• Title/Summary/Keyword: Safety Secure

Search Result 1,404, Processing Time 0.033 seconds

A Legal Study on Improvement Plans for Citizen Safety Insurance Operation and Management System (시민안전보험 운영관리체계의 개선방안 연구)

  • Lee, Jung-Im
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.2
    • /
    • pp.77-85
    • /
    • 2022
  • This study tried to suggest a systematic improvement plan to prepare a civil safety insurance operation and management system by reviewing the operation and management status of civil safety insurance, which is operated and managed by each local government autonomously. In this study, the problems of the current civil safety insurance were analyzed by dividing them into the lack of systematic management of insurance items, overlapping coverage between insurance items, and deviations in compensation limits. As a systematic improvement plan, it was suggested to secure the systemic management of guarantee items, standardize compensation standards, prepare an integrated operation and management system, and provide financial support for local governments with poor financial independence. Since the problems and improvement plans for the civil safety insurance analyzed as described above are formed by exchanging and receiving a complex mutual influence, the institutional improvement plan for the operation and management system of the civil safety insurance is not only a specific part of the study, but also comprehensively current citizens. Based on the results derived from the analysis of safety insurance, it is concluded that alternatives must be found.

A Study on the Performance Experiments of Lightweight Wall of Long-life Housing by Ceiling Infill System (천장 인필시스템에 따른 장수명주택 경량벽체의 성능실험에 관한 연구)

  • Seo, Dong-Goo;Lee, Jong-Ho;Kim, Eun-Young;Hwang, Eun-Kyoung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2018.05a
    • /
    • pp.247-248
    • /
    • 2018
  • In order to secure the variability of long-life housing, dry walls are used. The composite gypsum board panel is the most frequently used infill system for the wall, and it is an excellent construction method in terms of constructability and economic feasibility. However, there are also problems such as the destruction of Ondol pipes at the bottom floor and being unable to fix the light weight steel frame (M-bar) when a variable composite gypsum board panel is used. To solve such problems, a wall with a method of fixing only the top part without fixing the bottom floor is developed, but it is difficult to identify the durability of ceiling frame according to the tensile force of stud and the safety according to the Stiffness and impact resistance (soft body) of ceiling frame. Therefore, this study verified the effectiveness of infill system for the wall by conducting experiment on the stiffness and impact resistance of composite gypsum board panel according to the reinforcement of ceiling frame (wooden frame, double saw-toothed bracket, Cross M-bar). As a result, it was possible to secure the safety of wooden frame while the impact resistance and the Stiffness of double saw-toothed bracket and cross M-bar were not secured.

  • PDF

A Reform Measure of the Structure and Transaction Process for the Safety Improvement of a Credit Card (신용카드의 안전성 향상을 위한 구조 및 거래절차 개선방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.63-74
    • /
    • 2011
  • Credit cards are more convenient than cash of heavy. Therefore, credit cards are used widely in on_line (internet) and off_line in nowadays. To use credit cards on internet is commonly secure because client identification based security card and authentication certificate. However, to use in off_line as like shop, store, department, restaurant is unsecure because of irregular accident. As client identification is not used in off_line use of credit cards, the irregular use of counterfeit, stolen and lost card have been increasing in number recently. Therefore, client identification is urgently necessary for secure card using in off_line. And the method of client identification must be simple, don't take long time, convenient for client, card affiliate and card company. In this paper, we study a reform measure of the structure and transaction process for the safety improvement of a credit cards. And we propose several authentication method of short-and long-term for client identification. In the proposal, the client authentication method by OTP application of smart-phone is efficient nowadays.

A Study on Strengthening Competitiveness of Logistics Firms - Local Companies approach - (물류기업의 경쟁력 강화를 위한 연구 -지역 기업을 중심으로-)

  • Kim, Ki-Hong
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.123-128
    • /
    • 2017
  • Logistics companies distinguish between medium-sized business and small business according to the size of enterprises. Of course, conglomerates are called global corporations. In this study, mid-sized companies over a certain size or more and those below are classified and decide the priorities among important factors to secure competitiveness in logistics companies are determined through AHP technique. Mid-sized companies are companies that can provide more than two logistics services. For example, they provide warehousing and transportation services in the same time. small companies are companies that can mostly provide one functional service. Warehousing, transportation, manpower, and information are listed as factors in this study. As a result of the study, medium-sized companies emphasized on the importance of transportation. When it comes to small companies, warehousing was emphasized as an important factor. Due to the simultaneous and contemporary service of warehousing and transportation in small-sized company, the reliable image of the company will be underestimated in case of delays in transportation. Competitiveness will also be weakened. Global corporations or conglomerates will start to consider relocating warehousing areas to others except for the central storage hub. They won't plan to invest directly, either. Therefore, it will be possible to secure competitiveness by providing the function of warehousing and to signed easily partnership.

Application of HACCP principles to MAR-based drinking water supply system (MAR기반 음용수 공급 시스템에의 HACCP 원리 적용)

  • Ji, Hyon Wook;Lee, Sang-Il
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.30 no.5
    • /
    • pp.533-543
    • /
    • 2016
  • Supplying clean and safe water to people is facing both quantitative and qualitative challenges. Due to climate change, access to freshwater becomes increasingly difficult, while pollution from various sources decreases the public trust in water quality. Managed aquifer recharge (MAR) which stores and uses surface water in aquifer is receiving attention as a new technology to secure freshwater. Recently, there is a global expansion in the attempt to combine general purification plants and hazard analysis and critical control point (HACCP) which manages all the process from raw material to consumer for food safety. This research is about an attempt to apply HACCP to the drinking water supply process using MAR to secure both quantity and quality of drinking water. The study site is a MAR plant being constructed in the downstream area of the Nakdong River Basin, South Korea. The incorporation of HACCP with MAR-based water supply system is expected to enhance the safety and reliability of drinking water.

Safety Comparison Analysis Against Known/Chosen Plaintext Attack of RBF (Random Block Feedback) Mode to Other Block Cipher Modes of Operation (블록 암호 연산 모드 RBF(Random Block Feedback)의 알려진/선택 평문 공격에 대한 안전성 비교 분석)

  • Kim, Yoonjeong;Yi, Kang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.317-322
    • /
    • 2014
  • Data security and integrity is a critical issue in data transmission over wired/wireless links. A large amount of data is encrypted before transmission, by block cipher using mode of operation. RBF mode is a block cipher mode of operation which uses random characteristics. In this paper, we analyze the safety against known plaintext attack and chosen plaintext attack of RBF mode compared to the traditional modes. According to the analysis, RBF mode is known to be secure while the traditional modes are not secure against them.

A Scalable Secure Multicast Key Management Structure (확장성을 제공하는 안전한 멀티캐스트 키 관리 구조)

  • Park, Hee-Un;Lee, Im-Yeong;Park, Won-Joo;Lee, Jong-Tai;Sohn, Sung-Won
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.109-116
    • /
    • 2002
  • Through the increment of requirement for group oriented communication services, on the open network, the multicast infrastructure has become a widely discussed researching topic. However the research of the security properties that safety, efficiency and scaleability in a multicast structure, has not been enough. In this study, we discuss conventional multicast key management structures and propose a scalable secure multicast key management structure based on PKI(Public Key Infrastructure), IPSec, domain subgroup and structural two mode scheme. Also we certify to the usability of new proposed scheme from comparing it with conventional schemes in the part of safety, efficiency and scaleability.

A Study on Environment Change of Ocean Security and Future Direction for Korea Coast Guard (해양안보의 환경변화와 해양경찰의 향후과제에 관한 연구)

  • Cho Dong-Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.3 s.26
    • /
    • pp.225-231
    • /
    • 2006
  • The ocean provides with not only the global environment and ecology, which is essential for human beings survival, but also various resources for human beings prosperity. The ocean security is to secure and keep the benefits that the ocean provides with to human beings. It is essential to keep enforcement measures for the ocean security. Major marine countries are challenging to secure ocean environment and resources since UNCLOS. The utmost policy priority should be given to the ocean security in Korea.

  • PDF

A Study on the Configuration of the Quotation Management System in the Make-To-Order Manufacturing Environments (수주생산 환경에서 견적관리체계의 구성에 관한 연구)

  • Jeon, Gyu-Hwan;Jang, Gil-Sang;Park, Chang-Kwon
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.73-81
    • /
    • 2021
  • Today's manufacturers must respond quickly to customer needs. In particular, make-to-order companies are constantly striving to satisfy customer demand for products in order to secure more favorable conditions in the future through bidding. In this bidding process, quotations play a very important role in providing favorable conditions. And the most important content that companies strive to satisfy their customers is the product's performance. Therefore, a company can attract customers and secure economic profits through good quotations, but it can be said that the first priority is to match the performance of the products requested by the customers. That is, when a company creates a quotation, it is important to structure the quotation according to the performance of the product. Thus, this paper intends to present a quotation management framework and a quotation BOM information model for constructing quotations efficiently in make-to-order manufacturing. And, in order to prove the usefulness of the proposed quotation management framework, we presents an case of the construction of an quotation management system based on the JAVA platform. As a result, the integrated quotation management system based on the proposed quotation management framework and quotation BOM has been successfully operated in a make-to-order company that manufactures marine engines.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF