• Title/Summary/Keyword: Market Risk

Search Result 1,304, Processing Time 0.039 seconds

How to Reflect Sustainable Development, exemplified by the Equator Principles, in Overseas Investment (해외투자(海外投資)와 지속가능발전 원칙 - 프로젝트 파이낸스의 적도원칙(赤道原則)을 중심으로 -)

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.31
    • /
    • pp.27-56
    • /
    • 2006
  • Today's financial institutions usually take environmental issues seriously into consideration as they could not evade lender liability in an increasing number of cases. On the international scene, a brand-new concept of the "Equator Principles" in the New Millenium has driven more and more international banks to adopt these Principles in project financing. Sustainable development has been a key word in understanding new trends of the governments, financial institutions, corporations and civic groups in the 21st century. The Equator Principles are a set of voluntary environmental and social guidelines for sustainable finance. These Principles commit bank officers to avoid financial support to projects that fail to meet these guidelines. The Principles were conceived in 2002 on an initiative of the International Finance Corporation(IFC), and launched in June 2003. Since then, dozens of major banks, accounting for up to 80 percent of project loan market, have adopted the Principles. Accordingly, the Principles have become the de facto standard for all banks and investors on how to deal with potential social and environmental issues of projects to be financed. Compliance with the Equator Principles facilitates for endorsing banks to participate in the syndicated loan and help them to manage the risks associated with large-scale projects. The Equator Principles call for financial institutions to provide loans to projects under the following circumstances: - The risk of the project is categorized in accordance with internal guidelines based upon the environmental and social screening criteria of the IFC. - For Category A and B projects, borrowers or sponsors are required to conduct a Social and Environmental Assessment, the preparation of which must meet certain requirements and satisfactorily address key social and environmental issues. - The Social and Environmental Assessment report should address baseline social and environmental conditions, requirements under host country laws and regulations, sustainable development, and, as appropriate, IFC's Environmental, Health and Safety Guidelines, etc. - Based on the Social and Environmental Assessment, Equator banks then make agreements with borrowers on how they mitigate, monitor and manage the risks through a Social and Environmental Management System. Compliance with the plan is included in the covenant clause of loan agreements. If the borrower doesn't comply with the agreed terms, the bank will take corrective actions. The Equator Principles are not a mere declaration of cautious banks but a full commitment of lenders. A violation of the Principles in the process of project financing, which led to an unexpected damage to the affected community, would not give rise to any specific legal remedies other than ordinary lawsuits. So it is more effective for banks to ensure consistent implementation of the Principles and to have them take responsible measures to solve social and environmental issues. Public interests have recently mounted up with respect to environmental issues on the occasion of the Supreme Court's decision (2006Du330) on the fiercely debated reclamation project at Saemangeum. The majority Justices said that the expected environmental damages like probable pollution of water and soil were not believed so serious and that the Administration should continue to implement the project seeking ways to make it more environment friendly. In this case, though the Category A Saemangeum Project was carried out by a government agency, the Supreme Court behaved itself as a signal giver to approve or stop the environment-related project like an Equator bank in project financing. At present, there is no Equator bank in Korea in contrast to three big banks in Japan. Also Korean contractors, which are aggressively bidding for Category A-type projects in South East Asia and Mideast, might find themselves in a disadvantageous position because they are generally ignorant of the environmental assessment associated with project financing. In this regard, Korean banks and overseas project contractors should care for the revised Equator Principles and the latest developments in project financing more seriously. It's because its scope has expanded to the capital cost of US$10 million or more across all industry sectors regardless of developing countries or not. It should be noted that, for a Korean bank, being an Equator bank is more or less burdensome in a short-term period, but it must be conducive to minimizing risks and building up good reputation in the long run.

  • PDF

Improvement of Proliferation Capacity of Non-adapted CHO Cells Subcultured Using Serum Free Media in Long-term Culture (무혈청 배지에서 계대배양한 비적응 CHO(Chinese Hamster Ovary) 세포의 증식력 개선에 관한 연구)

  • Lee, Seung-Sun;Lee, Jin-Sung;Byun, Soon-Hyu;Park, Hong-Woo;Choe, Tae-Boo
    • KSBB Journal
    • /
    • v.21 no.4
    • /
    • pp.248-254
    • /
    • 2006
  • Animal cell culture industry has a large market and an exponential growth rate among biological industry field. Chines hamster ovary(CHO) cells are the most widely used cell lines for recombinant protein production. They can avoid infection from polio, herpes, hepatitis B, HIV, measles, adenovirus and etc. Moreover it is easy to transfection recombinant genes and possible to suspension culture. Serum free media is one of the most important factor of protein production. Because serum has problems. Serum is not defined the contents until now, it has a number of proteins, lipids, carbohydrates and unknown molecules that cause of risk involve in infection and high cost of product purification. CHO cell line cultured using serum free media were the basis of a very successful method to produce(glyco-)protein in mammalian cells, which are then used as pharmaceutical products. Also, the low protein content of the developed medium facilitates downstream processing and product purification. But non-adapted CHO cells have a limit of proliferation cultured using serum free media and it takes very long time to adapt non-adapted cells to serum free media. There are a number of causes of a limit of proliferation using serum free media. Absence of growth factors and growth stimulating molecules is a major factor of the reasons. It makes growth signals and moves cell cycle. And increase of cellular stress is another reason. It induces increase of intraceullar ROS concentration. The purpose of this study is about improvement of proliferation capacity of non-adapted CHO cells cultured using serum free media without adaptation process.

Monitoring of pesticide residues in commercial agricultural products in the northern area of Seoul, Korea (서울 북부지역 유통 농산물의 농약 잔류실태)

  • Han, Sung-Hee;Park, Sung-Kyu;Kim, Ouk-Hee;Choi, Young-Hee;Seoung, Hyun-Jung;Lee, Young-Ju;Jung, Jung-Hee;Kim, Yun-Hee;Yu, In-Sil;Kim, Yoo-Kyung;Han, Ki-Young;Chae, Young-Zoo
    • The Korean Journal of Pesticide Science
    • /
    • v.16 no.2
    • /
    • pp.109-120
    • /
    • 2012
  • This study was conducted to monitor 284 pesticides residue level in 2,914 commercial agricultural products in the northern area of Seoul in 2011 by the multi class pesticide multiresidue analysis methods in Korea Food Code using GC, HPLC, GC-MSD and, LC-MSD. The detection rate of pesticide residues were 14.8% (431/2,914). The order of agricultural products in which the pesticide residues were detected was perilla leaves 40.0% (28/70), chamnamul 35.5% (11/31), amaranth 30.0% (3/10) and spinach 27.7% (38/137) etc. The percentage of products that exceeded the MRLs (maximum residue limits) were 1.0% (31/431). Those products that exceeded MRLs were ginseng (6), perilla leaves (4), leek (4), welsh onion (3) and sedeum (3) etc. The 59 kinds of the pesticides were detected on this study, 21 pesticides of them were detected over MRLs. Detection rate of fungicides (56.4%) was higher than that of insecticides (42.1%). And procymidone was detected with considerable high frequency. Additionally, residual residual violates pesticides were in the order of tolclofos-methyl, endosulfan, dimethomorph, diniconazole and fludioxonil. According to the agricultural marketing channels, detection and excess rate of them were monitored. Detection and excess rate of samples circulated in agricultural traditional market were highest. The estimated daily intakes (EDI) of the pesticides were compared to personal acceptable daily intakes (PADI) in order to risk assessment by food consumption. Diazinon in Korean cabbage showed the highest %ADI, 2.9901 and others showed below 3.0 %ADI. Overall, these results indicate that residue levels of pesticides detected were evaluated as safe.

The Effects of Female Wage on Fertility in Korea (여성의 임금수준이 출산율에 미치는 영향 분석)

  • Kim, Jungho
    • KDI Journal of Economic Policy
    • /
    • v.31 no.1
    • /
    • pp.105-138
    • /
    • 2009
  • Although the decline in fertility rate is generally observed along the history of economic development throughout the world, the continuing decline hitting below the replacement level in Korea over the recent years gathered serious social concerns on the ground that it accelerates the process of population aging. The total fertility rate in Koreareached 2.08 in 1983, and gradually fell to the levels of 1.08 in 2005 and 1.26 in 2007. The policy debate over the role of the government has been focused mainly on the level of theoretical discussion without substantial basis on firm empirical evidence and the determinants of fertility. The objective of the paper is to empirically investigate the fertility effect of the female wage, which is understood as one of the most important determinants of fertility in Koreasince 1980 focusing on one aspect of fertility, namely birth spacing. Using the Korean National Fertility Survey conducted in 2006, I estimate a duration model of first and second births taking into account individual heterogeneity, which turned out to be an important factor to control for. Compared with previous studies in the literature on the Korean fertility, the study has an advantage of using the complete pregnancy history of women in a more representative sample. Unlike the previous studies, the analysis also deals with the endogeneity of marriage by treating a certain age, rather than age at marriage, as the time in which a woman becomes exposed to the risk of pregnancy. The study shares the common problem in the literature on birth spacing of lacking relevant wage information for respondents in a retrospective survey. I estimate the wage series as a function of the basic characteristics using the annual Wage Structure Survey from 1980 to 2005, which is considered as a nationally representative sample for wage information of employees. The results suggest that the increase in female wage by 10 percent leads to a decrease in second birth hazard by 0.56~0.92 percentage points and that the increase in spouse's wage by the equal amount is accompanied by the increase in second birth hazard by 0.36~1.13 percentage points. These estimates are more precisely estimated and of smaller magnitude than those presented by the previous studies. The results are robust to the different specifications of the wage equation. The simulation analysis based on the predicted values shows that about 17% of the change in the second birth hazard over the period 1980 to 2005 was due to the change in the female wage. Although there is some limitation in data, the results can be viewed as one estimate of the role of female wage on the recent fertility decline in Korea. The question raised by the paper is not a normative one of whether a government should promote childbearing but a positive one thatexplains fertility decline. Therefore, if there is a wide consensus on promoting childbearing, the finding suggests that the policies designed to reduce the opportunity cost of women in the labor market would be effective. The recent movement of implementing a wide range of family-friendly policies including child care support, maternity leave, parental leave and tax benefit in developed countries should be understood in this context.

  • PDF

A study on the Logical Reclassification of Parcel Service Tariffs (택배요금기준의 합리적 재설정에 관한 연구)

  • Cho, Yoon-Sung;Lee, Tae-Hwee
    • Journal of Distribution Science
    • /
    • v.10 no.5
    • /
    • pp.45-55
    • /
    • 2012
  • In Korea, the parcel delivery service was launched officially in 1992, and the market has grown to 13.2 billion units, or 3.5 trillion won, as of 2011. The service companies accept small packages under 30 kg and deliver them on the next day in most domestic areas. This service plays an important role in business and personal activities. The parcel service companies have themselves designed the tariff for the delivery service based on two criteria: weight and the sum of three side lengths. Further, the tariff is graded in steps of three or four rate structures based on size (small, medium, large, and extra-small). However, the basic freight rate is generally decided according to the cargo's weight or measurement size, and an extra rate is added according to some factors (handling, stowability, liability, and so on). The parcel service tariff adopted by the companies is illogically designed, and this study was carried out to assess the need for redesigning the tariff structure. The cargo volume cannot be logically reflected by three side lengths. For example, two parcels measuring 160 cm based on three side lengths may have different volumes, one measuring 0.152 cbm (53.33 cm × 53.33 cm × 53.34 cm) and the other 0.05 cbm (100 cm × 50 cm × 10 cm). A small package of less than120 cm (sum of three side lengths) may have a volume of as much as 0.064 cbm (40 cm × 40 cm × 40 cm). Sample comparison showed that 17% of medium-size parcels (based on the sum of three side lengths) are small-volume packages, 24% of large-size parcels are small- or medium-volume packages, and 40% of extra-big-size parcels are big- or under-size packages. Therefore, if parcel service companies rate their services for volume cargo based on the three side lengths standard, users may have to pay higher than normal rates, particularly because a large percentage of parcels are volume cargo. According to this study, the average weight per 1 cbm is less than 300 kg. Therefore, users face an increasing risk of paying higher than logical freight charges. Generally, transportation companies are called "public interest enterprises," and parcel service companies operate as postal services. Public interest enterprises must provide the delivery service to all customers without discrimination at a reasonable service level and logical service charges. Therefore, parcels service tariffs must be designed and adopted logically. In this study, freight theories and prior research findings were used to consider the importance of freight rates, and distortion of parcel service rates based on the three side lengths system was verified through regression analysis of a parcel sample and sample comparison. In conclusion, volume sizes based on three side lengths have a higher correlation to the rate level than does the sum of three side lengths. Further, compared to the sum of three side lengths, volume size has a higher correlation to cargo weight, which is the most basic factor determining transportation cost. Therefore, the existing parcel service tariff should be changed to weight- and volume-based rates, and the tariff must be graded in steps of 8 to 10 higher rate structures for a logical freight schedule based on service cost.

  • PDF

The Influence of the Restrictions in Chinese economic growth on Korean commercial environment (중국 경제성장의 제약요인이 한국 통상환경에 미치는 영향)

  • Shong, Il-Ho;Lee, Gye-Young
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.457-479
    • /
    • 2013
  • Through a Chinese rise, Chinese dream is actualizing as the world's great power. According to outlook of World Bank and IMF, Around 2030 China will be a great power bigger than America's economic power. The rise of China will give a huge impact to the whole world. China expands her influence through a global manufacturing base and a global market. To actualize 'Peaceful Rise' Strategy, China has many constraints. Chinese society is facing many difficult social problem due to side effects of a rapid development. Such as the spread of corruption, the severity of wealth gap, environmental degradation and energy shortage. Internationally there are containment from hegemon so-called 'China threat' dispute, Taiwan issue and territorial disputes. Western countries are hostile to China for two reasons. Based on expectations, one is China's socialist system and the other is the rising China which will compete for supremacy with Europe and America. Recent emergence of Chinese nationalism and the containment of the neighboring countries are also serious limiting factors. Domestically they have the rampant corruption in the bureaucracy, weakened capacity of Communist rule, wealth disparity due to the discriminatory economic development strategy, seriousness of rural problem, social instability, lack of social security systems and the development gap between the eastern coastal areas and western inland areas, ethnic minorities problems, the constraint of sustainable development issues due to lack of resources, environmental pollution and energy constraints. Like the former Soviet Union, China may face a dismantlement. After the rise, China may encounter possibilities of a war between great powers or a collapse of Chinese society caused by deepening internal conflict. Serious economic polarization would make peasants and urban workers, who are social vulnerable people, to turn their back to communist party and threaten the justification and the appropriateness of the ruling communist party. Chinese government will think internal system security threat is more formidable risk factor than a system security threat from the hegemon. The decline of great country comes from internal reasons rather than external reasons. To achieve peaceful rise, unification with Taiwan is an essential prerequisite. Taiwan issues are complex problems which equipped with international and domestic factors. Lack of energy resources, environmental pollution in China will bring economic crisis to Korean enterprises. Important influence to Korean economy will be a changeover of the method in economic development. It will turn the balance of investment and consumption, GDP-centered growth to consumption and environment-centered growth. Services industries including finance, environment, culture, education, health care and social welfare will grow. Change in China's growth model will give a great challenge upon the intermediate goods industry in Korea. Korea should reduce the portion of machinery, automotive, semiconductor, steel and chemical-centered export industry to China, and should increase the proportion of the service industry.

  • PDF

Design and Analysis of Online Advertising Expenditure Model based on Coupon Download (쿠폰 다운로드를 기준으로 하는 온라인 광고비 모델의 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.1-19
    • /
    • 2010
  • In offline environment, unlike traditional advertising model through TV, newspaper, and radio, online advertising model draws instantaneous responses from potential consumers and it is convenient to assess. This kind of characteristics of Internet advertising model has driven the growth of advertising model among various Internet business models. There are, conventionally classified, CPM (Cost Per Mile), CPC (Cost Per Click), and CPS (Cost Per Sales) models as Internet advertising expenditure model. These can be examined in manners regarding risks that stakeholders should stand and degree of responsibility. CPM model that is based on number of advertisement exposure is mechanically exposed to users but not actually recognized by users resulting in risk of wasted expenditure by advertisers without any advertising effect. While on aspect of media, CPS model that is based on conversion action is the most risky model because of the conversion action such as product purchase is determined by capability of advertisers not that of media. In this regard, while there are issue of CPM and CPS models disadvantageously affecting only one side of Internet advertising business model value network, CPC model has been evaluated as reasonable both to advertisers and media, and occupied the largest segment of Internet advertising market. However, CPC model also can cause fraudulent behavior such as click fraud because of the competition or dishonest amount of advertising expenditure. On the user aspect, unintentionally accessed advertisements can lead to more inappropriate expenditure from advertisers. In this paper, we suggest "CPCD"(Cost Per Coupon Download) model. This goes beyond simple clicking of advertisements and advertising expenditure is exerted when users download a coupon from advertisers, which is a concept in between CPC and CPS models. To achieve the purpose, we describe the scenario of advertiser perspective, processes, participants and their benefits of CPCD model. Especially, we suggest the new value in online coupon; "possibility of storage" and "complement for delivery to the target group". We also analyze the working condition for advertiser by a comparison of CPC and CPCD models through advertising expenditure simulation. The result of simulation implies that the CPCD model suits more properly to advertisers with medium-low price products rather than that of high priced goods. This denotes that since most of advertisers in CPC model are dealing with medium-low priced products, the result is very interesting. At last, we contemplate applicability of CPCD model in ubiquitous environment.

Impact of Corporate Entrepreneurship, Human Resource Innovation on the Firms' Innovation Activities and Nonfinancial Performance: A Exploratory Research of KOSDAQ Companies (사내기업가정신, 인적자원혁신성이 기업혁신활동과 비재무적 성과에 미치는 영향에 관한 탐색적 연구)

  • Hwangbo, Yun;Bae, Kun Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.4
    • /
    • pp.1-14
    • /
    • 2017
  • New business management methods different from the past are necessary because of the rapid changes of the corporates' environment. KOSDAQ(Korean Securities Dealers Automated Quotation) companies should be expected the more affirmative business performance of companies by listing, but it is a well-known that they have problems of low business performance mostly. This paper aims to investigate the influential factors on enhancing corporate innovation and nonfinantial business performance, and to clarify practical measures and present a solution of KOSDAQ companies' problems through analysis of previous researches and an empirical research. This research present corporate entrepreneurship and human resources innovation as impact factors on the business performance to apply finely the path of technological innovation for the solution of the relevance investigation limit between the complexity of corporates' innovation paths and the firms' performance. And also knowledge management activities and external networks management or the firms have been adopted as a corporate innovation activities for free from quantitative measures, such as conventional research and development(R&D) activities by considering recent corporates' knowledge business operations. The results of the empirical analysis shows that significant impact factors on corporate innovation activities are the firms' propensities of competitive advantage initiative, risk taking and chief executive officer's innovation. These can be interpreted that the CEOs' innovation propensity should be enhanced for stimulating corporate's innovaton activities, which include the CEOs' interest in the development of new technology, the exploiting new businesses and their support of the innovation discipline for employees. In addition, it can be said that it is necessary to intensify more initiatives within those enterprise for enhancing the competitive advantage in the identical industry. The significant impact factors of corporate entrepreneurship and human resource innovation on the non-financial performance are resulted as the propensities of firms' competitive advantage initiative, CEOs' innovation and employees' innovaton. This shows that the higher propensities of firms' competitive advantage initiative, CEOs' innovation and employees' innovaton, the higher the cognitive degrees of business performance within each corporate, which include the members' awareness about firms' sales growth, market share growth, profit ratio growth, customers' preference and corporates' awareness.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF