the school disaster safety management training course and demand survey of school staff. First, the problem of the disaster safety training course of the school is not connected with the lack of law and system and the school disaster safety job. Second, improvement of law and system and variety of training should be made to acquire professional knowledge. Third, it is necessary to divide curriculum into the following four categories, according to educational needs of public officials ; Educational administration officers course focused on facility safety, maintenance and disaster countermeasure. Educational officials in technical post course addressing approval and permission of school facility projects, seismic reinforcement of school building, etc. Educational supervisors course covering roles and responsibilities of the school safety supervisors in the event of disaster. Teaching staffs course focused on safety instructions for students. Fourth, it is found that lectures and experiential learning methods are the most desirable methods of teaching and learning, and the major ranks are earthquake disaster, fire, gas, typhoon, school road, and electrical safety.

Phenomenological Approach of Self Regulation Related to Health of patients with Adult Disease (성인병 환자들의 건강과 관련된 자기조절에 대한 현상학적 연구)

  • 김숙영
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.3
    • /
    • pp.562-580
    • /
    • 1995
  • This research was an attempt to make it possible to provide nursing care and health education meet- ing the need not of care givers but of patients by identifying the nature of patients' self regulation experiences. The specific objective of this study was : 1) to explore self regulation experiences of patients with adult disease. The phenomenological approach in qualitative studies is used to serve this purpose. Colaizzi's method is used for the phenomenological analysis of the data in this study, which were collected from 25 patients hospitalized in the internal medical ward and oriental medical ward of a Seoul hospital, suffering from adult disease such as hypertension, arteriosclerosis and diabetes mellitus. The research was conducted over a period of March to September, 1994. The investigator conducted participated observations and in-depth unstructured interviews which were audiotaped under the permission of patients. The investigator read the data repeatedly to identify and categorize significant statements, formulating meanings, themes and theme clusters. The result is categorized as follows : Self regulation activities, their barriers and predisposing factors of a disease. Thirteen theme clusters of self regulation activities related to health identified were. “maintaining diet regimen”, “maintaining exercise regimen”, “maintaining medication regimen”, “maintaining oriental medical regimen”, “maintaining health monitoring regimen”, “maintaining self effort”, “maintaining religious life”, “maintaining social sup-port systems”, “maintaining peaceful mind”, “maintaining moderation in life”, “maintaining sincere attitude in life”, “maintaining natural life”, and “maintaining folk remedy” This findings confirm the fact that self regulation is complicatedly and diversely influenced by oriental medicine and folk remedy, and Korean traditional ideas melted in Confucianism, Buddhism, Taoism and Shamanism, and modern medical care and western culture. Seven theme clusters of self regulation barriers identified were : "lack of knowledge and self aware-ness", "lack of social supports", "lack of awareness of need in continuous regimen and treatment", "dissatisfaction with hospital and health care provider", "lack of self management ", "lack of will to combat illness", and "overconfidence in folk remedy" Four theme clusters of predisposing factors of a disease were : "cumulation of stressors", "fatalism", "careless life style", and "family history". In conclusion, this. study will prove helpful not only in understanding clients in light of our traditional culture but also in providing them with the kind of nursing care and health education satisfying their demands and particularly cultural needs.

  • PDF

Improvement on Development Permit System after the Abolition of the Regulation against Continuous and Adjacent Development (연접개발제한 폐지 이후 개발행위허가 심의제도 개선방안)

  • Kim, Young-Woo;Yoon, Jeong-Joong
    • Land and Housing Review
    • /
    • v.3 no.2
    • /
    • pp.159-167
    • /
    • 2012
  • The regulation of continuous and adjacent development was introduced to prevent unplanned and improper development and to protect environment in green zone and non-urban area that was deficient in infrastructure. Though it has been effective, it was repealed in 2011 by disorderly development problem caused by crafty tricks around restrictions. Alternatively, the Urban Planning Commission is now deliberating on the development permit, but there are still much to be resolved such as improper committee formation and abuse of power, insufficient green corridor preservation, a lack of use of planning information system, discordance between landscape management guidelines in laws, etc. Therefore, we suggest several ideas for improvement of development permit system as follows; intensive deliberation system in the Urban Planning Commission, integrated commission for green corridor prevention, early establishment of urban planning information system, making a development permission guideline to minimize discretional act of the Urban Planning Commission, etc.

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Legal Violation of The Chemical Substances Control Act by Hazardous Chemical Business Operators in Ulsan Industrial Areas (울산지역 유해화학물질 영업자의 화학물질관리법 위반 현황과 내용)

  • Jihoon Park;Hye-Ok Kwon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.1
    • /
    • pp.60-69
    • /
    • 2023
  • Objectives: Business operators handling hazardous chemicals regulated under the Chemical Substances Control Act (CSCA) must receive permits to operate their business from the Ministry of Environment. This study analyzed the status of recent legal violation in chemical handling workplaces in Ulsan where a large volume of chemicals is handled for industrial use. Methods: A total of 557 corporations have been granted legal status as business operators in Ulsan. For all business operators, legal violations in regard to the CSCA that were discovered by the environmental office in the last five years (2018~2022) were thoroughly analyzed. Results: A total of 225 violations of the CSCA have been discovered at 165 corporations, with the violation rate accounting for approximately 27% of all business operators. In particular, 22% of the 165 violators (36 corporations) were discovered to have violated twice or more, and some business operators (6%) even violated in consecutive years. Non-compliance of facility inspection was the most frequent violation (45 cases, 20.1%), followed by non-reporting of important changes in the permitted matters (23 cases, 10.3%), non-completion of legal safety education (19 cases, 8.5%), failure to secure permission for modification in the permitted matters (18 cases, 8.0%), and failure to submit chemical transport plans (16 cases, 7.1%). Conclusions: Most of the violations could have been prevented if the field personnel had paid sufficient attention. Thus, it is fundamentally necessary to create an environment for spontaneous safety management for themselves and to strengthen individual capabilities.

The Secure Password Authentication Method based on Multiple Hash Values that can Grant Multi-Permission to a Single Account (단수 계정에 다중 권한 부여가 가능한 다중 해시값 기반의 안전한 패스워드 인증 기법 설계)

  • Hyung-Jin Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2023
  • ID is used as identifying information and password as user authentication for ID-based authentication. In order to have a secure user authentication, the password is generated as a hash value on the client and sent to the server, where it is compared with the stored information and authentication is performed. However, if even one character is incorrect, the different hash value is generated, authentication will be failed and cannot be performed and various functions cannot be applied to the password. In this study, we generate several hash value including imaginary number of entered password and transmit to server and perform authentcation. we propose a technique can grants the right differentially to give various rights to the user who have many rights by one account. This can defend shoulder surfing attack by imaginary password and provide convenience to users who have various rights by granting right based on password.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

Limit of interpreting 'security service' in current 「Security Services Industry Act」 and direction of legislating and revising private security industry (현행 「경비업법」상 경비개념과 경비업무 해석의 한계 및 민간보안산업 관련 입법의 제·개정 방향)

  • Choi, Eun-Ha;Kim, Na-Ri;Yoo, Young-Jae
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.35-57
    • /
    • 2017
  • Security Act has been partially revised many times since it was revised to "Security Service Act". Main contents of such revision consist of the addition of security work such as protection or special security, responsibility enforcement of security company or security guard and systematic management of security service based on security work of previous security service act. But, it needs to be checked out that the fundamental matter about the concept of 'security' is directly related as double-edged sword in such flow of legal revision. That is because security service satisfies the multiple needs for security in the modern risky society and is based on the concept of active management whose goal is to forster and develop the function of actual security service comparing that current "Security Service Act" regulates the formal security service whose goal is permission of security service and systematic management based on article 2 as previous facilities and manned security that is guard duty-centered security service in another respect. So, this study pointed out the limit of interpreting security and security service in "Security Services Industry Act" in respect of providing private security service and drew the conclusion that the legislation and efforts are required for 'security for citizen' by reinterpreting the legislation and revision of private security service-related law as the normal regulation of "Security Services Industry Act" and the special law of "Private Security Services Industry Act".

  • PDF

Dynamic Analysis of CRM Strategy for Online Shopping-mall (온라인쇼핑몰의 CRM 전략에 관한 동태적 분석: System Dynamics 기법을 활용한 고객만족도 분석을 중심으로)

  • Kang, Jae-Won;Lim, Jay-Ick;Lee, Sang-Gun
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.99-132
    • /
    • 2007
  • As customer management rises by important issue in electronic commerce, virtue study about CRM have proceeded much. However, because existent researches were positive researches of most statistical base, There are some limitation that does not show dynamic change with CRM flow by flowing of time, and can not forecast propriety and future result about CRM strategy. Therefore, in order to overcome existent limitation on these CRM study, this study designed dynamic model which draws factors that compose CRM strategy of on-line shopping mall, and do based on technique in system dynamics so that can analyze dynamic change between these factors. Concretely, atomized customer focuses in the on-line shopping mall and does based on Permission marketing theory, and applied CRM of different level to atomized customers and know change of customer satisfaction measurement and discomfort degree accordingly. According to the result of Simulation practice, situation that achieve CRM strategy of different level by atomize customer more increase the customer satisfaction than situation that is not so. Dynamic pattern that presented in this study is expected that can verify validity about CRM achievement strategy of different level at each CRM point of contact & how Internet enterprise including on-line shopping mall is establishing CRM strategy reasonably.