The Journal of the Convergence on Culture Technology
/
v.9
no.3
/
pp.75-79
/
2023
ESG management means to thoroughly consider the investor's perspective when evaluating corporate value, and environmental, social, and governance issues are continuous and strategic monitoring issues in identifying risk and opportunity factors related to corporate management activities. In other words, the perspective of value creation is reflected in business relationships. The fundamental purpose of ESG management is continuous business value creation and thorough management of investment risks and business transactions in contractual relationships. It is also a requirement of linked investors. The field that Korean companies are currently experiencing the most is the recognition that 'ESG information collection is necessary and maintenance must be prioritized' in investor IR and global sales and marketing departments, and the primary need for this is emerging. In addition, as the legal affairs office, environmental safety department, and human resources department, which conduct compliance management, carry out related tasks, clarity at the organizational level must precede in order to properly establish an information integration and management system. It covers the scope of securing new market opportunities such as management, disclosure and communication. Therefore, in regard to the newly emerging ESG management and response methods, it is necessary to review and implement it repeatedly so that sustainable exchange profits can be created by simultaneously managing non-financial risks as well as efforts to enhance corporate value for financial returns.
In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.
While late-life suicide has been increasing and become an important issue for public health in Korea, little is known about the phenomenon and its contributing risk factors based on which effective preventive measures can be made. Since suicidal ideation is a major precursor to attempted and completed suicide, the objective of the present study was to reveal primary contributors to suicidal ideation. Data were collected from a cross-sectional survey of 247 community-dwelling Korean older adults (age≥60) in the mid-size city in Korea. The statistical methodology employed a robust hierarchical regression procedure that iteratively downweights outliers. Based on the stress-diathesis model, the study examined major diathesis and stressors directly explaining suicidal ideation. The study also explored the significant interaction among these factors. The findings revealed that living alone and depression were significant main antecedents of suicidal ideation. In addition, neuroticism X life events and neuroticism X depression were significant interaction terms with the strongest explanatory power, which provides an empirical evidence to support the stress-diathesis model in explaining suicidal phenomenon of the Korean elderly. The result demonstrates the theoretical implication as well as the practical implication for developing and implementing late-life suicide prevention strategies. Limitations and directions for future research are discussed.
Park, Sang Doeg;Kim, Yong Hyun;Ham, Gwang Hyun;Son, Sang Jin;Na, Raksmey;Kim, Nam Jin
Journal of The Geomorphological Association of Korea
/
v.28
no.3
/
pp.13-26
/
2021
In mountain gully, channelized debris flow is an important phenomenon in the process of topographical change. Social infrastructure as roads may be damaged by channelized debris flows, but there has been little information about their occurrence and movement to prepare for the risk of the debris flow. Most of the channelized debris flows occur during heavy rains in mountainous valleys that are difficult to access, so there are not many field data. In this study, the topographical characteristics of the catchment, the rainfall and runoff related to the debris flow, the sedimentary pattern and the cross-sectional change of the channel bed, and the underflow velocity of the gravel bed have been investigated and analyzed in the Singi gully where the channelized debris flows occurred. In the catchment, there was almost no sediment runoff because the vegetation combine with the debris landforms and covered the surface. Therefore, the obvious cause of the channelized debris flows is the collapse of the slope and bed of the gully. Even if the gravel, cobbles, and boulders of the channel bed were lost by debris flow, the thalweg change due to debris flow may not be significant because they are supplied from the gully side slope normally. After the gabion structures were installed, the debris flow increased the thalweg change, bed erosion and side slope of the gully. Various sedimentary structures in the gully were classified according to the factors supporting the sedimentation. The hypsometric curve of the gully reflects the debris landforms and vegetation characteristics of the watershed and the sediment runoff due to debris flow, etc. The relationship between the flow velocity and the hydraulic gradient was non-linear under the condition that the porous medium with gully bed gravels is saturated with water. These results may be used as basic data for channelized debris flow research.
Hoyong Lee;Minseok Kim;Junhyeong Lee;Taewoo Lee;Hung Soo Kim;Soojun Kim
Journal of Wetlands Research
/
v.25
no.4
/
pp.379-385
/
2023
EDue to climate change and urbanization, the localized heavy rainfall frequently exceeded a design storm rainfall and flood damage has occurred in South Korea. The concept of addressing sustainable river management and environmental and social issues through Nature-based Solutions (NbS) is gaining attention as it seeks to resolve these issues through ecosystem services. Therefore, in this study, the flood reduction effect by river management using NbS was quantitatively analyzed for the Hwang River, which is directly downstream of Hapcheon Dam, South Korea. Floodplain excavation and dyke relocation, which are methods of the NbS, were applied to the flood risk area of the Hwang River. As a result of analyzing the flood level of the river through the unsteady flow analysis of HEC-RAS, we obtained flood level reduction by 8 cm at the confluence of the Nakdong River. The results of this study can be expected to be sufficiently utilized as a basis for use as a management plan through NbS rather than the river management with grey infrastructure.
Purpose In the contemporary landscape, marked by the enduring impact of COVID-19 and the recent disruptions stemming from the conflict in Ukraine, the purpose of this study is to navigate the era characterized by pervasive risk and uncertainty. Specifically, the study aims to dissect the impact of the COVID-19 outbreak on digital transformation, exploring the factors influencing this process and considering the multifaceted dynamics at play. The focus extends to the post-COVID-19 landscape, scrutinizing the implications and meanings of digital transformation both before and after the pandemic. Additionally, the study delves into future digital trends, with particular attention to climate and environmental issues, emphasizing corporate responsibilities in averting crises similar to COVID-19. The overarching goal is to provide a holistic perspective, shedding light on both positive and negative facets of digital transformation, and advocating for regulatory enhancements and legal frameworks conducive to a balanced and resilient digital future. Design/methodology/approach This study employs a comprehensive approach to analyze the impact of the COVID-19 outbreak on digital transformation. It considers various facets, such as smart devices reshaping daily routines, transformative changes in corporate ecosystems, and the adaptation of government institutions to the digital era within the broader context of the Fourth Industrial Revolution. The analysis extends to the post-COVID-19 landscape, examining the implications and meanings of digital transformation. Future digital trends, especially those related to climate and environmental issues, are prognosticated. The methodology involves a proactive exploration of challenges associated with digital transformation, aiming to advocate for regulatory enhancements and legal frameworks that contribute to a balanced and resilient digital future. Findings The findings of this study reveal that the digital economy has gained momentum, accelerated by the proliferation of non-face-to-face industries in response to social distancing imperatives during the COVID-19 pandemic. Digital transformation, both preceding and succeeding the onset of the pandemic, has precipitated noteworthy shifts in various aspects of daily life. However, challenges persist, and the study highlights factors that either bolster or hinder the transformative process. In the post-COVID-19 era, corporate responsibilities in averting crises, particularly those resembling the pandemic, take center stage. The study emphasizes the need for a holistic perspective, acknowledging both positive and negative facets of digital transformation. Additionally, it calls for proactive measures, including regulatory enhancements and legal frameworks, to ensure a balanced and resilient digital future.
Journal of Korean Society of Disaster and Security
/
v.16
no.2
/
pp.1-13
/
2023
As interest in urban safety has increased since COVID-19, various institutions have developed and used indicators that evaluate the safety city model. Yongsan-gu was ranked No. 1 in 2021 by Social Safety Index evaluation and was selected as the safest city in Korea. However, the Itaewon disaster in Yongsan-gu in 2022 caused many casualties. The study of indicators for evaluating cities' safety was necessary. This study aims to examine domestic and foreign safe city models and review the differences between each model and the indicators used to evaluate safe cities. As a result of collecting 11 safe city models and analyzing each evaluation index, safe city models can be classified into program-based safe city models, such as the World Health Organization's International safe community and the UN Office for Disaster Risk Reduction's International Safe city. Considering the diversification of threats to safety, it is reasonable to comprehensively consider digital security, health safety, infrastructure safety, personal safety, environmental safety, traffic safety, fire safety, crime safety, life safety, suicide, and infectious diseases when evaluating safe cities as evaluation parameters.
The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.
Background: This study aims to develop a "Predictive Model for the Possibility of Collection Delinquent Health Insurance Contributions" for the National Health Insurance Service to enhance administrative efficiency in protecting and collecting contributions from livelihood-type defaulters. Additionally, it aims to establish customized collection management strategies based on individuals' ability to pay health insurance contributions. Methods: Firstly, to develop the "Predictive Model for the Possibility of Collection Delinquent Health Insurance Contributions," a series of processes including (1) analysis of defaulter characteristics, (2) model estimation and performance evaluation, and (3) model derivation will be conducted. Secondly, using the predictions from the model, individuals will be categorized into four types based on their payment ability and livelihood status, and collection strategies will be provided for each type. Results: Firstly, the regression equation of the prediction model is as follows: phat = exp (0.4729 + 0.0392 × gender + 0.00894 × age + 0.000563 × total income - 0.2849 × low-income type enrollee - 0.2271 × delinquency frequency + 0.9714 × delinquency action + 0.0851 × reduction) / [1 + exp (0.4729 + 0.0392 × gender + 0.00894 × age + 0.000563 × total income - 0.2849 × low-income type enrollee - 0.2271 × delinquency frequency + 0.9714 × delinquency action + 0.0851 × reduction)]. The prediction performance is an accuracy of 86.0%, sensitivity of 87.0%, and specificity of 84.8%. Secondly, individuals were categorized into four types based on livelihood status and payment ability. Particularly, the "support needed group," which comprises those with low payment ability and low-income type enrollee, suggests enhancing contribution relief and support policies. On the other hand, the "high-risk group," which comprises those without livelihood type and low payment ability, suggests implementing stricter default handling to improve collection rates. Conclusion: Upon examining the regression equation of the prediction model, it is evident that individuals with lower income levels and a history of past defaults have a lower probability of payment. This implies that defaults occur among those without the ability to bear the burden of health insurance contributions, leading to long-term defaults. Social insurance operates on the principles of mandatory participation and burden based on the ability to pay. Therefore, it is necessary to develop policies that consider individuals' ability to pay, such as transitioning livelihood-type defaulters to medical assistance or reducing insurance contribution burdens.
Dong-Hoon Yoo;Young-Chan Lee;Do-Sam Kim;Kwang-Ho Lee
Journal of Navigation and Port Research
/
v.48
no.3
/
pp.192-199
/
2024
Wave overtopping is a significant natural hazard that occurs in coastal areas, primarily driven by high waves, particularly those generated during typhoons, which can cause coastal flooding. The development of residential and commercial areas along the coast, driven by increasing social and economic demands, has led to a concentration of people and assets in these vulnerable areas. This, coupled with long-term sea level rise and an increase in typhoon frequency, has heightened the risk of coastal hazards. Traditionally, the evaluation of wave overtopping volumes has relied on directly measuring the collected volume of water that exceeds the crest height of structures through hydraulic model experiments. These experiments are averaged over a specific measurement period. However, in this study, we propose a new method for estimating individual wave overtopping volumes. We utilize the temporal variation of wave overtopping heights to develop an observation system that can quantitatively assess wave overtopping volumes in actual coastal areas. To test our method, we conducted hydraulic model experiments on rubble mound breakwaters, which are commonly installed along the Korean coast. We introduce wave overtopping discharge coefficients, assuming that the inundation velocity from the structure's crest is the long-wave velocity. We then predict overtopping volumes based on wave overtopping heights and compare and review the results with experimental data. The findings of our study confirm the feasibility of estimating wave overtopping volumes by applying the overtopping discharge coefficients derived in this study to wave overtopping heights.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.