• Title/Summary/Keyword: Private Security Personnel

Search Result 68, Processing Time 0.024 seconds

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

The Effects of Security Agents' Job Stresses on Coping Strategy: Focussing on Moderating Effects of Five Personality Factors (시큐리티 요원의 직무스트레스가 대처행동에 미치는 영향 -성격5요인의 조절효과-)

  • Kim, Eui-Young;Lee, Jong-Hwan;Cho, Sung-Jin
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.69-80
    • /
    • 2016
  • The purpose of this study is to examine the effects of job stress factors on Coping Strategy' turnover intention, and to analyze the moderating effects of five personality factors between each job stress factor and turnover intention. To achieve this purpose, this study surveyed users of the Seoul and Gyeonggi in based on cluster sampling method. A total of 262 samples were used for this study, except 18 erroneous samples dropped. For the data process of the questionnaire, each answer content was coded and an element analysis, credibility analysis, frequency analysis, co-relationship analysis and regression analysis were performed using the SPSS version 18.0 of Angel for Windows. Through the data analysis following the research methods above, the conclusion was acquired as follows: First, thejob stress of the security personnel affect coping behavior. Second, in the effects of Security Agents Job Stress on Coping Strategy, Five Personality Factors showed moderating effects.

Private Blockchain and Biometric Authentication-based Chronic Disease Management Telemedicine System for Smart Healthcare (스마트 헬스케어를 위한 프라이빗 블록체인과 생체인증기반의 만성질환관리 원격의료시스템)

  • Young-Ae Han;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2023
  • As the number of people with chronic diseases increases due to an aging society, it is urgent to prevent and manage their diseases. Although biometric authentication methods and Telemedicine Systems have been introduced to solve these problems, it is difficult to solve the security problem of medical information and personal authentication. Since smart healthcare includes personal medical information of subjects, the security of personal information is the most important field. Therefore, in this paper, we tried to propose a Telemedicine System using a smart wearable device ECG in the form of a wristband and face personal authentication in a private blockchain environment. This system targets various medical personnel and patients with chronic diseases in all regions, and uses a private blockchain that can increase data integrity and transparency, ECG and face authentication that are difficult to forge and alter and have high personal identification to provide a system with high security and reliability. composed. Through this, it is intended to contribute to increasing the efficiency of chronic disease management by focusing on disease prevention and health management for patients with chronic diseases at home.

A Study on the Effect of the Security Guard Emotional Disharmony to Job Performance (경비원 감정부조화가 직무성과에 미치는 영향)

  • Kim, Tae-Hyun;Ryu, Seong-Min
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.3
    • /
    • pp.125-142
    • /
    • 2019
  • The study wanted to verify the effect of emotional sub-compression, a negative variable of emotional labor, on job performance, on security personnel working at private security companies, and further to verify how the impact on emotional sub-compression can affect job performance through the first draft of regulation. Empirical analysis through the study model showed that emotional edema was not a significant effect, but a negative effect on job performance, and that it did not affect the control focus itself. This revealed that emotional harmony has been shown to have a negative impact on performance due to the present state and conflicting situations in one's emotions, which means that emotional harmony does not affect negative or positive effects depending on a person's attributes. It also showed that the temperamental control focus on job performance had a positive impact on employees with an improvement focus and had a negative impact on employees with a preventive focus, and that a temperamental control focus between emotional dissonance and job performance had an effect. This indicated that job performance was affected by a temperamental control focus and that employees with an improvement focus had a positive effect and had a positive effect on performance. The implications of the study in this study are that it can have target differentiation in the areas where the study was conducted on guard workers, a social issue related to the study of emotional labor, and it can be meaningful that the study of emotional labor had a control focus and measured both positive and negative tendencies. It is also believed that there will be contributions to the verification of differences in performance resulting from employee propensity and by linking it with a variable called emotional instability. However, the data collected have the limitations of the subject and region, and the emphasis on cross-sectional analysis and the representative of the various emotions to verify the negative effects of emotional labor, and the problem of securing reliability related to the adjustment focus verification are the limitations of the research.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Regulation and Its Tasks of Privately Contracted Armed Security Personnel on Board Ships Against Somali-based Piracy (소말리아 해적행위 대응을 위한 민간무장보안요원 승선의 규제 및 그 과제에 관한 연구)

  • Keum, Jong-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • The increased threat to commercial shipping by Somalia-based pirates has triggered an increased use of PMSC(Private Maritime Security Contractors). The use of PMSC to protect merchant ships against Somali-based piracy threat seems to have been most effective counter-piracy measures. However, there are various legal and practical questions around using PMSC and PCASP(Privately Contracted Armed Security Personnel) on board at sea. This paper aims to study the regulation and its problems of PMSC and PCASP on board to protect merchant ships against Somali-based piracy in the Indian Ocean and Gulf of Aden. In particular, this paper focuses on the legal issues including jurisdictional issues of PCASP on board merchant vessels, use of force by PCASP in self-defense, and authority for using PMSC. Currently, the legal framework relating to use of PMSC and PCASP on board protecting ships from Somali-based piracy is complex, sometimes ambiguous or inconsistent, and currently in a state of flux. Thus, this paper concludes that at this juncture an effort to coordinate this legal framework is necessary, as regards both the interpretation of existing rules related to PCASP on board merchant ships under UNCLOS(United Nations Convention on the Law of the Sea) and the creation of new rules. Also, this paper suggested that there is an urgent need to establish the PMSC-specific laws in Korea.

A Study on the Level of BCMS(Business Continuity Management System) of Small and Medium Enterprises (중소기업의 재해경감활동관리체계 수준진단(Checklist)에 관한 연구)

  • Lee, Mi Sun;Kim, Min Ji;Kim, Do Yeon
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.4
    • /
    • pp.122-128
    • /
    • 2017
  • Recently, accidents such as human accidents are increasing rapidly due to natural disasters and changes in social conditions due to abnormal weather. As a result, damage has been causing massive damage unlike the past. In the case of small and medium enterprises excluding financial institutions and big company, there is no system for prevention and restoration for stable operation from various risks such as human and natural disasters. As the current disaster continues, public and private companies have raised the need for BCM, and with the introduction of the ISO22301 certification system, the company has been establishing and operating Enterprise Disaster Management Standards in the Ministry of Public Safety and Security since 2007. However, in most SMEs, it is hard to bear the input of internal labor and investment cost, and there is a lack of personnel with expertise to conduct BCM diagnosis. Therefore, in this paper, we will study the diagnosis level of enterprise continuity plan which is commonly used in Korea and abroad. Based on this, we will study the BCM system diagnosis method which can be applied to small and medium enterprises in Korea efficiently.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on the NCS based Curriculum for Educating Information Security Manpower (정보보호 산업분야 신규 인력 양성을 위한 NCS 기반 교육과정 설계에 관한 연구)

  • Song, Jeong-Ho;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.537-544
    • /
    • 2016
  • National Competency Standards (NCS) need to be introduced to train newly hired staff and to gradually improve employees' work performance in the information security industry. In particular, the introduction of a new NCS curriculum for new hires is important in order to retain and efficiently manage professionals in the information security field. However, the legacy NCS is not clearly designed for the information security field. So a formal curriculum has been suggested for institutions training the information security workforce. Therefore, this study establishes a competency unit based on the types of personnel, their duties, and required knowledge. To select the competency unit, this study reviewed prior research to understand the required skills and work knowledge, and reviewed recruitment-based NCS that public agencies and public and private companies have carried out, including them in the study. The selected competency unit was classified into a required competency unit and an elective competency unit based on the importance of the duties and the demands of training. Through a verification process for the new, licensed career path model in the NCS information and communications field, this study suggests updated NCS competency units and required courses to provide an appropriate NCS curriculum for newly hired employees in the information security industry.