• Title/Summary/Keyword: private task

Search Result 162, Processing Time 0.026 seconds

A Pilot Study on the Present State and Transformation of Construction Management Actors of USFK's EC Projects (주한 미군 EC 프로젝트의 현황과 시공관리 주체의 변화에 대한 기초연구)

  • Kim, Duk-Su
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.3 s.31
    • /
    • pp.65-75
    • /
    • 2006
  • Emerging trends regarding USFK(United States Forces, Korea)'s EC(Engineering/Construction) market include: (1) introduction of MATOC(Multiple Award Task Order Contract); (2) increase of DB(Design-Build) contract; and (3) encroachment of large US-origin private EC firms upon Korea. This study analyzes the change of USFK's EC market with focus on the change of construction management actors for USFK's EC projects. Specifically, USFK's EC projects have been managed by FED(Far East District). Recently, however, the large US private EC companies substitute the role previously taken by FED. This phenomenon is accelerated by the business chances in Korea due to LPP(Land Partnership Plan) and intentions of US Government to save military construction costs by means of utilizing US private EC companies. The large US EC firms entering into Korea are business opportunities as well as challenges to Korean EC firms, which are contracting USFK's EC projects. This study concludes that, through teaming joint venture with the large US EC firms, the market changes can be opportunities to acquire foreign market information and learn advanced construction management skill from them.

Evaluation of dental web site usability in Korea (국내 치과 웹사이트에 대한 사용성 평가)

  • Kim, Seon-Yeong;Kim, Yun-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.16 no.2
    • /
    • pp.241-248
    • /
    • 2016
  • Objectives: The purpose of the study is to evaluate the dental website usability in Korea. The dental website included dental university hospital, network dental hospital and dental office. Methods: The study was carried out by three age groups including twenties, thirties, and forties. Each group consisted of ten customers and evaluated twelve websites of dental hospitals. Each was assigned to four hospitals and three tasks including easiness of online reservation, preventive information, and treatment information. They filled out the self-administered questionnaire. The questionnaire included the easiness of on-line reservation, satisfaction on the quality and quantity of preventive informations, satisfaction on the quality and quantity of treatment informations, predictiveness on the sub-menu, usefulness of site map, information on the main page of web site, usefulness of decision on visit to dentistry, and revisit intention. Results: The easiness of on-line reservation was the highest in the private dental office, and university dental hospital and network dental hospitals followed in conducting task(1). The anticipated value and measurement on the usefulness of web site were the lowest in network dental hospitals and the time interval between two values was 57 seconds. This discrepancy showed the largest difference. The satisfaction on treatment information in task(3) was higher than that of the satisfaction on preventive information in task (2). The revisit intention was the highest in dental university hospitals. Conclusions: This study showed the comparison in usefulness of web site of university dental hospitals, network dental hospitals and private dental office. The web site focused on the treatment information rather than preventive information. This study suggested that the most important function of dental web site would be the preventive information that was mainly operated by the role of dental hygienists rather than treatment information in the future.

The Current VIP Guard System and Its Development (요인의 안전을 위한 경호조직 분석 및 발전 방안)

  • 오세용;김창은
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.81-98
    • /
    • 2003
  • In modern society, there are diverse sorts of VIPs including a king and individuals. Some like a king or president are in need of professional secret services, and others become VIPs by being guarded by a bodyguard company at their own request. The former is called a public guard, and the latter is a private one. In the field of the public guard, the nation should be furnished with a guard system in consideration of political circumstances to protect VIPs. That is, the parliamentary cabinet system and presidential system call for a different guard system, and the guard system's professional features vary to some degree with political situations and cultural climate. If the ultimate goal of guard is to protect the chief of the democratic and open state in a most efficient and safe manner, it's mandatorily necessary to set up a professional and specialized guard organization to provide democratic and efficient secret services. It's desired that the domestic presidential guard division should be staffed with not only expert guards but other personnels dispatched from the military and police. In the police, guard mission is splitted among various guard and security agencies, including the National Police Agency's public security bureau or the Seoul Metropolitan Police Agency's public security division, 101 security unit, mobile police and 22 special guard division. As a chain of command is separated and it's difficult to manage such organizations effectively, the National Police Agency should be exclusively in charge of VIP guard and security. In the area of private guard, the private police system has shared national security task as a middle organization between the private police and private guard. But now its intent has gradually weakened, and its mission should be redefined. In addition, the way people look at private guard should change, and they should be well informed that it could serve to prevent possible crimes, protect them against crimes and get rid of their inconveniences. To make a good impression on people, the guard associations and businesses should put their efforts into reinforcing publicity activities, and the government, academic circles and press should team up with them as well.

Secure Blocking + Secure Matching = Secure Record Linkage

  • Karakasidis, Alexandros;Verykios, Vassilios S.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.223-235
    • /
    • 2011
  • Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage. The secure framework we propose consists of two basic components. First, we utilize a secure blocking component based on phonetic algorithms statistically enhanced to improve security. Second, we use a secure matching component where actual approximate matching is performed using a novel private approach of the Levenshtein Distance algorithm. Our goal is to combine the speed of private blocking with the increased accuracy of approximate secure matching.

A Study for Protecting the Virtual Memory of Applications (어플리케이션의 가상 메모리 보호를 위한 연구)

  • Kim, Dong-Ryul;Moon, Jong-sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

A plan research about a Ubiquitous RFID infringe private information (유비쿼터스 RFID 개인정보 침해에 대한 방안 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.143-151
    • /
    • 2010
  • RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.

A Study of Virtual Private Network On based Environment IP Security Simulations Quality of Service Guarantee (IPSec 기반 환경하에서 QoS 보장 가상 사설망 구현 방안 연구)

  • Kim, Jeong-Hun;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.150-153
    • /
    • 2001
  • Today Internet is only Best-Effort service. During the past few years, new types of internet applications which require performance beyond the best-effort service that is provided by the current internet have emerged. These applications required QoS(Quality of Services) guarantee and Security between end-to-end. In this paper simulations Differentiated Services that IETF(Internet Engineering Task Forte) has proposed one of QoS(Quality of Services) guarantee VPN(Virtual private Network) using QoS(Quality of Services) guarantee and IP Security between end-to-end.

  • PDF

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

A Study on the Service for Competitive Advantage (Base on the Service in Medical Institution) (경쟁우위를 위한 고객만족 요인 연구 (의료기관의 서비스 중심으로))

  • 최우진
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.251-259
    • /
    • 1999
  • In this paper, university hospitals, general hospitals/hospitals, private clinics, Chinese medicine hospitals and clinics in Seoul. Metropolitan Inchon, Kyunggi-do were probed to find out how the variables of service task factor are related to customer satisfaction, and to find out the determinants of medical service task(tangible quality, flexibility, cost, time and managerial skills), and anticipation factors, and respective items of customer satisfaction through statistical analysis. The meaning of the above mentioned findings should be carefully understood and construed due to the following problems. Because the factors why patients select hospitals were measured limitedly. it cannot show everything I intended to suggest. Especially due to the insufficient number if items. customer satisfaction variables are too limited. Reflecting the developing changes in various medical environments, hospitals could meet the objective of maintenance and prosperity only by facing the competition effectively and satisfying patients. Also hospitals should pursue patient-oriented service management. In other words, a strategic management of service task factors is needed. Based on this paper's research. a further study should be conducted continuously in order to give customers more satisfaction.

  • PDF

A study on Teacher's Work Space in Middle and High School - Focus on Plan Based Department System Management in Middle and High School - (중·고등학교의 교사업무공간에 관한 연구 - 교과교실형 설계기반 중·고등학교를 중심으로 -)

  • Seo, Boong-Kyo;Kwak, Jun-Hyuck
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.21 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Aim of this research is suggesting a satisfied studying space for lecturer, student and curriculum by abstraction of improvement plan which based on investigation and analysis of the space that teacher is using in lecturer and study support facility in school which managed in 'Department system'. This research focused on analyse of teacher's laboratory, teacher's room, and common room in middle and high school which managed and designed by 'Department system' and registered on 'Seoul office of education' and designed in management of department system between 2009 and 2012. With these process, a conclusion of this research is as in the following. Firstly, plan of teachers' private place which is efficient and stable is required through to get out of module which can cover subject band and grade band. Secondly, we have to focus on size of teachers' convenience facilities for convenience or official usage, movement radius, and improvement of working environments. Thirdly, 'Subject type teachers' laboratory' which organized by teachers who teach same subject is more efficient than 'Task type laboratory' which organized by teachers who working on same task for management of school. In fourth, 'Task type teachers' laboratory' arranged regardless with teachers' class room to teach, and it makes lack of connectivity between teacher and class room.