• Title/Summary/Keyword: Security problem

Search Result 2,550, Processing Time 0.025 seconds

The Achievements and limitations of the U. S. Welfare Reform (미국 복지개혁의 성과와 한계)

  • Kim, Hwan-Joon
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.129-153
    • /
    • 2003
  • This study examines the socio-economic impacts of recent welfare reform in the United States. Based on the neo-conservative critique to the traditional public assistance system for low-income families, the 1996 welfare reform has given greater emphases on reducing welfare dependency and increasing work effort and self-sufficiency among welfare recipients. In particular, the welfare reform legislation instituted 60-month lifetime limits on cash assistance, expanded mandatory work requirements, and placed financial penalties for noncompliance. With the well-timed economic boom in the second half of the 1990s, the welfare reform seems to achieve considerable progress; welfare caseload has declined sharply to reach less than 50% of its 1994 peak, single mothers' labor force participation has increased substantially, and child poverty has decreased. In spite of these good signals, the welfare reform also has several potential problems. Many welfare leavers participate in the labor market, but not all (or most) of them. The economic well being of working welfare leavers did not increased significantly, because earnings increase was canceled out by parallel decrease in welfare benefits. Furthermore, most of working welfare leavers are employed in jobs with poor employment stability and low wages, making them highly vulnerable to frequent layoff, long-time joblessness, persistent poverty, and welfare recidivism. Another serious problem of the welfare reform is that a substantial number of welfare recipients are faced with extreme difficulties in finding jobs, because they have severe barriers to employment. The new welfare system with 5-year time limit can severely threaten the livelihoods of these people. The welfare reform presupposes that welfare recipients can achieve self-reliance by increasing their labor market activities. However, empirical evidences suggest that many people are unable to respond to the new, work-oriented welfare strategy. It may be a very difficult task to achieve both objectives of the welfare reform((1) providing adequate income security for low-income families and (2) promoting self-sufficiency) at the same time, because sometimes they are conflicting each other. With this in mind, a possible solution can be to distinguish welfare recipients into "(Very)-Hard-to-Employ" group and "(Relatively)-Ready-to-Work" group, based on elaborate examinations of a wide range of personal conditions. For the former group, the primary objective of welfare policies should be the first one(providing income security). For the "Ready-to-Work" group, follow-up services to promote job retention and advancement, as well as skill-training and job-search services, are very important. The U. S. experiences of the welfare reform provide some useful implications for newly developing Korean public assistance policies for the able-bodied low-income population.

  • PDF

The Judgment of Criminal Liability and Psychiatric Evaluation for Mentally Defective Person (정신장애자의 형사책임능력 판단과 정신감정)

  • Jung, Yong-Gi
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.177-204
    • /
    • 2015
  • The Korean Criminal Code ${\S}10$ (1) provides that "The act of a person who, because of mental disorder, is unable to make discriminations or to control one's will, shall not be punished". Therefore, it'll not be able to be given criminal punishment if a mentally defective person is determined to lack the criminal liability. The problem about judging the criminal liability for the mentally defective person exists in areas where the criminal law intersects with psychiatry. Although the supreme court ultimately judges whether the criminal liability by mental defectiveness exists or not, the judgment of mental defectiveness, which is biological element, needs psychiatric knowledge and it is no wonder to rely on this. In particular, a change is required in the procedure and contents of mental examination for a mentally defective person as implementation of the Civil Participation in Criminal Jury Trial. It is needed the improvement of procedure to submit more accurate mental examination and the result of it in order that jurors are able to understand the result of mental examination and make an decision. This is because jurors consisting of ordinary citizens take part in trial. For guaranteeing the precise result of mental examination in the criminal justice procedure, it is necessary to establish the pool of manpower consisting of psychiatrists or psychologists who have completed the specific educational programs about the criminal justice and legal psychiatry, and it is desired to carry out the psychiatric test with selecting appraisers who belong to a pool of manpower. Furthermore, it is required to draw up and submit the written appraisal of mental examination which is easy to be known because of considering the nonprofessional of jurors consisting of ordinary citizens in the Civil Participation in Criminal Jury Trial. In order to gain a fair verdict of the jury about whether mental defectiveness exists or not, it is recommended the prompt submission of the written appraisal of mental examination, the presentation of the written appraisal of mental examination summarizing the important contents, and making out the written appraisal of mental examination for jurors to understand it easily.

  • PDF

Application and Comparative Analysis of River Discharge Estimation Methods Using Surface Velocity (표면유속을 이용한 하천 유량산정방법의 적용 및 비교 분석)

  • Jae Hyun, Song;Seok Geun Park;Chi Young Kim;Hung Soo Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.15-32
    • /
    • 2023
  • There are some difficulties such as safety problem and need of manpower in measuring discharge by submerging the instruments because of many floating debris and very fast flow in the river during the flood season. As an alternative, microwave water surface current meters have been increasingly used these days, which are easy to measure the discharge in the field without contacting the water surface directly. But it is also hard to apply the method in the sudden and rapidly changing field conditions. Therefore, the estimation of the discharge using the surface velocity in flood conditions requires a theoretical and economical approach. In this study, the measurements from microwave water surface current meter and rating curve were collected and then analyzed by the discharge estimation method using the surface velocity. Generally, the measured and converted discharge are analyzed to be similar in all methods at a hydraulic radius of 3 m or over or a mean velocity of 2 ㎧ or more. Besides, the study computed the discharge by the index velocity method and the velocity profile method with the maximum surface velocity in the section where the maximum velocity occurs at the high water level range of the rating curve among the target locations. As a result, the mean relative error with the converted discharge was within 10%. That is, in flood season, the discharge estimation method using one maximum surface velocity measurement, index velocity method, and velocity profile method can be applied to develop high-level extrapolation, therefore, it is judged that the reliability for the range of extrapolation estimation could be improved. Therefore, the discharge estimation method using the surface velocity is expected to become a fast and efficient discharge measurement method during the flood season.

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

Validation Technique of Simulation Model using Weighted F-measure with Hierarchical X-means (WF-HX) Method (계층적 X-means와 가중 F-measure를 통한 시뮬레이션 모델 검증 기법)

  • Yang, Dae-Gil;HwangBo, Hun;Cheon, Hyun-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.562-574
    • /
    • 2012
  • Simulation validation techniques which have been employed in most studies are statistical analysis, which validate a model with mean or variance of throughput and resource utilization as an evaluation object. However, these methods have not been able to ensure the reliability of individual elements of the model well. To overcome the problem, the weighted F-measure method was proposed, but this technique also had some limitations. First, it is difficult to apply the technique to complex system environment with numerous values of interarrival time because it assigns a class to an individual value of interarrival time. In addition, due to unbounded weights, the value of weighted F-measure has no lower bound, so it is difficult to determine its threshold. Therefore, this paper propose weighted F-measure technique with cluster analysis to solve these problems. The classes for the technique are defined by each cluster, which reduces considerable number of classes and enables to apply the technique to various systems. Moreover, we improved the validation technique in the way of assigning minimum bounded weights without any lack of objectivity.

A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment (씬클라이언트 환경에서 클라우드 컴퓨팅을 이용한 N-Screen 세션 관리 기반의 N-Screen 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.21-32
    • /
    • 2012
  • We develop architecture of a virtual aggregation gateway (VAG) which enables composite application streaming based on N-Screen-as-a-Service (NaaS) using cloud computing in thin-client environment. We also discuss the problem of server computing burden in large scale multi-client case for screens sharing with composite application streaming over the internet. In particular, we propose an efficient Framework of N-Screen Session Manager which manages all media signaling that are necessary to deliver demanded contents. Furthermore, it will provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers. The objectives of proposing N-Screen Session Manager are to (1) manage session status of all communication sessions (2) manage handling of received request and replies (3) allow users to playback multimedia contents anytime with variety of devices for screen sharing and (4) allow users to transfer an ongoing communication session from one device to another. Furthermore, we discuss the major security issues that occur in Session Initiation Protocol as well as minimizing delay resulted from session initiations (playback or transfer session).

Design and Implementation of 3D Geospatial Open Platform Based on HTML5/WebGL Technology (HTML5/WebGL 기반 3D 공간정보 오픈플랫폼 소프트웨어 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.57-66
    • /
    • 2015
  • Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.

Current Status and Tasks of Using the School Affairs System in Elementary Schools (초등학교에서의 교무업무시스템 운영 현황과 과제 - 서울과 경기 지역을 중심으로 -)

  • Shin, Ji-Yean;Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.1
    • /
    • pp.21-28
    • /
    • 2007
  • Along with the development of telecommunication technology, educational role has been considerably changed and NEIS is introduced and operated for the digital educational administration. However, the function of NEIS is so limited when operated in each school. As a result, Korean government prepares the plan to install and operate a new School Affairs System by separating 3 areas from 27 areas of NEIS. School Affairs System has been used in schools since March, 2006. In this regard, this study attempts to analyze the current status and tasks of using the system in elementary schools. The result of the study shows that about 67% teachers use the system once or twice a day. Most of teachers answer that they get help from other teachers if they have any problem in operating the system. Many teachers affirmatively answer to the design and function of the system, and they are satisfied with the convenience and efficiency of the system. However, they feel difficulty to be familiar with the system sue to the frequent change. The importance of electronic certificate and personal information is well recognized and managed in terms of the security of the system. Facilities need to be well equipped, and information exchange system need to be developed to accept each school's request to improve the function of the system. In addition, applicable laws need to be arranged, clear guideline of educational administration agency and principal's strong intention are required to relieve teachers' work load.

  • PDF

Elliptic Curve Cryptography Coprocessors Using Variable Length Finite Field Arithmetic Unit (크기 가변 유한체 연산기를 이용한 타원곡선 암호 프로세서)

  • Lee Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.1
    • /
    • pp.57-67
    • /
    • 2005
  • Fast scalar multiplication of points on elliptic curve is important for elliptic curve cryptography applications. In order to vary field sizes depending on security situations, the cryptography coprocessors should support variable length finite field arithmetic units. To determine the effective variable length finite field arithmetic architecture, two well-known curve scalar multiplication algorithms were implemented on FPGA. The affine coordinates algorithm must use a hardware division unit, but the projective coordinates algorithm only uses a fast multiplication unit. The former algorithm needs the division hardware. The latter only requires a multiplication hardware, but it need more space to store intermediate results. To make the division unit versatile, we need to add a feedback signal line at every bit position. We proposed a method to mitigate this problem. For multiplication in projective coordinates implementation, we use a widely used digit serial multiplication hardware, which is simpler to be made versatile. We experimented with our implemented ECC coprocessors using variable length finite field arithmetic unit which has the maximum field size 256. On the clock speed 40 MHz, the scalar multiplication time is 6.0 msec for affine implementation while it is 1.15 msec for projective implementation. As a result of the study, we found that the projective coordinates algorithm which does not use the division hardware was faster than the affine coordinate algorithm. In addition, the memory implementation effectiveness relative to logic implementation will have a large influence on the implementation space requirements of the two algorithms.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.