• Title/Summary/Keyword: Security Search

Search Result 524, Processing Time 0.029 seconds

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast (오버레이 멀티캐스팅에서 트리의 스위칭을 고려한 빠른 멤버 가입 방안에 관한 연구)

  • Cho, Sung-Yean;Rho, Kyung-Taeg;Park, Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.625-634
    • /
    • 2003
  • More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.

A Comparative Study of Korean Home Economic Curriculum and American Practical Problem Focused Family & Consumer Sciences Curricula (우리나라 가정과 교육과정과 미국의 실천적 문제 중심 교육과정과의 비교고찰)

  • Kim, Hyun-Sook;Yoo, Tae-Myung
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.4
    • /
    • pp.91-117
    • /
    • 2007
  • This study was to compare the contents and practical problems addressed, the process of teaching-learning method, and evaluation method of Korean Home Economics curriculum and of the Oregon and Ohio's Practical Problem Focused Family & Consumer Sciences Curricula. The results are as follows. First, contents of Korean curriculum are organized by major sub-concepts of Home Economics academic discipline whereas curricular of both Oregon and Ohio states are organized by practical problems. Oregon uses the practical problems which integrate multi-subjects and Ohio uses ones which are good for the contents of the module by integrating concerns or interests which are lower or detailed level (related interests). Since it differentiates interest and module and used them based on the basic concept of Family and Consumer Science, Ohio's approach could be easier for Korean teachers and students to adopt. Second, the teaching-learning process in Korean home economics classroom is mostly teacher-centered which hinders students to develop higher order thinking skills. It is recommended to use student-centered learning activities. State of Oregon and Ohio's teaching-learning process brings up the ability of problem-solving by letting students clearly analyze practical problems proposed, solve problems by themselves through group discussions and various activities, and apply what they learn to other problems. Third, Korean evaluation system is heavily rely on summative evaluation such as written tests. It is highly recommended to facilitate various performance assessment tools. Since state of Oregon and Ohio both use practical problems, they evaluate students mainly based on their activity rather than written tests. The tools for evaluation include project documents, reports of learning activity, self-evaluation, evaluation of discussion activity, peer evaluation in a group for each students for their performance, assessment about module, and written tests as well.

  • PDF

Personalized Recommendation System for IPTV using Ontology and K-medoids (IPTV환경에서 온톨로지와 k-medoids기법을 이용한 개인화 시스템)

  • Yun, Byeong-Dae;Kim, Jong-Woo;Cho, Yong-Seok;Kang, Sang-Gil
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.147-161
    • /
    • 2010
  • As broadcasting and communication are converged recently, communication is jointed to TV. TV viewing has brought about many changes. The IPTV (Internet Protocol Television) provides information service, movie contents, broadcast, etc. through internet with live programs + VOD (Video on demand) jointed. Using communication network, it becomes an issue of new business. In addition, new technical issues have been created by imaging technology for the service, networking technology without video cuts, security technologies to protect copyright, etc. Through this IPTV network, users can watch their desired programs when they want. However, IPTV has difficulties in search approach, menu approach, or finding programs. Menu approach spends a lot of time in approaching programs desired. Search approach can't be found when title, genre, name of actors, etc. are not known. In addition, inserting letters through remote control have problems. However, the bigger problem is that many times users are not usually ware of the services they use. Thus, to resolve difficulties when selecting VOD service in IPTV, a personalized service is recommended, which enhance users' satisfaction and use your time, efficiently. This paper provides appropriate programs which are fit to individuals not to save time in order to solve IPTV's shortcomings through filtering and recommendation-related system. The proposed recommendation system collects TV program information, the user's preferred program genres and detailed genre, channel, watching program, and information on viewing time based on individual records of watching IPTV. To look for these kinds of similarities, similarities can be compared by using ontology for TV programs. The reason to use these is because the distance of program can be measured by the similarity comparison. TV program ontology we are using is one extracted from TV-Anytime metadata which represents semantic nature. Also, ontology expresses the contents and features in figures. Through world net, vocabulary similarity is determined. All the words described on the programs are expanded into upper and lower classes for word similarity decision. The average of described key words was measured. The criterion of distance calculated ties similar programs through K-medoids dividing method. K-medoids dividing method is a dividing way to divide classified groups into ones with similar characteristics. This K-medoids method sets K-unit representative objects. Here, distance from representative object sets temporary distance and colonize it. Through algorithm, when the initial n-unit objects are tried to be divided into K-units. The optimal object must be found through repeated trials after selecting representative object temporarily. Through this course, similar programs must be colonized. Selecting programs through group analysis, weight should be given to the recommendation. The way to provide weight with recommendation is as the follows. When each group recommends programs, similar programs near representative objects will be recommended to users. The formula to calculate the distance is same as measure similar distance. It will be a basic figure which determines the rankings of recommended programs. Weight is used to calculate the number of watching lists. As the more programs are, the higher weight will be loaded. This is defined as cluster weight. Through this, sub-TV programs which are representative of the groups must be selected. The final TV programs ranks must be determined. However, the group-representative TV programs include errors. Therefore, weights must be added to TV program viewing preference. They must determine the finalranks.Based on this, our customers prefer proposed to recommend contents. So, based on the proposed method this paper suggested, experiment was carried out in controlled environment. Through experiment, the superiority of the proposed method is shown, compared to existing ways.

"Legal Study on Boundary between Airspace and Outer Space" (영공(領空)과 우주공간(宇宙空間)의 한계(限界)에 관한 법적(法的) 고찰(考察))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.2
    • /
    • pp.31-67
    • /
    • 1990
  • One of the first issues which arose in the evolution of air law was the determination of the vertical limits of airspace over private property. In 1959 the UN in its Ad Hoc Committee on the Peaceful Uses of Outer Space, started to give attention to the question of the meaning of the term "outer space". Discussions in the United Nations regarding the delimitation issue were often divided between those in favour of a functional approach ("functionalists"), and those seeking the delineation of a boundary ("spatialists"). The functionalists, backed initially by both major space powers, which viewed any boundary as possibly restricting their access to space(Whether for peaceful or military purposes), won the first rounds, starting with the 1959 Report of the Ad Hoc Committee on the Peaceful Uses of Outer Space which did not consider that the topic called for priority consideration. In 1966, however, the spatialists, were able to place the issue on the agenda of the Outer Sapce Committee pursuant to Resolution 2222 (xxx1). However, the spatialists were not able to present a common position since there existed a variety of propositions for delineation of a boundary. Over the years, the funtionalists have seemed to be losing ground. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It is therefore to be welcomed that there is clear evidence of a growing recognition of the defect inherent to such an approach and that a spatial approach to the problem is gaining support both by a growing number of States as well as by publicists. The search for a solution of the problem of demarcating the two different legal regimes governing the space above the Earth has undoubtedly been facilitated, and a number of countries, among them Argentina, Belgium, France, Italy and Mexico have already advocated the acceptance of the lower boundary of outer space at a height of 100km. The adoption of the principle of sovereignty at that height does not mean that States would not be allowed to take protective measures against space activities above that height which constitute a threat to their security. A parallel can be drawn with the defence of the State's security on the high seas. Measures taken by States in their own protection on the high seas outside the territorial waters-provided that they are proportionate to the danger-are not considered to infringe the principle of international law. The most important issue in this context relates to the problem of a right of passage for space craft through foreign air space in order to reach outer space. In the reports to former ILA Conferences an explanation was given of the reasons why no customary rule of freedom of passage for aircraft through foreign territorial air space could as yet be said to exist. It was suggested, however, that though the essential elements for the creation of a rule of customary international law allowing such passage were still lacking, developments apperaed to point to a steady growth of a feeling of necessity for such a rule. A definite treaty solution of the demarcation problem would require further study which should be carried out by the UN Outer Space Committee in close co-operation with other interested international organizations, including ICAO. If a limit between air space and outer space were established, air space would automatically come under the regime of the Chicago Convention alone. The use of the word "recognize" in Art. I of chicago convention is an acknowledgement of sovereignty over airspace existing as a general principle of law, the binding force of which exists independently of the Convention. Further it is important to note that the Aricle recognizes this sovereignty, as existing for every state, holding it immaterial whether the state is or is not a contracting state. The functional criteria having been created by reference to either the nature of activity or the nature of the space object, the next hurdle would be to provide methods of verification. With regard to the question of international verification the establishment of an International Satelite Monitoring Agency is required. The path towards the successful delimitation of outer space from territorial space is doubtless narrow and stony but the establishment of a precise legal framework, consonant with the basic principles of international law, for the future activities of states in outer space will, it is still believed, remove a source of potentially dangerous conflicts between states, and furthermore afford some safeguard of the rights and interests of non-space powers which otherwise are likely to be eroded by incipient customs based on at present almost complete freedom of action of the space powers.

  • PDF

The Achievements and limitations of the U. S. Welfare Reform (미국 복지개혁의 성과와 한계)

  • Kim, Hwan-Joon
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.129-153
    • /
    • 2003
  • This study examines the socio-economic impacts of recent welfare reform in the United States. Based on the neo-conservative critique to the traditional public assistance system for low-income families, the 1996 welfare reform has given greater emphases on reducing welfare dependency and increasing work effort and self-sufficiency among welfare recipients. In particular, the welfare reform legislation instituted 60-month lifetime limits on cash assistance, expanded mandatory work requirements, and placed financial penalties for noncompliance. With the well-timed economic boom in the second half of the 1990s, the welfare reform seems to achieve considerable progress; welfare caseload has declined sharply to reach less than 50% of its 1994 peak, single mothers' labor force participation has increased substantially, and child poverty has decreased. In spite of these good signals, the welfare reform also has several potential problems. Many welfare leavers participate in the labor market, but not all (or most) of them. The economic well being of working welfare leavers did not increased significantly, because earnings increase was canceled out by parallel decrease in welfare benefits. Furthermore, most of working welfare leavers are employed in jobs with poor employment stability and low wages, making them highly vulnerable to frequent layoff, long-time joblessness, persistent poverty, and welfare recidivism. Another serious problem of the welfare reform is that a substantial number of welfare recipients are faced with extreme difficulties in finding jobs, because they have severe barriers to employment. The new welfare system with 5-year time limit can severely threaten the livelihoods of these people. The welfare reform presupposes that welfare recipients can achieve self-reliance by increasing their labor market activities. However, empirical evidences suggest that many people are unable to respond to the new, work-oriented welfare strategy. It may be a very difficult task to achieve both objectives of the welfare reform((1) providing adequate income security for low-income families and (2) promoting self-sufficiency) at the same time, because sometimes they are conflicting each other. With this in mind, a possible solution can be to distinguish welfare recipients into "(Very)-Hard-to-Employ" group and "(Relatively)-Ready-to-Work" group, based on elaborate examinations of a wide range of personal conditions. For the former group, the primary objective of welfare policies should be the first one(providing income security). For the "Ready-to-Work" group, follow-up services to promote job retention and advancement, as well as skill-training and job-search services, are very important. The U. S. experiences of the welfare reform provide some useful implications for newly developing Korean public assistance policies for the able-bodied low-income population.

  • PDF

The current state and prospects of travel business development under the COVID-19 pandemic

  • Tkachenko, Tetiana;Pryhara, Olha;Zatsepina, Nataly;Bryk, Stepan;Holubets, Iryna;Havryliuk, Alla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.664-674
    • /
    • 2021
  • The relevance of this scientific research is determined by the negative impact of the COVID-19 pandemic on the current trends and dynamics of world tourism development. This article aims to identify patterns of development of the modern tourist market, analysis of problems and prospects of development in the context of the COVID-19 pandemic. Materials and methods. General scientific methods and methods of research are used in the work: analysis, synthesis, comparison, analysis of statistical data. The analysis of the viewpoints of foreign and domestic authors on the research of the international tourist market allowed us to substantiate the actual directions of tourism development due to the influence of negative factors connected with the spread of a new coronavirus infection COVID-19. Economic-statistical, abstract-logical, and economic-mathematical methods of research were used during the process of study and data processing. Results. The analysis of the current state of the tourist market by world regions was carried out. It was found that tourism is one of the most affected sectors from COVID-19, as, by the end of 2020, the total number of tourist arrivals in the world decreased by 74% compared to the same period in 2019. The consequence of this decline was a loss of total global tourism revenues by the end of 2020, which equaled $1.3 trillion. 27% of all destinations are completely closed to international tourism. At the end of 2020, the economy of international tourism has shrunk by about 80%. In 2020 the world traveled 98 million fewer people (-83%) relative to the same period last year. Tourism was hit hardest by the pandemic in the Asia-Pacific region, where travel restrictions are as strict as possible. International arrivals in this region fell by 84% (300 million). The Middle East and Africa recorded declines of 75 and 70 percent. Despite a small and short-lived recovery in the summer of 2020, Europe lost 71% of the tourist flow, with the European continent recording the largest drop in absolute terms compared with 2019, 500 million. In North and South America, foreign arrivals declined. It is revealed that a significant decrease in tourist flows leads to a massive loss of jobs, a sharp decline in foreign exchange earnings and taxes, which limits the ability of states to support the tourism industry. Three possible scenarios of exit of the tourist industry from the crisis, reflecting the most probable changes of monthly tourist flows, are considered. The characteristics of respondents from Ukraine, Germany, and the USA and their attitude to travel depending on gender, age, education level, professional status, and monthly income are presented. About 57% of respondents from Ukraine, Poland, and the United States were planning a tourist trip in 2021. Note that people with higher or secondary education were more willing to plan such a trip. The results of the empirical study confirm that interest in domestic tourism has increased significantly in 2021. The regression model of dependence of the number of domestic tourist trips on the example of Ukraine with time tendency (t) and seasonal variations (Turˆt = 7288,498 - 20,58t - 410,88∑5) it forecast for 2020, which allows stabilizing the process of tourist trips after the pandemic to use this model to forecast for any country. Discussion. We should emphasize the seriousness of the COVID-19 pandemic and the fact that many experts and scientists believe in the long-term recovery of the tourism industry. In our opinion, the governments of the countries need to refocus on domestic tourism and deal with infrastructure development, search for new niches, formats, formation of new package deals in new - domestic - segment (new products' development (tourist routes, exhibitions, sightseeing programs, special rehabilitation programs after COVID) -19 in sanatoriums, etc.); creation of individual offers for different target audiences). Conclusions. Thus, the identified trends are associated with a decrease in the number of tourist flows, the negative impact of the pandemic on employment and income from tourism activities. International tourism needs two to four years before it returns to the level of 2019.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Canadian Public and Stakeholder Engagement Approach to a Spent Nuclear Fuel Management (사용후핵연료 관리를 위한 캐나다 공론화 방안)

  • Hwang, Yong-Soo;Kim, Youn-Ok;Whang, Joo-Ho
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.3
    • /
    • pp.179-187
    • /
    • 2008
  • After Canada has struggled with a radioactive waste problem over for 20 years, the Canadian government finally found out that its approach by far has been lack of social acceptance, and needed a program such as public and stakeholder engagement (PSE) which involves the public in decision-making process. Therefore, the government made a special law, called Nuclear Fuel Waste Act (NFWA), to search for an appropriate nuclear waste management approach. NFWA laid out three possible approaches which were already prepared in advance by a nuclear expert group, and required Nuclear Waste Management Organization (NWMO) to be established to report a recommendation as to which of the proposed approaches should be adopted. However, NFWA allowed NWMO to consider additional management approach if the other three were not acceptable enough. Thus, NWMO studied and created a fourth management approach after it had undertaken an comparison of the benefits, risks and costs of each management approach: Adaptive Phased Management. This approach was intended to enable the implementers to accept any technological advancement or changes even in the middle of the implementation of the plan. The Canadian PSE case well shows that technological R&D are deeply connected with social acceptance. Even though the developments and technological advancement are carried out by the scientists and experts, but it is important to collect the public opinion by involving them to the decision-making process in order to achieve objective validity on the R&D programs. Moreover, in an effort to ensure the principles such as fairness, public health and safety, security, and adoptability, NWMO tried to make those abstract ideas more specific and help the public understand the meaning of each concept more in detail. Also, they utilized a variety of communication methods from face-to-face meeting to e-dialogue to encourage people to participate in the program as much as possible. Given the fact that Korea has been also having a hard time in dealing with spent nuclear fuel management, all of these efforts that Canada has made with a PSE program would give good lessons and implications to the Korean case. In conclusion, as a deliberative participation program, PSE could be a possible breakthrough approach for the Korean spent nuclear fuel management.

  • PDF