• Title/Summary/Keyword: Social Security System

Search Result 767, Processing Time 0.026 seconds

Some Issues on China General Aviation Legislation (中國通用航空立法若干問題研究)

  • Shuang, Luan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.2
    • /
    • pp.99-143
    • /
    • 2016
  • General aviation and air transport are two wings of the civil aviation industry. Chinese air transport is developing rapidly, and has become the world second air transport system only second to US since 2005. However, Chinese civil aviation is far behind the world average level, and cannot meet requirements of economic construction and social development. The transition and structural adjustment of Chinese economy provide the general aviation with a unprecedented broad market. The prospect of general aviation is promising and anticipated. The development of general aviation industry needs the legislative supports, and the current legislative conditions of Chinese general aviation are undoubtedly far behind the realistic requirements. Accelerating the legislation in Chinese general aviation industry requires scientific legislation concept. First, Legislation must promote development of general aviation industry. The general aviation will serves as a Chinese emerging industry that boosts domestic demand, promotes employment and expedite domestic economic development. We should, based on both the concept of promoting the industrial development of general aviation and national industrial planning, enact and rectify relative laws and regulations. And we should also straighten out the relationship between aviation security and industrial development and promote the revolution of low-altitude airspace management in an all-round way, in order to improve the utilization rate of airspace resources, classify and establish airspace, simplify examination and approval procedure and intensify operation management. In addition, what we should do is to expedite the infrastructure layout construction, guide the differentiated but coordinated development of general aviation industries in various areas, establish a united supervision mechanism of general aviation, redistrict the responsibilities of Chinese Air Control Agency and set up legislation, law enforcement and judicial systems with clarified institutions, clear positioning and classified responsibilities, so as to usher in a new era of the legislative management of Chinese general aviation industry. Second, shift the focus from regulations to both regulations and services. Considering the particularity of the general aviation, we should use American practices for reference and take into account both regulation and service functions when enacting general aviation laws. For example, we should reduce administrative licensing and market supervision, and adopt "criteria" and "approval" management systems for non-commercial and commercial aviation. Furthermore, pay attention to social benefits. Complete social rescuing mechanism through legislation. It should be clarified in legislation that general aviation operators should take the responsibilities of, and ensure to realize social benefits of environmental protection and ecological balance .Finally, rise in line with international standards. Modify Chinese regulations which is inconsistent with international ones to remove barriers to international cooperation. Specify basic legislative principles. One is the principle of coordination. Realize coordination between the civil aviation and general aviation, between military aviation and civil aviation, and among departments. Two is the principle of pertinence. The general aviation has its own rules and specialties, needing to be standardized using specialized laws and regulations. Three is the principle of efficiency. To realize time and space values of general aviation, we should complete rules in aerospace openness, general aviation airport construction, general aviation operations, and regulation enforcement. Four is the principle of security. Balance the maximum use of resources of Chinese airspace and the according potential threats to Chinese national interests and social security, and establish a complete insurance system which functions as security defense and indemnificatory measure. Establish a unified legal system. Currently, the system of Chinese general aviation laws consists of national legislation, administrative laws and regulations and civil aviation regulations (CAR). Some problems exist in three components of the system, including too general content, unclear guarantee measures, incomplete implementation details, and lacking corresponding pertinence and flexibility required by general aviation regulations, stringency of operation management and standards, and uniformity of standards. A law and regulation system, centered on laws and consisting of administrative laws regulations, industrial regulations, implementation details, industrial policies and local laws and regulations, should be established. It is suggested to modify the Civil Aviation Law to make general aviation laws complete, enact the Regulations of General Aviation Development, and accelerate the establishment, modification and abolition of Chinese general aviation laws to intensify the coordination and uniformity of regulations.

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China (중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF

The Main Character and Evaluation of China's New Electronic Signature Legislation (중국 전자서명법의 주요내용 및 평가와 전망)

  • Han, Sang-Hyun
    • The Journal of Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • China has recently (28 August 2004) adopted a new act legalizing the electronic signature. This new act provides electronic signatures with the same legal status as handwritten signatures, and states that on-line certification providers will have to be created in order to ensure the security of on-line operations made using said signatures. This new act is intended to increase Chinese electronic business, and thus to raise the revenue China can expect from said business. And the law grants electronic signatures the same legal effect as handwritten signatures and seals in business transactions, and sets up the market access system for online certification providers to ensure the security of e-commerce. As Internet trade requires a reliable third party to identify the signers, the credibility of online certifying organizations is significant for the transaction security. So, considering the weakness of China's social credibility system, the law regulates that the online signatures certification providers should be approved and administered by governments.

  • PDF

Dynamic Signature Verification System for the User Authentication Security (사용자 인증 보안을 위한 동적 서명인증시스템)

  • 김진환;조혁규;차의영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.131-134
    • /
    • 2002
  • As the increased use of computer, wired/wireless/mobile Internet, security in using Internet becomes a more important problem. Thus, biometric technology using physical and behavior characteristics of a person is hot issue. Many different types of biometric technologies of a person such as fingerprint, face, iris, vein, DNA, brain wave, palm, voice, dynamic signature, etc. had already been studied but remained unsuccessful because they do not meet social demands. However, recently many of these technologies have been actively revived and researchers have developed new products on various commercial fields. Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, the down/up/movement of pen when the signer input his signature with an electronic pen for his authentication. Then signature verification system collects mentioned above various feature information and compares it with the original one and simultaneously analyzes to decide whether signature is forgery or true. The prospect of signature verification technology is very promising and its use will be wide spread in terms of economy, security, practicality, stability and convenience.

  • PDF

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Collaborative Consumption Motivation Factor Model under the Sharing Economy (공유경제 모형에서의 협력적 소비 영향요인)

  • Roh, Tae-Hyup;Choi, Hwa-Yeol
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.197-219
    • /
    • 2018
  • Purpose The purpose of this study is to examine what motivates users to adopt one of the emerging applications for collaborative consumption of sharing economy. Using the self-determination theory, motivation theory and TAM(Technology Acceptance Model) as the theoretical framework, this study illustrates important factors that influence adoption of collaborative consumption service. We develops the ICTs(Information and Communications Technologies) initiatives and motivation model to collaborative consumption. Design/methodology/approach This paper makes use of a quantitative methodology using survey questionnaire that allows for the measurement of the eight constructs(System Availability, Contents Quality, Design & Personalization, Security & Privacy, Emotional & Social Value, Economic Value, Attitude, Adoption & Consumption) contained in the hypothesized theoretical model on the basis of the prior literatures. Data collected from a sample of 227 respondents who have used the collaborative consumption services and provided the foundation for the examination of the proposed relationships in the model. Findings This study has the following implications for the users and providers of CC platforms and services. The ICTs initiatives (System Availability, Contents Quality, Design & Personalization, Security & Privacy) are the influential factors that motivate the emotional and social value to CC. On the other hand, The ICTs initiatives (System Availability, Contents Quality) are not very significant factors of economic value to CC. The empirical analysis result indicate that there are significant causal effect among emotional & social value, economic value, and adoption to CC. This study provides important theoretical implications for innovation adoption research through an empirical examination of the relationship between ICTs initiatives, motivation factors to collaborative consumption in the sharing economy.

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

The tasks and prospect of introducing the pravite investigation servicesystem in korea (한국민간조사제도 도입전망과 과제)

  • Park, Jun-seok;Jeong, Youn-min;Lee, Young-seok
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.95-117
    • /
    • 2007
  • With rapid changes taking place in every field, the expansion and specialization of various social service activities are one of the characteristics of the modem society. However, the increase of crimes and inefficiency of public police service to cope with this situation have caused discontent and distrust on the service among the public, making people more inclined to solve safety-related problems by themselves. Private Security Service(PSS) and Private Investigation Service(PIS) were introduced to satisfy these needs. In the area of PIS, Public Investigation Service System(PISS) has been established for a quite long time in foreign countries. However in Korea, PIS is being provided by unregulated service providers such as errand service center due to the lack of legal system, causing many problems related with illegal practices by the service providers. This paper is the result of the research on how to adopt a relevant PISS in Korea and develop it in the future. This kind of research is much needed to curb the rising illegal practices of the errand service centers, complement the insufficient operation of public police service, and strengthen the competitiveness of our country by taking more efficient actions in the changing public security environment. Based on the research, this paper also examines positively the possibility of introduction of PIS in Korea. This paper also recommends a prompt enactment of PIS regulation and improvement on the legal environment for such introduction of the relevant and suitable PISS in Korea.

  • PDF