1 3 2 / CFR Part Closed System / Access Control 9 61 : ID/Password (System Security Architecture) 9 65 ID/Passwor
|
|
- 길수 만
- 6 years ago
- Views:
Transcription
1 1/35
2 1 3 2 / CFR Part Closed System / Access Control 9 61 : ID/Password (System Security Architecture) 9 65 ID/Password Access Log (HR) Electronic Record 13 8 Audit Trail Audit Trail? Audit Trail Trigger Trigger Audit Trail Table Trigger Script 17 9 Electronic Signature Electronic Signature? Table (rtsignset) Table (rtsignsetdt) Table (rtsign) ID/Password Part /35
3 1, GMP, KGMP, GMP (Electronic Record ER 1 ) (Electronic Signature ES) FDA 21 CFR Part 11 ( Part11 ) Part11, FDA, Part11 Part11 Part11, GMP / /, GMP Part11, (ERP ) GMP Part11 ERP,,, Validation Validation GMP 1 ER Entity Relationship ER Electronic Record ER(Entity Relationship) 3/35
4 Validation Validation [ISPE GAMP Forum, GAMP4 ] [GAMP4] [, Automated System Validation ] (?) Part11 Part11 Part11 Part11 Par11, 4/35
5 2 / Part11 Part11?? Access Electronic Record Audit Trail Electronic Signature Part11 Part11 Part11 4 Data Data PC,, Data DBMS (DBMS ) DBMS Part11 5/35
6 3, ( ) DBMS RDB GMP Validation Part11 ( ) 6/35
7 4 21 CFR Part 11 Part11 [, 21 CFR Part 11 ] Part (FDA) Part11,,, FDA,,,,, Part , 19 Part 11,, Part 11 Part11 [ Part11 ] ( 5 ) (Closed System) 7/35
8 5 o (Access Control) o ID/Password o Audit Trail 8/35
9 6 Closed System / Access Control 61 : ID/Password (Closed System) Access [ 113 (4)] ID/Password ID/Password ID/Password Password 2 (Biometrics) [ (b)] (,, ) 62 ( ) 63, FDA,,, 3-tier 64 (System Security Architecture) 9/35
10 ID/Password 3 Main System Unit Program / 3 Part11 3 [ / ] 4 [ ], 3 [ / ][ ] Main System Unit Program ( ) Login Logout 65 ID/Password ID/Password ID/Password [ 11300] 10/35
11 ID/Password : 6, ID Password 1 Password Password, Password ( ), DBMS DBMS 66 Access Log Access Log Login, Logout Access Log DB connection error Login (login ) DBMS shutdown, DB (logout / ) PC shutdown (logout ) Access Log Login Logout, Part11 Audit Trail Access Log Audit Trail 8 67 (HR) ID/Password Validation Validation Closed System ID/Password, Validation ( ERP ) 11/35
12 68 [User]Table [Unit Program ]Table / / Table, [Unit Program]Table / /, [Unit Program ]Table ( ) Unit Program,, Unit Program Access Log, 64 3 [ / ], [Unit Program ]Table [Write],[Read] column /35
13 7 Electronic Record Electronic Record Part Definitions (6) Electronic record means any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system -- (6) (Electronic record),,,,,,,,, Record Data, Data :, Record : Data Record ( ), DBMS DBMS DBMS DBMS DBMS DBMS DBMS, DBMS Backup (Backup DBMS Backup ) Restore (Restore DBMS Restore ) DBMS (Super User, ) DBMS (,,, ) 13/35
14 8 Audit Trail 81 Audit Trail? Audit Trail /, Audit Trail Part 11 Audit Trail Part11 Audit Trail [ 1110 (e)] / / (time-stamp) Audit Trail Audit Trail,,, 82 Audit Trail Audit Trail / / Script Audit Trail Table / / DBMS Trigger Audit Trail Table Audit Trail / / SQL Audit Trail SQL Script Audit Trail SQL, Audit Trail Code, Transaction SQL 2 SQL Validation Audit Trail Audit Trail DBMS Trigger / Audit Trail Table Audit Trail Script Record Audit Trail 5 DBMS Trigger (MS Access Trigger, MS Access ) Trigger Audit Trail Script 14/35
15 , Trigger DBMS Trigger, Part11 Audit Trail (Action) Audit Trail 83 Trigger Trigger 831 Trigger Part11 Audit Trail Audit Trail FDA, FDA Audit Trail (Risk Assessment ) Audit Trail 832 Audit Trail Table Table Audit Trail Table Audit Trail Table Table Table column Audit Trail Table Table, Table Audit Trail Table Table Relation 15/35
16 ) [ Table : rtuser] [Audit Trail Table : rtuser_at] - MS SQL /35
17 833 Trigger Script Trigger Script DBMS SQL Table / 3 ) [ Table : rtuser] [Audit Trail Table : rtuser_at] - MS SQL [log_id] column MS SQL (Oracle Sequence ) 17/35
18 18/35
19 9 Electronic Signature 91 Electronic Signature? (ES) Part11 ES Part11, Part11 (Digital Signature)[ 113 (5)], Open System, Part11 19/35
20 ( [ 1170] ) ( (Table) ) (, Table relation ) DBMS DBMS RDBMS RDB entity relation DB Modeling Normalization Table Primary Key (64 ) 3 Table 3 Table Table Column / ( Table Column ) Table : [rtsignset] ( )Table : [rtsignsetdt] Table : [rtsign] 20/35
21 922 Table (rtsignset) [rtsignset]table, Table, Column, [rtsignset]table, DB [rtsignset]table / 923 Table (rtsignsetdt) [rtsignsetdt]table Table, Table Part11 [ (a)] [ (kind)]column [ (kind)]column column 21/35
22 Table relation 924 Table (rtsign) [rtsign]table Table [ (sign_no)]column (max ) [ (sign_set_no)][ (sign_id)]column [rtsignsetdt]table [ (deputy_yn)]column [rtsignsetdt][kind] [rtsignsetdt]table [rtsign]table [ (content)]column [rtsignset][sign_set_name] [rtsignsetdt]table relation [rtsignsetdt]table relation, [rtsignsetdt]table, relation [rtsign]table [rtsign]table [rtsignsetdt]table [rtsignsetdt]table [rtsign]table , Table 22/35
23 ) ) 23/35
24 93 ID/Password ID/Password [ (a) (1) ] ID/Password 2 Login Password, Part11 2,, ID/Password [ (a) (1) (i)][ (a) (1) (ii)]id/password (continuous period) (subsequent signings) (password) (continuous period)? Login?? ( ), ID/Password 2 ID/Password Popup ID/Password (lock) 94 Part11, [ (a)], [ (b)], [ (a) (2)], ( ID/Password Part11 ) 923 [rtsignsetdt]table [ (kind)]column [ ]/[ ] 95 Part11 24/35
25 [ 1150 (a) (1)] & (Time-Stamp) [ 1150 (a) (2)] [ 1150 (a) (3)] FDA [/s/] ( ) ID (Time- Stamp) / FDA Warning Letter Thomas W Abrams Barbara Chong [rtsign]table ID, ID [user]table join [rtsign]table 25/35
26 26/35 96
27 10 FDA 21 CFR Part 11 Electronic Records; Electronic Signatures: Final Rule ISPE GAMP Forum, GAMP4, The Good Automated Manufacturing Practice(GAMP) Guide for Validation of Automated System, ISPE, , Automated System Validation, wwwvalidationcokr, , 21 CFR Part 11, wwwvalidationcokr, , GAMP, wwwvalidationcokr, /35
28 Part 11 Section Sub Content 111 Scope 111 Scope (a) The regulations in this part set forth the criteria under which the agency considers electronic records, electronic signatures, and handwritten signatures executed to electronic records to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures executed on paper Part 11,,,, 111 Scope (b) This part applies to records in electronic form that are created, modified, maintained, archived, retrieved, or transmitted, under any records requirements set forth in agency regulations This part also applies to electronic records submitted to the agency under requirements of the Federal Food, Drug, and Cosmetic Act and the Public Health Service Act, even if such records are not specifically identified in agency regulations However, this part does not apply to paper records that are, or have been, transmitted by electronic means Part 11,,,,, Federal Food, Drug, and Cosmetic Act / Public Health Service Act # # 111 Scope (c) Where electronic signatures and their associated electronic records meet the requirements of this part, the agency will consider the electronic signatures to be equivalent to full handwritten signatures, initials, and other general signings as required by agency regulations, unless specifically excepted by regulation(s) effective on or after August 20, 1997 Part 11, ( ) 111 Scope (d) Electronic records that meet the requirements of this part may be used in lieu of paper records, in accordance with Sec 112, unless paper records are specifically required, Sec 112, Part Scope (e) Computer systems (including hardware and software), controls, and attendant documentation maintained under this part shall be readily available for, and subject to, FDA inspection Part 11,, FDA 112 Implementation 112 Implementation (a) For records required to be maintained but not submitted to the agency, persons may use electronic records in lieu of paper records or electronic signatures in lieu of traditional signatures, in whole or in part, provided that the requirements of this part are met 28/35
29 Section Sub Content Part Implementation (b) For records submitted to the agency, persons may use electronic records in lieu of paper records or electronic signatures in lieu of traditional signatures, in whole or in part, provided that: 112 Implementation (b) (1) The requirements of this part are met; and Part Implementation (b) (2) The document or parts of a document to be submitted have been identified in public docket No 92S-0251 as being the type of submission the agency accepts in electronic form This docket will identify specifically what types of documents or parts of documents are acceptable for submission in electronic form without paper records and the agency receiving unit(s) (eg, specific center, office, division, branch) to which such submissions may be made Documents to agency receiving unit(s) not specified in the public docket will not be considered as official if they are submitted in electronic form; paper forms of such documents will be considered as official and must accompany any electronic records Persons are expected to consult with the intended agency receiving unit for details on how (eg, method of transmission, media, file formats, and technical protocols) and whether to proceed with the electronic submission docket( ) No 92S-0251 Docket Docket # 113 Definitions 113 Definitions (a) The definitions and interpretations of terms contained in section 201 of the act apply to those terms when used in this part Section Definitions (b) The following definitions of terms also apply to this part: 113 Definitions (1) Act means the Federal Food, Drug, and Cosmetic Act (secs (21 USC )) (Act)Federal Food, Drug, and Cosmetic 113 Definitions (2) Agency means the Food and Drug Administration (Agency)FDA 113 Definitions (3) Biometrics means a method of verifying an individual's identity based on measurement of the individual's physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable (Biometrics) 113 Definitions (4) Closed system means an environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system (Closed system) 29/35
30 Section Sub Content # (, ), 113 Definitions (5) Digital signature means an electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified (Digital signature), originator # 113 Definitions (6) Electronic record means any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system (Electronic record),,,,,,,,, 113 Definitions (7) Electronic signature means a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual's handwritten signature (Electronic signature),, 113 Definitions (8) Handwritten signature means the scripted name or legal mark of an individual handwritten by that individual and executed or adopted with the present intention to authenticate a writing in a permanent form The act of signing with a writing or marking instrument such as a pen or stylus is preserved The scripted name or legal mark, while conventionally applied to paper, may also be applied to other devices that capture the name or mark (Handwritten signature) #, 113 Definitions (9) Open system means an environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system 1110 Controls for closed systems (Open system) Persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine Such procedures and controls shall include the following:,,, 30/35
31 Section Sub Content 1110 Controls for closed systems (a) # # # Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems (b) (c) (d) (e) (f) (g),,, # #, The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records,, #,, Protection of records to enable their accurate and ready retrieval throughout the records retention period Limiting system access to authorized individuals Use of secure, computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records Record changes shall not obscure previously recorded information Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying,, (time-stamp ), audit trail audit trail # audit trail Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand,,,, 31/35
32 Section Sub Content 1110 Controls for closed systems (h) #,, Use of device (eg, terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1110 Controls for closed systems 1130 Controls for open systems 1150 Signature manifestations (i) (j) (k) (k) (1) (k) (2) Determination that persons who develop, maintain, or use electronic record/electronic signature systems have the education, training, and experience to perform their assigned tasks /,,,, The establishment of, and adherence to, written policies that hold individuals accountable and responsible for actions initiated under their electronic signatures, in order to deter record and signature falsification # Use of appropriate controls over systems documentation including: : Adequate controls over the distribution of, access to, and use of documentation for system operation and maintenance,, Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation audit trail # audit trail # Persons who use open systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, as appropriate, the confidentiality of electronic records from the point of their creation to the point of their receipt Such procedures and controls shall include those identified in Sec 1110, as appropriate, and additional measures such as document encryption and use of appropriate digital signature standards to ensure, as necessary under the circumstances, record authenticity, integrity, and confidentiality,,,,, Section 1110(Closed system ),,, (open system ) 32/35
33 Section Sub Content 1150 Signature manifestations (a) Signed electronic records shall contain information associated with the signing that clearly indicates all of the following: 1150 Signature manifestations 1150 Signature manifestations 1150 Signature manifestations 1150 Signature manifestations 1170 Signature/record linking General requirements General requirements General requirements General requirements General requirements (a) (1) (a) (2) (a) (3) (b) (a) (b) (c) (c) (1) : The printed name of the signer; # # ID The date and time when the signature was executed; and The meaning (such as review, approval, responsibility, or authorship) associated with the signature (,, ) The items identified in paragraphs (a)(1), (a)(2), and (a)(3) of this section shall be subject to the same controls as for electronic records and shall be included as part of any human readable form of the electronic record (such as electronic display or printout) (b) (a)(1), (a)(2), (a)(3) ( ) # Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means Each electronic signature shall be unique to one individual and shall not be reused by, or reassigned to, anyone else #, Before an organization establishes, assigns, certifies, or otherwise sanctions an individual's electronic signature, or any element of such electronic signature, the organization shall verify the identity of the individual,,, Persons using electronic signatures shall, prior to or at the time of such use, certify to the agency that the electronic signatures in their system, used on or after August 20, 1997, are intended to be the legally binding equivalent of traditional handwritten signatures,, ( ) The certification shall be submitted in paper form and signed with a traditional handwritten signature, to the Office of Regional Operations (HFC-100), 5600 Fishers Lane, Rockville, MD /35
34 Section Sub Content General requirements (c) (2) the Office of Regional Operations (HFC-100), 5600 Fishers Lane, Rockville, MD Persons using electronic signatures shall, upon agency request, provide additional certification or testimony that a specific electronic signature is the legally binding equivalent of the signer's handwritten signature Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Electronic signature components and controls Controls for identification codes/passwords (a) (a) (1) (a) (1) (i) (a) (1) (ii) (a) (2) (a) (3) (b),, Electronic signatures that are not based upon biometrics shall: : Employ at least two distinct identification components such as an identification code and password ID 2 #, # When an individual executes a series of signings during a single, continuous period of controlled system access, the first signing shall be executed using all electronic signature components; subsequent signings shall be executed using at least one electronic signature component that is only executable by, and designed to be used only by, the individual, : When an individual executes one or more signings not performed during a single, continuous period of controlled system access, each signing shall be executed using all of the electronic signature components, Be used only by their genuine owners; and Be administered and executed to ensure that attempted use of an individual's electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals Electronic signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than their genuine owners Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity Such controls shall include: 34/35
35 Section Sub Content Controls for identification codes/passwords Controls for identification codes/passwords Controls for identification codes/passwords Controls for identification codes/passwords Controls for identification codes/passwords (a) (b) (c) (d) (e) ID Maintaining the uniqueness of each combined identification code and password, such that no two individuals have the same combination of identification code and password ID Ensuring that identification code and password issuances are periodically checked, recalled, or revised (eg, to cover such events as password aging) ID,, (, ) Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls,,,, ( ) Use of transaction safeguards to prevent unauthorized use of passwords and/or identification codes, and to detect and report in an immediate and urgent manner any attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational management ID ( ) # password 3 id # login 5 Initial and periodic testing of devices, such as tokens or cards, that bear or generate identification code or password information to ensure that they function properly and have not been altered in an unauthorized manner ID 35/35
Microsoft Word - 21 cfr part 11 preamble
[Federal Register: March 20, 1997 (Volume 62, Number 54)] [Rules and Regulations] [Page 13429-13466] 21 CFR Part 11 - Electronic Records; Electronic s; Final Rule; Electronic Submissions; Establishment
More information\\CDS029\CDERGUID\5505dft
Guidance for Industry Part 11, Electronic Records; Electronic Signatures Scope and Application U.S. Department of Health and Human Services Food and Drug Administration Center for Drug Evaluation and Research
More informationISO17025.PDF
ISO/IEC 17025 1999-12-15 1 2 3 4 41 42 43 44, 45 / 46 47 48 49 / 410 411 412 413 414 5 51 52 53 54 / 55 56 57 58 / 59 / 510 A( ) ISO/IEC 17025 ISO 9001:1994 ISO 9002:1994 B( ) 1 11 /, / 12 / 1, 2, 3/ (
More informationMicrosoft PowerPoint - Ieee standard pptx
200511316 김형석 Test plan Test design specification Test case specification Test procedure specification Test item transmittal report Test log Test incident report Test summary report Purpose -The purpose
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More informationProduct A4
2 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 3 4 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 5 PI Increasing Performance PES PPSU PSU
More information- 2 -
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29 - - 30 -
More information10송동수.hwp
종량제봉투의 불법유통 방지를 위한 폐기물관리법과 조례의 개선방안* 1) 송 동 수** 차 례 Ⅰ. 머리말 Ⅱ. 종량제봉투의 개요 Ⅲ. 종량제봉투의 불법유통사례 및 방지대책 Ⅳ. 폐기물관리법의 개선방안 Ⅴ. 지방자치단체 조례의 개선방안 Ⅵ. 결론 국문초록 1995년부터 쓰레기 종량제가 시행되면서 각 지방자치단체별로 쓰레기 종량제 봉투가 제작, 판매되기 시작하였는데,
More information0125_ 워크샵 발표자료_완성.key
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host
More informationPowerPoint 프레젠테이션
Reasons for Poor Performance Programs 60% Design 20% System 2.5% Database 17.5% Source: ORACLE Performance Tuning 1 SMS TOOL DBA Monitoring TOOL Administration TOOL Performance Insight Backup SQL TUNING
More information- iii - - i - - ii - - iii - 국문요약 종합병원남자간호사가지각하는조직공정성 사회정체성과 조직시민행동과의관계 - iv - - v - - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - α α α α - 15 - α α α α α α
More informationexample code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for
2003 Development of the Software Generation Method using Model Driven Software Engineering Tool,,,,, Hoon-Seon Chang, Jae-Cheon Jung, Jae-Hack Kim Hee-Hwan Han, Do-Yeon Kim, Young-Woo Chang Wang Sik, Moon
More information1.장인석-ITIL 소개.ppt
HP 2005 6 IT ITIL Framework IT IT Framework Synchronized Business and IT Business Information technology Delivers: Simplicity, Agility, Value IT Complexity Cost Scale IT Technology IT Infrastructure IT
More information11¹Ú´ö±Ô
A Review on Promotion of Storytelling Local Cultures - 265 - 2-266 - 3-267 - 4-268 - 5-269 - 6 7-270 - 7-271 - 8-272 - 9-273 - 10-274 - 11-275 - 12-276 - 13-277 - 14-278 - 15-279 - 16 7-280 - 17-281 -
More information04-다시_고속철도61~80p
Approach for Value Improvement to Increase High-speed Railway Speed An effective way to develop a highly competitive system is to create a new market place that can create new values. Creating tools and
More information<32382DC3BBB0A2C0E5BED6C0DA2E687770>
논문접수일 : 2014.12.20 심사일 : 2015.01.06 게재확정일 : 2015.01.27 청각 장애자들을 위한 보급형 휴대폰 액세서리 디자인 프로토타입 개발 Development Prototype of Low-end Mobile Phone Accessory Design for Hearing-impaired Person 주저자 : 윤수인 서경대학교 예술대학
More informationstep 1-1
Written by Dr. In Ku Kim-Marshall STEP BY STEP Korean 1 through 15 Action Verbs Table of Contents Unit 1 The Korean Alphabet, hangeul Unit 2 Korean Sentences with 15 Action Verbs Introduction Review Exercises
More information,,,,,,, ,, 2 3,,,,,,,,,,,,,,,, (2001) 2
2004- - : 2004 5 11 :?,,,,,? Sen (human capability) 1?,, I 1 2 1 Sen A Why health equity? Health Econ 2002:11;659-666 2 1991 p 17 1 ,,,,,,, 20 1 2,, 2 3,,,,,,,,,,,,,,,, 3 3 1 (2001) 2 1),, 2), 2),, 3),,,
More informationF1-1(수정).ppt
, thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
More information<BFA9BAD02DB0A1BBF3B1A4B0ED28C0CCBCF6B9FC2920B3BBC1F62E706466>
001 002 003 004 005 006 008 009 010 011 2010 013 I II III 014 IV V 2010 015 016 017 018 I. 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 III. 041 042 III. 043
More information2009년 국제법평론회 동계학술대회 일정
한국경제연구원 대외세미나 인터넷전문은행 도입과제와 캐시리스사회 전환 전략 일시 2016년 3월 17일 (목) 14:00 ~17:30 장소 전경련회관 컨퍼런스센터 2층 토파즈룸 주최 한국경제연구원 한국금융ICT융합학회 PROGRAM 시 간 내 용 13:30~14:00 등 록 14:00~14:05 개회사 오정근 (한국금융ICT융합학회 회장) 14:05~14:10
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More information#KM560
KM-560 KM-560-7 PARTS BOOK KM-560 KM-560-7 INFORMATION A. Parts Book Structure of Part Book Unique code by mechanism Unique name by mechanism Explode view Ref. No. : Unique identifcation number by part
More information歯1.PDF
200176 .,.,.,. 5... 1/2. /. / 2. . 293.33 (54.32%), 65.54(12.13%), / 53.80(9.96%), 25.60(4.74%), 5.22(0.97%). / 3 S (1997)14.59% (1971) 10%, (1977).5%~11.5%, (1986)
More information2 동북아역사논총 50호 구권협정으로 해결됐다 는 일본 정부의 주장에 대해, 일본군 위안부 문제는 일 본 정부 군 등 국가권력이 관여한 반인도적 불법행위이므로 한일청구권협정 에 의해 해결된 것으로 볼 수 없다 는 공식 입장을 밝혔다. 또한 2011년 8월 헌 법재판소는
일본군 위안부 피해자 구제에 관한 일고( 一 考 ) 1 일본군 위안부 피해자 구제에 관한 일고( 一 考 ) 김관원 / 동북아역사재단 연구위원 Ⅰ. 머리말 일본군 위안부 문제가 한일 간 현안으로 불거지기 시작한 것은 일본군 위안부 피해를 공개 증언한 김학순 할머니 등이 일본에서 희생자 보상청구 소송을 제 기한 1991년부터다. 이때 일본 정부는 일본군이 위안부
More informationDBPIA-NURIMEDIA
27(2), 2007, 96-121 S ij k i POP j a i SEXR j i AGER j i BEDDAT j ij i j S ij S ij POP j SEXR j AGER j BEDDAT j k i a i i i L ij = S ij - S ij ---------- S ij S ij = k i POP j a i SEXR j i AGER j i BEDDAT
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 1, pp DOI: A study on Characte
Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp.381-404 DOI: http://dx.doi.org/10.21024/pnuedi.28.1.201803.381 A study on Characteristics of Action Learning by Analyzing Learners Experiences
More informationETL_project_best_practice1.ppt
ETL ETL Data,., Data Warehouse DataData Warehouse ETL tool/system: ETL, ETL Process Data Warehouse Platform Database, Access Method Data Source Data Operational Data Near Real-Time Data Modeling Refresh/Replication
More information2 KHU 글로벌 기업법무 리뷰 제2권 제1호 또 내용적으로 중대한 위기를 맞이하게 되었고, 개인은 흡사 어항 속의 금붕어 와 같은 신세로 전락할 운명에 처해있다. 현대정보화 사회에서 개인의 사적 영역이 얼마나 침해되고 있는지 는 양 비디오 사건 과 같은 연예인들의 사
연구 논문 헌법 제17조 사생활의 비밀과 자유에 대한 소고 연 제 혁* I. II. III. IV. 머리말 사생활의 비밀과 자유의 의의 및 법적 성격 사생활의 비밀과 자유의 내용 맺음말 I. 머리말 사람은 누구나 타인에게 알리고 싶지 않은 나만의 영역(Eigenraum) 을 혼자 소중히 간직하 기를 바랄 뿐만 아니라, 자기 스스로의 뜻에 따라 삶을 영위해 나가면서
More informationFMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2
FMX FMX 20062 () wwwexellencom sales@exellencom () 1 FMX 1 11 5M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2 FMX FMX D E (one
More informationMicrosoft Word - template for the written confirmation for active substances exported to the EU
Brussels, 10/07/2012 SANCO/SF/sl/ddg1.d.6(2012)997444 Template for the 'written confirmation' for active substances exported to the European Union for medicinal products for human use, in accordance with
More information2. 박주민.hwp
仁 荷 大 學 校 法 學 硏 究 第 15 輯 第 1 號 2012년 3월 31일, 149~184쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.15, No.1, March 2012 인터넷을 통한 선거운동과 공직선거법 * 박 주 민 법무법인(유한) 한결 변호사 < 목 차 > Ⅰ. 머리말
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More information사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서 제품을 사용하지 마십시오. 3.이 제품은
OPERATING INSTRUCTIONS OPERATING INSTRUCTIONS 사용자설명서 TourBus 0 & TourBus 5 사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서
More informationMicrosoft Word - part820preamblesubpart D document controls.doc
D. 문서관리 (Document Controls)(Subpart D) 93. One comment stated that subpart D of part 820 should be titled "Document Controls," instead of the proposed "Document and Record Controls" because the "record"
More information大学4年生の正社員内定要因に関する実証分析
190 2016 JEL Classification Number J24, I21, J20 Key Words JILPT 2011 1 190 Empirical Evidence on the Determinants of Success in Full-Time Job-Search for Japanese University Students By Hiroko ARAKI and
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More information#KLZ-371(PB)
PARTS BOOK KLZ-371 INFORMATION A. Parts Book Structure of Part Book Unique code by mechanism Unique name by mechanism Explode view Ref. No. : Unique identifcation number by part Parts No. : Unique Product
More information- i - - ii - - iii - - iv - - v - - vi - - 1 - - 2 - - 3 - 1) 통계청고시제 2010-150 호 (2010.7.6 개정, 2011.1.1 시행 ) - 4 - 요양급여의적용기준및방법에관한세부사항에따른골밀도검사기준 (2007 년 11 월 1 일시행 ) - 5 - - 6 - - 7 - - 8 - - 9 - - 10 -
More information<4D6963726F736F667420506F776572506F696E74202D20454C53BDC3BCBCC1B6C1BEC0EFBCDBC0C720C0EFC1A1B0FA20B9FDB8AE2831353035303829>
ELS 시세조종쟁송의 주요 쟁점과 법리 2015. 5. 8. 변호사 김 주 영 발표에 앞서 먼저 말씀드려야 할 사항 ELS 시세조종쟁송은 아직 대부분의 사건에 관하여 최종 판결이 내려지지 않은 사안 임 발표자는 ELS 시세조종쟁송에서 원고(투자자)측을 대리하고 있는 법무법인 소속임 본 발표자는 ELS 시세조종쟁송에 있어서 어떠한 쟁점들이 다루어지고 있고 그것이
More informationuntitled
SAS Korea / Professional Service Division 2 3 Corporate Performance Management Definition ý... is a system that provides organizations with a method of measuring and aligning the organization strategy
More information#KM-235(110222)
PARTS BOOK KM-235A/B INFORMATION A. Parts Book Structure of Part Book Unique code by mechanism Unique name by mechanism Explode view Ref. No. : Unique identifcation number by part Parts No. : Unique Product
More informationSecurity Overview
May. 14, 2004 Background Security Issue & Management Scope of Security Security Incident Security Organization Security Level Security Investment Security Roadmap Security Process Security Architecture
More informationÅ©·¹Àγ»Áö20p
Main www.bandohoist.com Products Wire Rope Hoist Ex-proof Hoist Chain Hoist i-lifter Crane Conveyor F/A System Ci-LIFTER Wire Rope Hoist & Explosion-proof Hoist Mono-Rail Type 1/2ton~20ton Double-Rail
More information<C0C7B7CAC0C720BBE7C8B8C0FB20B1E2B4C9B0FA20BAAFC8AD5FC0CCC7F6BCDB2E687770>
ꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚ ꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏ 儀 禮 의 社 會 的 機 能 과 變 化 李 顯 松 裵 花 玉 ꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏꠏ ꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚꠚ
More information歯3이화진
http://www.kbc.go.kr/ Abstract Terrestrial Broadcasters Strategies in the Age of Digital Broadcasting Wha-Jin Lee The purpose of this research is firstly to investigate the
More information#KM-250(PB)
PARTS BOOK FOR 1-NEEDLE, STRAIGHT LOCK-STITCH MACHINE SERIES KM-250AU-7S KM-250AU-7N KM-250A-7S KM-250A-7N KM-250B-7S KM-250B-7N KM-250BH-7S KM-250BH-7N KM-250BL-7S KM-250BL-7N KM-250AU KM-250A KM-250B
More informationRemote UI Guide
Remote UI KOR Remote UI Remote UI PDF Adobe Reader/Adobe Acrobat Reader. Adobe Reader/Adobe Acrobat Reader Adobe Systems Incorporated.. Canon. Remote UI GIF Adobe Systems Incorporated Photoshop. ..........................................................
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 3, pp DOI: NCS : * A Study on
Journal of Educational Innovation Research 2018, Vol. 28, No. 3, pp.157-176 DOI: http://dx.doi.org/10.21024/pnuedi.28.3.201809.157 NCS : * A Study on the NCS Learning Module Problem Analysis and Effective
More information민속지_이건욱T 최종
441 450 458 466 474 477 480 This book examines the research conducted on urban ethnography by the National Folk Museum of Korea. Although most people in Korea
More informationMicrosoft Word - 1-차우창.doc
Journal of the Ergonomics Society of Korea Vol. 28, No. 2 pp.1-8, May 2009 1 하이브리드 환경하의 인간기계시스템 제어실 평가에 관한 연구 차 우 창 김 남 철 금오공과대학교 산업시스템공학과 A Study of the Evaluation for the Control Room in Human Machine
More information<C1B6BBE7BFACB1B820323030342D303428B1E8BEF0BEC62920303128B8F1C2F7292E687770>
조사연구 2004-05 장애인 공무원 직무특성과 고용실태 연구 연구자 : 김언아 (고용개발원 선임연구원) 머 리 말 장애인 공직임용 확대 사업은 2004년 2월 5일 청와대에서 개최된 제 37차 국 정과제회의 결과 여성, 지방대 출신의 공직 임용 확대와 더불어, 참여정부에서 중점 적으로 추진하고자 하는 국정개혁의 일부라고 할 수 있다. 그동안 노동부와 공단에
More informationecorp-프로젝트제안서작성실무(양식3)
(BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing
More information03.Agile.key
CSE4006 Software Engineering Agile Development Scott Uk-Jin Lee Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2018 Background of Agile SW Development
More information마리오와 소닉 리우 올림픽™
마리오와 소닉 리우 올림픽 1 사용하기 전에 준비하기 2 유저 콘텐츠에 대하여 3 인터넷으로 이용 가능한 기능 4 보호자 여러분께 5 amiibo란 시작하기 전에 6 게임 소개 7 게임 시작 방법 8 조작 방법 9 데이터 저장과 삭제 통신으로 더욱 즐기기 10 대전 모드 11 포켓 마라톤 12 기록 기타 13 사용 곡명과 작곡자 소개 14 플레이 정보 송신
More information레이아웃 1
i g d e d mod, t d e d e d mod, t e,0 e, n s,0 e,n e,0 Division of Workers' Compensation (2009). Iowa workers' compensation manual. Gamber, E. N. & Sorensen, R. L. (1994). Are net discount rates stationary?:
More informationMicrosoft PowerPoint - ch03ysk2012.ppt [호환 모드]
전자회로 Ch3 iode Models and Circuits 김영석 충북대학교전자정보대학 2012.3.1 Email: kimys@cbu.ac.kr k Ch3-1 Ch3 iode Models and Circuits 3.1 Ideal iode 3.2 PN Junction as a iode 3.4 Large Signal and Small-Signal Operation
More informationBSC Discussion 1
Copyright 2006 by Human Consulting Group INC. All Rights Reserved. No Part of This Publication May Be Reproduced, Stored in a Retrieval System, or Transmitted in Any Form or by Any Means Electronic, Mechanical,
More information¹ýÁ¶ 12¿ù ¼öÁ¤.PDF
논문요약 146 [ 주제어 ] 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 abstract Recent Development in the Law of DPRK on the
More informationSchoolNet튜토리얼.PDF
Interoperability :,, Reusability: : Manageability : Accessibility :, LMS Durability : (Specifications), AICC (Aviation Industry CBT Committee) : 1988, /, LMS IMS : 1997EduCom NLII,,,,, ARIADNE (Alliance
More information슬라이드 제목 없음
ITU-T sjkoh@cs.knu.ac.kr ITU International Telecommunication Union 1934, UN Formerly, as known as CCITT http://www.itu.int ITU 2/36 ITU ITU Secretary General PP: ITU 3 Sectors ITU-T (Director, WTSA) ITU-Telecom.
More informationValidation Plan Template
문서번호(Document No.) : 개정번호(Revision No.) : 00 시행일자(Effective Date) : 페이지번호(Page No.) : 1 of 9 작성자 (Prepared By) 부서 (Dept.) 직위 (Position) 이름 (Name) 서명 / 날짜 (Signature / Date) 검토자 (Reviewed By) 부서 (Dept.)
More information232 도시행정학보 제25집 제4호 I. 서 론 1. 연구의 배경 및 목적 사회가 다원화될수록 다양성과 복합성의 요소는 증가하게 된다. 도시의 발달은 사회의 다원 화와 밀접하게 관련되어 있기 때문에 현대화된 도시는 경제, 사회, 정치 등이 복합적으로 연 계되어 있어 특
한국도시행정학회 도시행정학보 제25집 제4호 2012. 12 : pp.231~251 생활지향형 요소의 근린주거공간 분포특성 연구: 경기도 시 군을 중심으로* Spatial Distribution of Daily Life-Oriented Features in the Neighborhood: Focused on Municipalities of Gyeonggi Province
More information09È«¼®¿µ5~152s
Korean Journal of Remote Sensing, Vol.23, No.2, 2007, pp.45~52 Measurement of Backscattering Coefficients of Rice Canopy Using a Ground Polarimetric Scatterometer System Suk-Young Hong*, Jin-Young Hong**,
More informationIntroduction 신뢰성 있는 결과 높은 품질의 제품을 생산하기 위해서는 제품의 공정 시스템이 중요 품질관리실험실은 품질보증과정에서 매우 중요한 역할 분석시스템은 품질관리실험실의 매우 중요한 요소 분석시스템의 결과를 기본으로 하여 제품의 품질을 결정 R&D 실험실
적정의 올바른 분석방법 Kopack Seminar May 2012 Agenda Introduction Risks and Measures Summary 1 1 Introduction 신뢰성 있는 결과 높은 품질의 제품을 생산하기 위해서는 제품의 공정 시스템이 중요 품질관리실험실은 품질보증과정에서 매우 중요한 역할 분석시스템은 품질관리실험실의 매우 중요한 요소
More information<B3EDB9AEC1FD5F3235C1FD2E687770>
오용록의 작품세계 윤 혜 진 1) * 이 논문은 생전( 生 前 )에 학자로 주로 활동하였던 오용록(1955~2012)이 작곡한 작품들을 살펴보고 그의 작품세계를 파악하고자 하는 것이다. 한국음악이론이 원 래 작곡과 이론을 포함하였던 초기 작곡이론전공의 형태를 염두에 둔다면 그의 연 구에서 기존연구의 방법론을 넘어서 창의적인 분석 개념과 체계를 적용하려는
More information슬라이드 제목 없음
(JTC1/SC6) sjkoh@knu.ac.kr JTC1 JTC1/SC6/WG7 ECTP/RMCP/MMC (JTC1/SC6) 2/48 JTC1 ISO/IEC JTC1 Joint Technical Committee 1 ( ) ISO/TC 97 ( ) IEC/TC 83 ( ) Information Technology (IT) http://www.jtc1.org
More information975_983 특집-한규철, 정원호
Focused Issue of This Month Gyu Cheol an, MD Department of Otolaryngology ead & Neck Surgery, Gachon University of College Medicine E - mail : han@gilhospital.com Won-o Jung, MD Department of Otolaryngology
More informationAnalyses the Contents of Points per a Game and the Difference among Weight Categories after the Revision of Greco-Roman Style Wrestling Rules Han-bong
Analyses the Contents of Points per a Game and the Difference among Weight Categories after the Revision of Greco-Roman Style Wrestling Rules Han-bong An 1 & Kyoo-jeong Choi 2 * 1 Korea National Wrestling
More informationDW 개요.PDF
Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.
More information목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색 DB 및시스템조사 5
2014 특허청정책연구결과보고서 발간등록번호 11-1430000-001369-01 ISBN 978-89-6199-792-8-13500 ᅦ 특허검색고도화를위한 검색시스템및검색기법연구 A Study on the Retrieval Systems and Techniques for Enhancing Patent Search 목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색
More information4 CD Construct Special Model VI 2 nd Order Model VI 2 Note: Hands-on 1, 2 RC 1 RLC mass-spring-damper 2 2 ζ ω n (rad/sec) 2 ( ζ < 1), 1 (ζ = 1), ( ) 1
: LabVIEW Control Design, Simulation, & System Identification LabVIEW Control Design Toolkit, Simulation Module, System Identification Toolkit 2 (RLC Spring-Mass-Damper) Control Design toolkit LabVIEW
More informationPowerChute Personal Edition v3.1.0 에이전트 사용 설명서
PowerChute Personal Edition v3.1.0 990-3772D-019 4/2019 Schneider Electric IT Corporation Schneider Electric IT Corporation.. Schneider Electric IT Corporation,,,.,. Schneider Electric IT Corporation..
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs, including any oper
Windows Netra Blade X3-2B( Sun Netra X6270 M3 Blade) : E37790 01 2012 9 Copyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs,
More information#KM-340BL
PARTS BOOK KM-340BL 고속 1본침 본봉 상하송 재봉기 High Speed, 1-Needle, Upper and Lower Feed Lock Stitch Machine W/Large Hook PME-100707 SunStar CO., LTD. INFORMATION A. Parts Book Structure of Part Book Unique code
More informationHardware Manual TSP100
Trademark acknowledgments TSP: Star Micronics., Ltd. Notice All rights reserved. Reproduction of any part of this manual in any form whatsoever, without STAR s express permission is forbidden. The contents
More information인디쓔피-IOM핸돜벁닄큐1014pdf, page 59 @ Preflight ( IOM핸돜벁닄큐__1014 )
Publisher: International Organization for Migration 17, route des Morillons 1211 Geneva 19 Switzerland Tel: +41.22.717 91 11 Fax: +41.22.798 61 50 E-mail: hq@iom.int Internet: http://www.iom.int ISBN 978
More information슬라이드 1
CJ 2007 CONTENTS 2006 CJ IR Presentation Overview 4 Non-performing Asset Company Profile Vision & Mission 4 4 - & 4-4 - & 4 - - - - ROE / EPS - - DreamWorks Animation Net Asset Value (NAV) Disclaimer IR
More informationMicrosoft PowerPoint - AC3.pptx
Chapter 3 Block Diagrams and Signal Flow Graphs Automatic Control Systems, 9th Edition Farid Golnaraghi, Simon Fraser University Benjamin C. Kuo, University of Illinois 1 Introduction In this chapter,
More information별지 제10호 서식
국립국어원 정보 보안 업무 처리 규정 제정 2013. 12. 26. 국립국어원 예규 제 95호 일부개정 2014. 3. 10. 국립국어원 예규 제111호 제 1 장 총 칙 제 1 조(목적) 이 규정은 국립국어원의 정보보안업무 수행에 필요한 사항을 규정함을 목적으로 한다. 제 2 조(정의) 이 규정에서 사용하는 용어의 정의는 다음 각 호와 같다. 1. 부서 라
More information<31342D3034C0E5C7FDBFB52E687770>
아카데미 토론 평가에 대한 재고찰 - 토론승패와 설득은 일치하는가 - 장혜영 (명지대) 1. 들어가는 말 토론이란 무엇일까? 토론에 대한 정의는 매우 다양하다. 안재현 과 오창훈은 토론에 대한 여러 정의들을 검토한 후 이들을 종합하 여 다음과 같이 설명하고 있다. 토론이란 주어진 주제에 대해 형 식과 절차에 따라 각자 자신의 의견을 합리적으로 주장하여 상대
More information192 法 學 硏 究 第 17 輯 第 2 號 < 국문초록 > 선하증권의 한계점을 극복하기 위해 실무에서 널리 화물선취보증장(L/G:Letter of Guarantee)제도가 이용되고는 있다. 그러나 수입상으로서는 추가적인 비용이 발생하고, 직접 은행을 방문해서 화물선취
仁 荷 大 學 校 法 學 硏 究 第 17 輯 第 2 號 2014년 06월 30일, 191~218쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.17, No.2, June, 2014 해상운송물 인도 방법의 문제점과 대안 * ** -권리포기 선하증권의 폐지와 대안을 중심으로- 권 기 훈
More information<32B1B3BDC32E687770>
008년도 상반기 제회 한 국 어 능 력 시 험 The th Test of Proficiency in Korean 일반 한국어(S-TOPIK 중급(Intermediate A 교시 이해 ( 듣기, 읽기 수험번호(Registration No. 이 름 (Name 한국어(Korean 영 어(English 유 의 사 항 Information. 시험 시작 지시가 있을
More information2
02 1 1 22 36 38 46 5 1 54 61 65 77 81 2 _ 3 4 _ 5 6 _7 8 _ 9 1 0 _ 11 1 2 _ 13 1 4 _ 15 1 6 _ 17 1 8 _ 19 2 0 _ 21 2 2 www.kats.go.kr www.kats.go.kr _ 23 Scope of TC/223 Societal security International
More informationVol.258 C O N T E N T S M O N T H L Y P U B L I C F I N A N C E F O R U M
2017.12 Vol.258 C O N T E N T S 02 06 35 57 89 94 100 103 105 M O N T H L Y P U B L I C F I N A N C E F O R U M 2 2017.12 3 4 2017.12 * 6 2017.12 7 1,989,020 2,110,953 2,087,458 2,210,542 2,370,003 10,767,976
More information05_±è½Ã¿Ł¿Ü_1130
132 133 1) 2) 3) 4) 5) 134 135 6) 7) 8) 136 9) 10) 11) 12) 137 13) 14) 15) 16) 17) 18) 138 19) 20) 21) 139 22) 23) 140 24) 141 25) 142 26) 27) 28) 29) 30) 31) 32) 143 33) 34) 35) 36) 37) 38) 39) 40) 144
More informationJournal of Educational Innovation Research 2017, Vol. 27, No. 4, pp DOI: A Study on the Opti
Journal of Educational Innovation Research 2017, Vol. 27, No. 4, pp.127-148 DOI: http://dx.doi.org/11024/pnuedi.27.4.201712.127 A Study on the Optimization of Appropriate Hearing-impaired Curriculum Purpose:
More information<28BCF6BDC320323031352D31332920B0E6B1E2B5B520C1F6BFAABAB020BFA9BCBAC0CFC0DAB8AE20C1A4C3A520C3DFC1F8C0FCB7AB5FC3D6C1BE2830312E3036292E687770>
수시과제 2015-13 경기도 지역별 여성일자리 정책 추진 전략 연구책임자 : 최 윤 선 (본원선임연구위원) : 남 승 연 (본원연구위원) 연 구 지 원 : 이 상 아 (본원위촉연구원) 연 구 기 간 : 2015. 9 ~12 2015 발 간 사 여성 일자리는 사회 내 여성과 남성간의 차이를 좁히고 개개인의 삶을 윤택하게 만드는 중요 한 부분입니다. 이에 정부는
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information歯kjmh2004v13n1.PDF
13 1 ( 24 ) 2004 6 Korean J Med Hist 13 1 19 Jun 2004 ISSN 1225 505X 1) * * 1 ( ) 2) 3) 4) * 1) ( ) 3 2) 7 1 3) 2 1 13 1 ( 24 ) 2004 6 5) ( ) ( ) 2 1 ( ) 2 3 2 4) ( ) 6 7 5) - 2003 23 144-166 2 2 1) 6)
More information공급 에는 3권역 내에 준공된 프라임 오피스가 없었다. 4분기에는 3개동의 프라임 오피스가 신규로 준공 될 예정이다.(사옥1개동, 임대용 오피스 2개동) 수요와 공실률 2014년 10월 한국은행이 발표한 자료에 따르면 한국의 2014년 경제성장률 예측치는 3.5%로 지
Savills World Research 브리핑 서울 프라임 오피스 사진 : Yeouido, Seoul 개요 삼성SDS가 지난 2분기 준공한 잠실 사옥 주변으로의 이전을 지속하고 증권업계의 임차면적 감소가 계속되어 GBD와 YBD 의 수요는 감소하였고 에서는 소폭의 수요 증가가 나타났다. 의 수요 회복에도 불구하고 GBD, YBD의 수요 감소로 서울프라임오피스의
More information2015.6.15.시행 사증발급신청서, 외국인배우자초청장.hwp
출입국관리법 시행규칙 [별지 제17호서식] (제1쪽 / Page1) 사증발급신청서 APPLICATION FOR VISA 신청인은 사실에 근거하여 빠짐없이 정확하게 신청서를 작성하여야 합니다. 신청서상의 모든 질문에 대한 답변은 한글 또는 영문으로 기재하여야 합니다. 선택사항은 해당 칸[ ] 안에 표시를 하시기 바랍니다. 기타 를 선택한 경우,
More information장양수
한국문학논총 제70집(2015. 8) 333~360쪽 공선옥 소설 속 장소 의 의미 - 명랑한 밤길, 영란, 꽃같은 시절 을 중심으로 * 1)이 희 원 ** 1. 들어가며 - 장소의 인간 차 2. 주거지와 소유지 사이의 집/사람 3. 취약함의 나눔으로서의 장소 증여 례 4. 장소 소속감과 미의식의 가능성 5.
More informationMicrosoft Word - 국제중재
기업인과 변호사를 위한 국제 중재(International Arbitration)의 이해와 활용 법무법인 이산( 移 山 ) 서울시 서초구 서초4동 1698-2 형남빌딩 5층 전화: (02) 3477-0150 팩스: 3477-0160 http://www.esanlaw.com 들어가는 말 국제거래에서 발생할 수 있는 분쟁을
More informationDomino Designer Portal Development tools Rational Application Developer WebSphere Portlet Factory Workplace Designer Workplace Forms Designer
Domino, Portal & Workplace WPLC FTSS Domino Designer Portal Development tools Rational Application Developer WebSphere Portlet Factory Workplace Designer Workplace Forms Designer ? Lotus Notes Clients
More information00829A_SHR-6164-KOR.indb
SHR-6080/6082/6160/6162/6163/6164 8 Channel/16 Channel DVR 2_ _3 4_ 15cm 5cm _5 15cm 5cm 6_ J _7 8_ _9 6080 1 2 3 4 10 8 7 6 5 6160/6163 1 2 3 4 10 8 7 6 5 6082 1 2 3 4 10 9 8 7 6 5 6162/6164 1 2 3 4 10
More informationRheu-suppl hwp
Objective: This paper reviews the existing Korean medical and public health, and nursing academy articles on disease-specific and domain-specific quality of life, and provides recommendations for the universally
More informationORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O
Orange for ORACLE V4.0 Installation Guide ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE...1 1....2 1.1...2 1.2...2 1.2.1...2 1.2.2 (Online Upgrade)...11 1.3 ORANGE CONFIGURATION ADMIN...12 1.3.1 Orange Configuration
More information학습영역의 Taxonomy에 기초한 CD-ROM Title의 효과분석
,, Even the short history of the Web system, the techniques related to the Web system have b een developed rapidly. Yet, the quality of the Webbased application software has not improved. For this reason,
More information소프트웨어개발방법론
사용사례 (Use Case) Objectives 2 소개? (story) vs. 3 UC 와 UP 산출물과의관계 Sample UP Artifact Relationships Domain Model Business Modeling date... Sale 1 1..* Sales... LineItem... quantity Use-Case Model objects,
More information