• Title/Summary/Keyword: etc

Search Result 28,480, Processing Time 0.067 seconds

Research on the ethical implication of the principle of "Faithfulness" and "Benevolence" and application schemes in the ethics course of the elementary education - centering around the synthetic approach to the individual morality and the ethics of social community ('충서지도(忠恕之道)'의 윤리학적 함의와 초등 도덕과 교육에서의 적용 방안 연구 - 개인윤리와 사회공동체윤리의 통합적 접근을 중심으로 -)

  • Chi, Chun-Ho
    • (The)Study of the Eastern Classic
    • /
    • no.34
    • /
    • pp.311-338
    • /
    • 2009
  • The moral corruption or the reality of absence of humanity derived from the development of science and society is very serious. Especially the moral education which should provide new breakthroughs facing such issue will be the initial concern in the educational world and the key point that judges our future. This study, as a part of efforts made for such demands of the times, is an attempt to approach the field of the present elementary education specifically by deducing the abundant meaning that the Confucianism's Chungseojidoh(忠恕之道: the principle of "Faithfulness" and "Benevolence") stands for. To build an ethical social community also means to draw voluntary moral practices into this society and this is possible with our (the moral subject) struggling the problems within but not remaining in the limitations of physical norms. Chungseojidoh as universal ethics contains a virtue ethical meaning as Jenlogy, a meaning of identity recognition and self-esteem inspiration, a meaning of social community ethics as ethics of good offices, etc. Such meanings, in particular, can be discussed more profoundly in terms of educational prevention from violence or cliquish issues in school that are largely related to education of humanity if 'applying schemes for elementary education' is seen as the center of the issue. And furthermore, they will be able to open a discussion over problems of the situation which the Korean society is in - especially the insistence, egoism or conflicts between social communities - can be answered in actuality.

Kant's Categorical Imperative and Chu Hsi's Moral Philosophy (칸트의 정언명법과 주자(朱子)의 도덕철학)

  • Lim, Heon-gyu
    • (The)Study of the Eastern Classic
    • /
    • no.35
    • /
    • pp.297-327
    • /
    • 2009
  • Kant proposed three principles of moral philosophy(Categorical Imperative) and Supreme moral principle in The Fundamental principles of Metaphysics of Ethics : Act only on that maxim through which you can at the same time will that it should become a universal law ${\cdots}$ etc. Kant's three principles of moral philosophy(Categorical Imperatives) imply that the idea of universality, freedom, and the kingdom of ends. We contrast Chu Hsi's Moral Philosophy with Kant's three principles of Categorical Imperatives. In conclusion Chu Hsi's moral rules be equal to kantian categorical imperative. These rules implicate principle of universalization, impartiality, and the kingdom of ends. But Chu Hsi believe in reality of the human mind and it's nature. Human mind and it's nature is comprised of benevolence, righteousness, propriety and wisdom. Benevolence, righteousness, propriety and wisdom(四德) is the origin of morality. Chu Hsi's philosophy of LI(理) is metaphysics of Tao-Te(道德) or ontological-metaphysical Ethics. Everyone has created with LI. LI is potentiality of Human beings and the good. Chu Hsi's moral philosophy is distinguished from the traditional theory of the substance and modern scientism(phenomenalism)

A Study on Hu Hong's concept of "Xing" (호굉(胡宏)의 본성(性) 개념에 대한 고찰)

  • Sung, Kwang-dong
    • The Journal of Korean Philosophical History
    • /
    • no.42
    • /
    • pp.233-258
    • /
    • 2014
  • This article investigates the concept of the xing(性) used by Hu Hong. Hu Hong's philosophical system considered to top priority for xing is called xingbunlun(性本論), and he suggested the characteristics of xing as follows. First, Hu Hong regarded xing as the fundamental of whole world and related to the specific individual things, so he constructed the concept of xing in the perspective of ontology. Namely while xing is ti(體) the root of all the world, it is the realization of the uniqueness of the individual things. Also he considered xing which of the ontological aspect developed various psychological aspect contained xin (心), qing(情), yu(欲), etc. Seond, As Hu Hong regulated that wei fa(未發) is xing and yi fa(已發) is xin, he defined the ideal relation between xing and xin as xingtixinyong(性體心用). And he considered that the sage and the ordinary peoples are equal in the xing's aspect of wei fa, but they are not equal in ability of the xin in the aspect of wei fa. Hu Hong thought that the only sage realized the ideal relation between xing and xin in this world, because he keep his mind silent. So Hu Hong suggested the possibility of moral cultivation to the ordinary peoples, expressing that human nature realized the function of the mind(成性), in order that they realized ideal relation by following ren(仁). Third, unlike the traditional notion, Hu Hong understood the meaning of xing in the aspect of ontology. He interpreted the shan(善) of xingshan(性善) as the meaning of exclamation, which implied that "the innate goodness of human nature(性善)" meant "Human nature is good." Because Hu Hong thought that the meaning of xing transcended the relative concept of good and evil, and accepted the whole world affirmatively. In the opinion of Hu Hong, as the concept of xing had two ways of intentionality; likes and dislikes(好惡), things formed relationship with other in this world. Then the concept of good and evil of the ethical value judgement occurred.

The deconstructive moral theory of Zhuangzi (장자(莊子)의 해체주의적 윤리설)

  • Kim, Sangrae
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.277-308
    • /
    • 2011
  • The purpose of this study is to show that there are textual similarities between philosophy of Zhuangzi(莊子) and what Jacques Derrida' concepts such as 'differance', 'trace', and 'play', etc. Through our comparative study, we have established a philosophical affinity between Taoist thinking of Zhuangzi and Derridian deconstructive thinking. Zhuangzi and Derrida deconstruct all kinds of traditional and metaphysical thoughts. Zhuangzi's saying of "There is Tao(道) for Thievery(盜)". I call this philosophical tendency 'the logic of cohabitation and coexistence' of the Taoist philosophy. Derrida and Zhuangzi suggest that the logic of cohabitation and coexistence recognizes and affirms differences between opposites. In these thoughts of double affirmation, there is no violence of dichotomous thinking. In other words, their ways of thinking challenge the value system that suggests a single truth, and propose that all human values necessarily carry half-values. They give us to create an enjoyable play-space for human beings in this world. Zhuangzi's suggestions for moral theory provide us with a chance for making question as what is the better life with the others, with a fresh and new perspectives to understand differently the human beings along the category of universe in the 21st century.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Research on the Classification Model of Similarity Malware using Fuzzy Hash (퍼지해시를 이용한 유사 악성코드 분류모델에 관한 연구)

  • Park, Changwook;Chung, Hyunji;Seo, Kwangseok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1325-1336
    • /
    • 2012
  • In the past about 10 different kinds of malicious code were found in one day on the average. However, the number of malicious codes that are found has rapidly increased reachingover 55,000 during the last 10 year. A large number of malicious codes, however, are not new kinds of malicious codes but most of them are new variants of the existing malicious codes as same functions are newly added into the existing malicious codes, or the existing malicious codes are modified to evade anti-virus detection. To deal with a lot of malicious codes including new malicious codes and variants of the existing malicious codes, we need to compare the malicious codes in the past and the similarity and classify the new malicious codes and the variants of the existing malicious codes. A former calculation method of the similarity on the existing malicious codes compare external factors of IPs, URLs, API, Strings, etc or source code levels. The former calculation method of the similarity takes time due to the number of malicious codes and comparable factors on the increase, and it leads to employing fuzzy hashing to reduce the amount of calculation. The existing fuzzy hashing, however, has some limitations, and it causes come problems to the former calculation of the similarity. Therefore, this research paper has suggested a new comparison method for malicious codes to improve performance of the calculation of the similarity using fuzzy hashing and also a classification method employing the new comparison method.

Recent Advances in Metal Organic Framework based Thin Film Nanocomposite Membrane for Nanofiltration (나노여과를 위한 금속유기구조체 기반 박막 나노복합막의 최근 발전)

  • Kim, Esther;Patel, Rajkumar
    • Membrane Journal
    • /
    • v.31 no.1
    • /
    • pp.35-51
    • /
    • 2021
  • Advancements in thin-film nanocomposite (TFN) membrane technology for nanofiltration is crucial for removing pollutants from natural resources. In recent years, various metal-organic framework (MOF) modifications have been tested to overcome the drawbacks that are inevitable with conventional thin-film composite (TFC) and TFN membranes. In general, MIL-101(Cr), UiO-66, ZIF-8, and HKUST-1 [Cu3(BCT2)] are MOFs that were proven to exhibit excellent membrane performance in terms of solvent permeability and solute rejection; their respective studies are reviewed in this article. Other novelties, such as the simultaneous use of different MOFs and unique MOF layering techniques (e.g., dip-coating, spray pre-disposition, Langmuir-Schaefer film, etc.) are also discussed as they present alternate solutions for membrane enhancement and/or preparation convenience. Not only are these MOF-modified TFN membranes frequently shown to improve separation performance from their respective TFC and TFN membranes, but many reports also explain their potential for a cost-effective and environmentally friendly process. In this review the thin film nanocomposite nanofiltration membrane is discussed.

A Study on experiential consumption and development of the customized cosmetics on female university students in their 20s -Preliminary Study- (20대 여대생의 맞춤형화장품 체험소비 및 발전방향 연구)

  • Lee, Ha-yeon;Ju, Hyun-young;Kim, Gyu-ri
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.595-606
    • /
    • 2020
  • To find out the a Study on experiential consumption and development of the customized cosmetics on female university students in their 20s, this study conducted sampling using probability sampling from cosmetics major students in S City from September 1 to October 30, 2020. In this study, a study model was designed for a total of 30 people and studied as an Experience-Consume Experimentation. First, the result of the pre-purchase survey revealed that skincare cosmetics had the highest percentage for being selected by 30 people for "the preferred cosmetic type per the perception regarding customized cosmetics." Second, the result of the pre-purchase survey revealed that 11 people answered skincare cosmetics, 1 person answered shade cosmetics, and 2 people answered fragrance products (perfume, diffusers, etc.) for "the experience type for customized cosmetics." Third, the result of the post-purchase survey revealed that 29 people are willing to recommend the products, while 1 person is not. For the appropriateness of the price, 23 people answered yes; 7 people answered no. for the characteristics of the experience, 24 people (80%) answered that they selected ingredients according to their skin type; 9 people answered that the price is cheap considering they received 1:1 consultation; 18 people answered that they made a choice per their preferences (skin type) rather than per brands; 3 people answered that their self-esteem is stronger as if they received personal care. Therefore, customized cosmetics are expected to increase the attractiveness and purchase rate of female students in their twenties given that 'Human Touch,' genetic analysis, and 'hyper-customization technology,' which requires new development of customized cosmetics experience consumption for female college students in their 20s.

A Study of Hazard Analysis and Monitoring Concepts of Autonomous Vehicles Based on V2V Communication System at Non-signalized Intersections (비신호 교차로 상황에서 V2V 기반 자율주행차의 위험성 분석 및 모니터링 컨셉 연구)

  • Baek, Yun-soek;Shin, Seong-geun;Ahn, Dae-ryong;Lee, Hyuck-kee;Moon, Byoung-joon;Kim, Sung-sub;Cho, Seong-woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.222-234
    • /
    • 2020
  • Autonomous vehicles are equipped with a wide rage of sensors such as GPS, RADAR, LIDAR, camera, IMU, etc. and are driven by recognizing and judging various transportation systems at intersections in the city. The accident ratio of the intersection of the autonomous vehicles is 88% of all accidents due to the limitation of prediction and judgment of an area outside the sensing distance. Not only research on non-signalized intersection collision avoidance strategies through V2V and V2I is underway, but also research on safe intersection driving in failure situations is underway, but verification and fragments through simple intersection scenarios Only typical V2V failures are presented. In this paper, we analyzed the architecture of the V2V module, analyzed the causal factors for each V2V module, and defined the failure mode. We presented intersection scenarios for various road conditions and traffic volumes. we used the ISO-26262 Part3 Process and performed HARA (Hazard Analysis and Risk Assessment) to analyze the risk of autonomous vehicle based on the simulation. We presented ASIL, which is the result of risk analysis, proposed a monitoring concept for each component of the V2V module, and presented monitoring coverage.