• Title/Summary/Keyword: bank protection

Search Result 133, Processing Time 0.034 seconds

Consideration of preservation methods for plant genetic resources in natural monument - Focusing on preparation for becoming effective of Nagoya Protocol - (천연기념물 식물유전자원의 보존방안 고찰 - 나고야의정서 발효 대비 중심으로 -)

  • Kim, Jung A;Kim, Hyo Jeong;Shin, Jin Ho;Kim, Dae Yeol;Jo, Woon Yeon
    • Korean Journal of Agricultural Science
    • /
    • v.41 no.3
    • /
    • pp.193-203
    • /
    • 2014
  • Natural Monument is a designated cultural property as part of the country. According to Article 2 of the Cultural Properties Protection Act, a national, ethnic and global heritage artificially or naturally formed, with a great historical, artistic, scientific and landscape significance is defined as a cultural heritage. Animals, plants, topography, geology, minerals, caves, biological products and special natural phenomena, having a great of historic, scenic and scientific value, are defined as the monument. According to Article 3 of Cultural Properties Protection Act, the conservation, management and utilization of National Heritage should be kept intact in its original form. So, Natural monuments are managing as retained its original form under the Basic Principles of current law. The highest population of coniferous tree in natural monument plant is ginkgo tree including 22 objects, followed by pines, junipers that order. And in case of broadleaf tree, there are zelkova trees, retusa fringe trees, pagoda trees, cork oaks, silver magnolias and etc. There are many of reported efficacy in available natural monument plants. The efficacy of plant species on pharmaceutical like anti-cancer, anti-diabetic, anti-obesity, antioxidant activity, neuroprotective, improves cholesterol, anti-inflammatory, liver protection and anti-bacterial efficacy, on cosmetics and beauty like the inhibiting formation of skin wrinkles, whitening effect, variety of materials and the efficacy of the proposed utilization of its various papers and etc have been widely reported. Before the Nagoya Protocol enters into force, the future role of the National Research Institute for Cultural Properties Administration of Cultural Heritage should be obtain a legal right to manage the social, cultural and national natural monument with emotional value to the plant genetic resource as a natural monument efficient ways to study and preserve traditional knowledge biological resources by securing a claim to the sovereignty of the material will be ready.

Characteristics of Rooting and Community Maintenance of Some Gramineae planted on Urban Stream Bank Slope (도시하천 제방사면에 식재한 몇몇 벼과식물의 활착 및 군락유지 특성)

  • Yang, Hong-Mo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.5
    • /
    • pp.42-59
    • /
    • 2017
  • To investigate rooting and community forming ability, sod strips of Gramineae such as Miscanthus sacchariflorus (Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg., and Arundinella hirta(Thunb.) Tanaka were planted horizontally at a width of 10~15cm in October 2010 on the bank slope of Kwangju Stream in Korea. Seeds of each species were sown in April 2010 in plastic seedbeds(60cm length ${\times}$ 30cm width ${\times}$ 5cm depth) filled with 4cm of garden soil and grew until October 2010 to form rectangular sod, which then was cut into multiple strips(20cm length ${\times}$ 6cm width ${\times}$ 4cm root depth). Weeds growing on the experiment sites were removed twice a year until those four species had formed a community by 2013. Weeds were not eradicated during 2014 and 2015 to observe whether the community formation can be maintained without weed removal. t-tests on stem numbers and heights in May, July, and September were conducted between 2013 and 2014, and between 2014 and 2015. Stem numbers and heights of the four species in 2014 were significantly decreased(p<0.001) compared with those in 2013 due to weed damage to their growth in 2014. Stem numbers and heights of Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. in 2015 were similar to those in 2014(p>0.05). Stem numbers and heights of Arundinella hirta(Thunb.) Tanaka in 2015, however, were significantly reduced compared with those in 2014(p<0.001) due to weed impact on its growth. After three years of weed removal, a community of each species was formed. Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. were able to establish communities without any further weed removal. Arundinella hirta(Thunb.) Tanaka, however, was not able to maintain its community due to considerable damage to its growth caused by weeds even after three years of weed removal. Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. are more suitable to sod strip plantings on stream bank slopes in terms of the maintenance of community formation without weed eradication. t-test on stem numbers and heights each September during the five year experiment period between sod strip planting and potted plants of the four species were conducted. Stem numbers of strip sod plantings were significantly higher(p<0.001) than those of potted one. Heights of strip sod plantings, however, were significantly lower(p<0.05) than those of the potted samples. Therefore, strip sod planting is more advantageous regarding bank slope erosion protection due to the higher number of stems.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

How to Reflect Sustainable Development in Overseas Investment including Equator Principles (해외투자(海外投資)와 지속가능발전 원칙 - 적도원칙(赤道原則)(Equator Principles)을 중심으로 -)

  • Park, Whon-Il
    • 한국무역상무학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-72
    • /
    • 2006
  • The Equator Principles are a set of voluntary environmental and social guidelines for ethical project finance. These principles commit banks and other signatories to not finance projects that fail to meet these guidelines. The principles were conceived in 2002 on an initiative of the International Finance Corporation and launched in 2003. Since then, dozens of major banks have adopted the Principles, and with these banks among them accounting for more than three quarters of all project loan market volume the Principles have become the de facto standard for all banks and investors on how to deal with potential social and environmental effects of projects to be financed. While regarding the Principles an important initiative, NGOs have criticised the Principles for not producing real changes in financing activities and for allowing projects to go through that should have been screened out by the Principles, such as the Sakhalin-II oil and gas project in Russia. In early 2006, a process of revision of the principles was begun. The Equator Principles state that endorsing banks will only provide loans directly to projects under the following circumstances: - The risk of the project is categorized in accordance with internal guidelines based upon the environmental and social screening criteria of the International Finance Corporation (IFC). - For all medium or high risk projects (Category A and B projects), sponsors complete an Environmental Assessment, the preparation of which must meet certain requirements and satisfactorily address key environmental and social issues. - The Environmental Assessment report addresses baseline environmental and social conditions, requirements under host country laws and regulations, applicable international treaties and agreements, sustainable development and use of renewable natural resources, protection of human health, cultural properties, and biodiversity, including endangered species and sensitive ecosystems, use of dangerous substances, major hazards, occupational health and safety, fire prevention and life safety, socio-economic impacts, land acquisition and land use, involuntary resettlement, impacts on indigenous peoples and communities, cumulative impacts of existing projects, the proposed project, and anticipated future projects, participation of affected parties in the design, review and implementation of the project, consideration of feasible environmentally and socially preferable alternatives, efficient production, delivery and use of energy, pollution prevention and waste minimization, pollution controls (liquid effluents and air emissions) and solid and chemical waste management. - Based on the Environmental Assessment, Equator banks then make agreements with their clients on how they mitigate, monitor and manage those risks through an 'Environmental Management Plan'. Compliance with the plan is required in the covenant. If the borrower doesn't comply with the agreed terms, the bank will take corrective action, which if unsuccessful, could ultimately result in the bank canceling the loan and demanding immediate repayment. - For risky projects, the borrower consults with stakeholders (NGO's and project affected groups) and provides them with information on the risks of the project. - If necessary, an expert is consulted. The Principles only apply to projects over 50 million US dollars, which, according to the Equator Principles website, represent 97% of the total market. In early 2006, the financial institutions behind the Principles launched stakeholder consultations and negotiations aimed at revising the principles. The draft revised principles were met with criticism from NGO stakeholders, who in a joint position paper argued that the draft fails by ignoring the most serious critiques of the principles: a lack of consistent and rigorous implementation.

  • PDF

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Proteomic Analysis of Global Changes in Protein Expression During Exposure of Gamma Radiation in Bacillus sp. HKG 112 Isolated from Saline Soil

  • Gupta, Anil Kumar;Pathak, Rajiv;Singh, Bharat;Gautam, Hemlata;Kumar, Ram;Kumar, Raj;Arora, Rajesh;Gautam, Hemant K.
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.6
    • /
    • pp.574-581
    • /
    • 2011
  • A Gram-positive bacterium was isolated from the saline soils of Jangpura (U.P.), India, and showed high-level of radiation-resistant property and survived upto 12.5 kGy dose of gamma radiation. The 16S rDNA sequence of this strain was examined, identified as Bacillus sp. strain HKG 112, and was submitted to the NCBI GenBank (Accession No. GQ925432). The mechanism of radiation resistance and gene level expression were examined by proteomic analysis of whole-cell extract. Two proteins, 38 kDa and 86.5 kDa excised from SDS-PAGE, which showed more significant changes after radiation exposure, were identified by MALDI-TOF as being flagellin and S-layer protein, respectively. Twenty selected 2-DE protein spots from the crude extracts of Bacillus sp. HKG 112, excised from 2- DE, were identified by liquid chromatography mass spectrometry (LC-MS) out of which 16 spots showed significant changes after radiation exposure and might be responsible for the radiation resistance property. Our results suggest that the different responses of some genes under radiation for the expression of radiation-dependent proteins could contribute to a physiological advantage and would be a significant initial step towards a fullsystem understanding of the radiation stress protection mechanisms of bacteria in different environments.

A Cost-Benefit Analysis of Groundwater: Pumping Wells in Korea (지하수의 경제성 평가 연구: 지하수 관정을 중심으로)

  • Kim, Sun Geun
    • Economic and Environmental Geology
    • /
    • v.47 no.3
    • /
    • pp.219-225
    • /
    • 2014
  • In Korea, there are 1,474 thousand pumping wells nationwide which account for about 12% of total water use in 2012. As much as 39 hundred million tons of groundwater were used while 333 hundred million tons of total water were supplied in 2012. Because the water management authority projects that water demand will exceed supply by 2021, the authority is planning to extensively expand groundwater use in accordance with economic feasibility. Using the basic frameworks of cost-benefit analyses of the World Bank and the US Environmental Protection Agency (US EPA), the objective of this study is to examine the costs and benefits of the expansion of Korea's groundwater extraction through pumping wells. We conclude that the BC ratio of the groundwater pumping wells is 2.98. This signifies that the benefits are 2.98 times higher than the costs. The benefits include use and non-use values of pumping wells while the costs include the installation and maintenance of new wells, in addition to the restoration and pollution costs of abandoned wells, as well as fees for water quality tests, etc.

A Cost-Benefit Analysis of Groundwater Supply through Pumping Well Technology

  • Kim, Sun G.
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.11a
    • /
    • pp.479-487
    • /
    • 2015
  • In Korea, there are 1,474 thousand pumping wells nationwide which account for about 12% of total water use in 2012. As much as 39 hundred million tons of groundwater were used while 333 hundred million tons of total water were supplied in 2012. Because the water management authority projects that water demand will exceed supply by 2021, the authority is planning to extensively expand groundwater use in accordance with economic feasibility. Using the basic frameworks of cost-benefit analyses of the World Bank and the US Environmental Protection Agency (US EPA), the objective of this study is to examine the costs and benefits of the expansion of Korea's groundwater extraction through pumping wells. We conclude that the BC ratio of the groundwater pumping wells is 2.98. This signifies that the benefits are 2.98 times higher than the costs. The benefits include use and non-use values of pumping wells while the costs include the installation and maintenance of new wells, in addition to the restoration and pollution costs of abandoned wells, as well as fees for water quality tests, etc.

  • PDF

Frost resistance of porous concrete assuming actual environment (實環境を考慮したポーラスコンクリートの耐凍害性の評価(실제 환경을 고려한 다공질 콘크리트의 내동해성(耐凍害性) 평가))

  • NAKAMURA, Takuro;HORIGUCHI, Takashi;SHIMURA, Kazunori;SUGAWARA, Takashi
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2008.11a
    • /
    • pp.227-233
    • /
    • 2008
  • Porous concrete has large continuous voids of 20-30 % by volume, and this concrete is attractive as environmental material in Japan i.e. permeable road pavement, river bank protection with vegetation and green roof system which influence thermal environment. It is necessary to confirm the frost resistance when constructing porous concrete structure in cold region. However applicable test method and evaluation criterion of porous concrete has not defined yet. Therefore, the object of this study is to investigate the frost resistance of porous concrete and this investigation attempts to address this concern by comparing 4 kinds of specified freezing and thawing tests methods (JIS A1148 procedure A/B and RILEM CIF/CDF test) in consideration of actual environment. RILEM freeze-thaw tests are different from JIS A1148 freeze-thaw tests, which are widely adopted for evaluating the frost resistance of conventional concrete in Japan, in water absorption, cooling rate, length of freezing and thawing period, and number of freezing and thawing cycles. RILEM CIF test measures internal damage and is primarily applicable for pure frost attack. CDF test is appropriate for freeze-thaw and de-icing salt attack. JIS A1148 procedure A/B showed extremely low frost resistance of porous concrete if the large continuous voids were filled with water and the ice expansion in the large continuous voids set in during cooling. Frost resistance of porous concrete was improved by mixing coarse aggregate (G7) which particle size is smaller and fine aggregate in JIS freezing and thawing tests. RILEM CIF/CDF test showed that freeze-thaw and de-icing resistance of porous concrete was seems to be superior in that of conventional concrete.

  • PDF

A Study on Selected Transverse Bed Slope Models in Channel Bend (유로만곡부의 횡방향 하상경사 산정 모형에 관한 연구)

  • Song, Jai Woo;Choi, In Ho;Kim, Ji Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.6
    • /
    • pp.1395-1404
    • /
    • 1994
  • Transverse bed slope in bend is a subject of scientific investigation since it provides the necessary information for channel design and protection of hydraulic structures (bank, bridge, etc), and study of river morphology. In this paper, selected models were examined and compared for the value of prediction of the transverse bed slope in curved alluvial channels(project area), by using field data, and fitting model was proposed. All models that related the local transverse bed slope to mean flow characteristics were alike in the sense that they predicted the local transverse bed slope to be proportional to the ratio between depth and radius of curvature. The difference among the models was related with the factor of proportionality, K. Also, measured transverse bed slope was correlated to mean velocity, maximum depth, and density Froude number in channel bend. In this paper selected models were compared for the prediction of the transverse bed slope using Odgaard's experiment (obtained in Sacramento River bend), so Odgaard89 model was closely related with real transverse bed slope.

  • PDF