• Title/Summary/Keyword: Police Force

Search Result 98, Processing Time 0.025 seconds

Prevention of Terrorism Threat and Role of Security Intelligence in New Terrorism (테러리즘 위협 예방과 경호정보의 역할)

  • Baek, Jong Kap;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.43-71
    • /
    • 2005
  • Terrorism is the use of violence, especially murder and bombing, in order to achieve political aim or to force a government to do something. Nowadays, instrument of mass destruction are smaller, cheaper, and more readily available. Cellular phones were used as timers in the attacks in Madrid last March. Hijacking an airplane is relatively inexpensive. Finally, the information revolution provides inexpensive means of communication and organization that allow groups once restricted to local and national police jurisdictions to become global. Al Qaeda is said to have established a network in fifty or more countries. These technological and ideological trends increased both the lethality and the difficulty of managing terrorism. Because of the unprecedented scale of Al Qaeda's attacks, the focus is properly on Islamic extremists. But it would be a mistake to limit our concern solely to Islamic terrorists, for that would ignore the way that technology is putting into the hands of deviant groups and individuals' destructive capabilities that were once limited primarily to governments and armies.

  • PDF

On Methods for Activating Third Party Policing for Enhancing Citizen Participation in Policing (적극적 시민참여활동을 위한 Third Party Policing의 도입방안)

  • Kim, Dong-Bok;Kim, Sung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.309-317
    • /
    • 2010
  • A participating civilian in the policing is become very important issue and strongly encouraged since variety and intelligent crimes have occurred. Moreover, necessity of invigorates of Problem-Oriented Policing has been emphasized in Korea because the effects of the Problem-Oriented Policing in the Case-Oriented Policing had been proved. Lastly, practical use of the Third Party Policing (TPP) is a main purpose to deal with spreading of the Gated community, which controls the outside. To utilizing the Third Party Policing in Korea, several solutions are suggested such as making the manual of operation process, organizing task force team for TPP (the Third Party Policing), changing the sense of civilian and police organization and realistic way to motivating.

Differential Game Theoretic Approach for Distributed Dynamic Cooperative Power Control in Cognitive Radio Ad Hoc Networks

  • Zhang, Long;Huang, Wei;Wu, Qiwu;Cao, Wenjing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3810-3830
    • /
    • 2015
  • In this paper, we investigate the differential game theoretic approach for distributed dynamic cooperative power control in cognitive radio ad hoc networks (CRANETs). First, a payoff function is defined by taking into consideration the tradeoff between the stock of accumulated power interference to the primary networks and the dynamic regulation of the transmit power of secondary users (SUs). Specifically, the payoff function not only reflects the tradeoff between the requirement for quickly finding the stable available spectrum opportunities and the need for better channel conditions, but also reveals the impact of the differentiated types of data traffic on the demand of transmission quality. Then the dynamic power control problem is modeled as a differential game model. Moreover, we convert the differential game model into a dynamic programming problem to obtain a set of optimal strategies of SUs under the condition of the grand coalition. A distributed dynamic cooperative power control algorithm is developed to dynamically adjust the transmit power of SUs under grand coalition. Finally, numerical results are presented to demonstrate the effectiveness of the proposed algorithm for efficient power control in CRANETs.

Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review

  • Kun Hwang;Chan Yong Park
    • Journal of Trauma and Injury
    • /
    • v.37 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. The mean velocity of a stabbing motion has been reported to range from 5 to 10 m/sec, with knife motions occurring between 0.62 and 1.07 seconds. This speed appears to surpass the defensive capabilities of unarmed, ordinarily trained law enforcement officers. Therefore, it is advisable to maintain a minimum distance of more than an arm's length from an individual visibly armed with a knife. In training for knife defense, particularly in preparation for close-quarter knife attacks, this timing should be kept in mind. Self-inflicted stab wounds exhibited a higher proportion of wounds to the neck and abdomen than assault wounds. Injuries from assault wounds presented a higher Injury Severity Score, but more procedures were performed on self-inflicted stab wounds. Wound characteristics are not different between nonsuicidal self-injury and suicidal self-wrist cutting injuries. Consequently, trauma surgeons cannot determine a patient's suicidal intent based solely on the characteristics of the wound. In Korea, percent of usage of lethal weapon is increasing. In violence as well as murders, the most frequently used weapon is knife. In the crimes using knife, 4.8% of victims are killed. Therefore, the provision of prehospital care by an emergency medical technician is crucial.

Development of Rope Winding Device for Safety Fishing Operation of Small Trap Fishing Vessel (소형 통발어선의 안전조업을 위한 로프 권양장치 연구)

  • Kim, Dae-Jin;Jang, Duck-Jong;Park, Ju-Sam
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.1
    • /
    • pp.19-29
    • /
    • 2022
  • The result of a questionnaire survey conducted on fishermen using coastal fish traps shows that fall accidents during trap dropping and pulling constitute the highest proportion of accidents at 42.1 %, whereas slipping accidents on the deck or stricture accidents to the body due to the trap winding device constitute 21.1 % each. In addition, 53.2 % of all surveyed subjects responded that trap pulling is the most dangerous task, followed by fish sorting 33.8 %, and trap dropping 9.1 %. As for the main items requested by fishermen for improving the trap winding device, 36.8 % indicated a method to easily lift the trap from the water to the work deck, and 31.6 % indicated a method to overcome the rope tension and prevent slip when pulling the trap to reduce the accidents. The small trap fishing vessel winding device proposed herein can increase the winding force by strengthening the rope contact area and friction coefficient via an appropriate contact angle between the driving roller of the winding device and the rope. When the contact angles between the driving roller and the rope are 1°, 5°, 9°, 14° and 19°, the rope tension showed a difference according to each contact angle. When the contact angle is 9°, the rope tension is the highest at 392.62 kgf. Based on these experimental results, a prototype winding device is manufactured, and 25 traps are installed on a rope with a total length of 100 m at 4 m intervals in the sea, and then the rope tension is measured during trap pulling. As a result, the rope tension increases rapidly at the initial stage of trap pulling and shows the highest value of 31.89 kgf, which subsequently decreases significantly. Therefore, it is appropriate to design the winding force of a small trap fishing vessel winding device based on the maximum tension value of the rope specified at the beginning of the trap pulling operation.

A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards (「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구)

  • Noh, Jin Keo;Choi, Kyung Cheol;Lee, Young Ho
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.143-167
    • /
    • 2018
  • According to the Security Services Industry Act security guards are not just workers but security-related service workers complementing the lack of police force and specializing in protecting of national important facilities, industrial facilities and apartment houses. Nevertheless, confusing or mixing the security service workers in "Security Services Industry Act" with the guards in the "Act on the Protection etc. of Temporary Agency Workers" lead to a constant debate about the scope of work of security guards. In the case of security service workers in "Security Services Industry Act" there is a strict limitations on security service worker's qualification such as strict reasons for disqualification, a need to pass training for new workers and qualification training, a need to report to the competent chief police officer if the security guard has placed or unplaced by the security service company. It distinguishes security service workers in "Security Services Industry Act" from the guards in the "Act on the Protection etc. of Temporary Agency Workers" and acknowledges the occupation of security service worker as a professional service worker. Therefore, security service workers in "Security Services Industry Act" shouldn't be obliged to do any other work than security work. If it is required to do other work than security work contract by the "Security Services Industry Act" doesn't apply but need to use a security guard according to "Act on the Protection etc. of Temporary Agency Workers" or hire a security guard on the employment contract. In this way, when security service workers in "Security Services Industry Act" are recognized as professional security related workers, the entire security industry can ultimately develop.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

A Comprehensive Review of the Foreign Literature regarding Protest Crowd Counting (집회시위 참가인원 집계방식에 대한 선행연구 고찰 - 국외연구 분석 중심으로 -)

  • Kim, Hak-kyong
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.9-34
    • /
    • 2019
  • The Korean Police Force is equipped with the dual responsibility to not only protect the constitutional right to protest, but also prevent potential disorder and misconduct might be caused by the abuse of such a right. To this end, the Korean national police employ the crowd counting methodology, termed 'Maximum Figure at Any One Time' with a view to dispatching the proportionate number of police officers to protest scenes for safety management. However, protest organizers rather take advantage of 'Cumulative Figure' methodology, the purpose of which being to publicize the wide recognition of success, noticeably by demonstrating that as many people as possible support for their cause or voice. Hence, different estimates generated by different methods have raised serious political issues in Korean society. Nevertheless, it is found out that there are only three existing academic studies in Korea regarding crowd counting methods, and they are mainly geared towards comparing the two methods, unfortunately without any attempt to analyze the foreign literature in details. Keeping the research gap in mind, the research conducts a comprehensive review of the foreign literature with relation to protest crowd counting methods. Derived from the review and analysis, the counting methods can be broadly categorized into the three models such as: 1) Grid/Density Model, 2) Moving Crowds Model, and 3) Electronic & Non-Image Model. In the end, the research provides brief explanations regarding specific research findings per each model, and further, suggests some policy implications for the development of more accurate crowd counting methodology at protests in Korea.

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

ShcD interacts with TrkB via its PTB and SH2 domains and regulates BDNF-induced MAPK activation

  • You, Yuangang;Li, Weiqi;Gong, Yanhua;Yin, Bin;Qiang, Boqin;Yuan, Jiangang;Peng, Xiaozhong
    • BMB Reports
    • /
    • v.43 no.7
    • /
    • pp.485-490
    • /
    • 2010
  • Neurotrophins regulate many aspects of neuronal function through activation of the high affinity Trk receptors. Shc family proteins are implicated in the coupling of RTK to the Ras/mitogen-activated protein kinase signaling cascade. Here we report that the fourth Shc family member, ShcD, associates with TrkB receptor and regulates BDNF-induced MAPK activation. Yeast two-hybrid assay and Co-IP experiments demonstrate ShcD interacts with TrkB in a kinase-activity-dependent manner. Confocal analysis shows ShcD cololizes well with TrkB in transfected 293T cells. Subsequent mapping experiments and mutational analysis indicate that both PTB and SH2 domains are capable of binding to TrkB and PTB domain binds to TrkB NPQY motif. Furthermore, ShcD is involved in BDNF-induced MAPK activation. In summary, we demonstrate that ShcD is a substrate of TrkB and mediates TrkB downstream signaling pathway.