• Title/Summary/Keyword: Private Security activity

Search Result 52, Processing Time 0.019 seconds

A Study on Privatization of Traffic Policing (교통경찰업무의 민영화에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.265-283
    • /
    • 2008
  • Modern society often faces 3Cs:change, competition, and customer. The main issue of today's police science study, therefore, circles around how public police effectively cope with the radically changed environment. As one of the workable and appealing policy tools to reform the police, the privatization has been not only strongly supported in terms of a theoretical study, but also widely used in practice all over the world. However, Policing has been widely regarded as an exclusively public-sector activity conducted by sworn officer, but a large and increasing share of the aggregate demand for public safety and security is being handled by the private sector. This study examines on the very practical one, how contracting out, most widely used as the privatization alternatives, is perceived and put into practiced in the field of traffic police services. This study is intended to examine recent shifts toward privatization of traffic policing. Although some people regard police services as inappropriate for privatization, most everyone else have persuasively considered that many police services are not public goods or, at least, not pure public goods. We can consider that there are three types of privatization with respect to traffic policing, that is, user-financed police services, contracting out, and some degree of service shedding. As society changes, so must traffic policing. And it is needed to enhance the ability of traffic police and private to accomplish their primary mission, to serve and protect the public.

  • PDF

The Problems and Improvement Measures of Protection for Politician (정치인 경호제도의 문제점 및 개선방안)

  • Jo, Sung-Gu;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.169-196
    • /
    • 2010
  • Although more priority is given to politicians from the aspect that they represent people and decide the future of country, the current situation is that politicians are not free from terrorism because of insufficient guard-concerned law, negative social recognition and increased crime and terrorism. The measure for politician terrorism shall be handled from the aspect of national security rather than public peace. For the purpose, basic legal foundation shall be prepared and specialized guard technique considering specialty of politician shall be established. Basic solution shall be established by reinforcing law against politician terrorism and establishing new law from the national viewpoint. The guard for politician has two faces that both of safety of guard target and voting intention of voter shall be met at the same time. Although special guard technique is required for guarding politician, current situation is that it is not researched professionally. In relation to the measure to develop the system of protection for politician, First, the study suggested legal foundation for politician guard. Although the 17th National Assembly proposed revised legal plan to protect politician from terrorism, it is suspended, expired and abolished now. The legal plan presented by members of the National Assembly was simply restricted to the scope of public guard. The study divided establishment of legal foundation into two things. The first one is the dispatch type of effective public guard and the second one is the transfer to private guard. Second, the study suggested environmental development method of politician guard. in the environment of politician guard, the study suggested improvement and development method by analyzing social recognition, politician's mind and voter's mind psychologically. After the beginning of human society, if human race is continued, political activity won't disappear. It is obvious that the safety of political leader is very important issue for human race because he plays the role to decide the future of human. In the future, more specialized, effective law shall be prepared and deeper study of scholar shall be performed.

  • PDF

Comparative Analysis of the Poverty-Mitigating Effects Originated from Transfer Income Systems among Single-Elderly-Households (이전소득의 독거노인가구 빈곤경감 효과 비교)

  • Kim, Sooyoung;Lee, Kanghoon
    • 한국노년학
    • /
    • v.29 no.4
    • /
    • pp.1559-1575
    • /
    • 2009
  • As the basic old-age pension system was enforced in 2008, the base for old-age income security was founded. However, due to the basic old-age pension played a minor role as assistant allowance, it did not reach to sufficient level to cover full income security system. It is estimated that the dependency on private transfer income among the elderly who are difficult to be economically independent is still high. Therefore the poverty rate of the elderly households, who are not economically active or who are not protected by old-age income security system, is more likely to be higher than that of non-elderly households. Based on the assumption that public transfer income system should become a central means of old-age life guarantee, this study examined the poverty mitigation effects among the elderly households by comparing the private transfer income and the public transfer income. For this purpose, we selected single-elderly-households who have been considered the most vulnerable to poverty. We used 2006- 2008 Household Income and Expenditure Survey dataset that contained single-elderly who were older than 65 years old. To understand the conditions of poverty among single-elderly-households and the degree of poverty-reducing effect originated from income transfer system, we compared the poverty rates of total households and the whole elderly households. Next, we analysed the poverty of the single-elderly-households by social demographic factors such as gender, age, and economic activity. Our major findings are as follows: First, the poverty rate of the whole elderly households were not reduced, even though the basic old-age pension and long-term care management system were enforced in 2008. Second, half of the elderly households including single-elderly-households belonged to the absolute poverty line. Relatively higher level of poverty among the single-elderly-households was found especially those who were female, unemployed, low-educated, older, and rural single-elderly-households. Third, the effect of the public transfer income on mitigating the single-elderly-households poverty showed a little progress. However, even greater poverty reducing effect was found by the private transfer income system. Fourth, in a group of the public transfer systems, the public assistance such as supporting living costs contributed more to reduce poverty of the elderly population than the public pension system did.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

U.S. Commercial Remote Sensing Regulatory Reform Policy (미국의 상업적 원격탐사활동에 대한 규제개혁 정책)

  • Kwon, Heeseok;Lee, Jinho;Lee, Eunjung
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.241-250
    • /
    • 2019
  • The current U.S. remote sensing act was made in 1992 and has been criticized for being outdated and inappropriate in view of the modern technological development. In order to enhance the American competitiveness and leadership in the world, President Trump announced Space Policy Directive (SPD) - 2 on May 24, which is designed to modernize the regulations related to commercial space activities including private remote sensing system operations. It should be noted that the regulatory reform efforts are made within broader terms of the National Security Strategy on Dec. 17, 2017, pursuing the enhancement of national security and economic prosperity as well. A legislative support in Congress has also been added to the Administration's efforts. The proposed regulatory reform on the licensing of commercial remote sensing system operations outlines the features of lessening administrative burden on applicants by simplifying the overall application process and of limiting the operations only when there is an impact upon the national security with clear and convincing evidence. But, due to a different regulatory system of each country, such a movement to expand an individual's freedom to explore and utilize outer space may result in an international dispute or a violation of international obligations, so there should be a merit in paying attention to the U.S. commercial remote sensing regulatory reform, and it is desirable to establish international norms as flexible and appropriate to the level of space technology and space industry.

Improvement Measures for Enhancing Professional Safety Sheriff's Specialty (안전보안관 전문성 제고를 위한 개선방안)

  • Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.175-196
    • /
    • 2019
  • The purpose of this study is to examine the role of safety sheriffs and their necessity in order to improve the activation of safety sheriff's professionalism. Seven security sheriffs were finally selected to discuss their activities and discuss ways to improve their effectiveness. We conducted semi - structured interviews and conducted in - depth interviews with limited data and inadequate prior research. The results of this study are as follows. First, the government should get the help of citizens, citizens and residents. If the state wishes to reduce the number of safety accidents and bring positive results to the public, it should not rely solely on the utilization of institutions. Second, in order to be a safe sheriff with a positive response from the local residents, the activities of the sheriff's sheriff are not only aimed at preventing risks in the environmental domain and reducing the number of accidents, Publicity should be provided to the landlord, tenant, and residents to inform them that the activity is preventive of accident prevention. Third, under the current law, it is necessary to disclose public facilities such as roads, airports, and harbors to the private sector in order to make it possible to monitor school facilities and youth training facilities. Fourth, the safety sheriff is expected to put forward the expectations and positive results of prevention through the beginning of the inspection activities, and the role of the Korean people in becoming psychological stable and efforts to be born as safety experts are required. Finally, it is necessary to establish a concrete manual, strategic safety inspection plan.

A Study on Small Business Forecasting Models and Indexes (중소기업 경기예측 모형 및 지수에 관한 연구)

  • Yoon, YeoChang;Lee, Sung Duck;Sung, JaeHyun
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.103-114
    • /
    • 2015
  • The role of small and medium enterprises as an economic growth factor has been accentuated; consequently, the need to develop a business forecast model and indexes that accurately examine business situation of small and medium enterprises has increased. Most current business model and indexes concerning small and medium enterprises, released by public and private institutions, are based on Business Survey Index (BSI) and depend on subjective (business model and) indexes; therefore, the business model and indexes lack a capacity to grasp an accurate business situation of these enterprises. The business forecast model and indexes suggested in the study have been newly developed with Principal Component Analysis(PCA) and weight method to accurately measure a business situation based on reference dates addressed by the National Statistical Office(NSO). Empirical studies will be presented to prove that the newly proposed business model and indexes have their basis in statistical theory and their trend that resembles the existing Composite Index.

A Study on Medical-criminal Problem of Withdrawing Life-Sustaining Treatment (치료중단행위에 대한 의료형법적 고찰 -의학적 충고에 반한 퇴원 사례를 중심으로-)

  • Cho, In-Ho
    • The Korean Society of Law and Medicine
    • /
    • v.9 no.1
    • /
    • pp.319-382
    • /
    • 2008
  • As a withdrawing care's study, the purpose of this study is searching about withdrawing care's acceptance and circumstances through Bora-mae hospital case(chapter 1). Withdrawing life-sustaining treatment has various forms. Though the meaning of euthanasia, death with dignity, natural death, physician assisted suicide are duplicated, the meaning of those are different slightly. Firstly, this study looks about the difference of the those meaning and acceptance range(condition) by withdrawing care's forms(chapter 2). Bora-mae hospital case sentenced guilty about physician who discharged incompetent patient who was after surgery by patient's wife determination. This Bora-mae case that sentenced guilty about discharge against medical advise(DAMA) that is regarded to custom has brought intensive confliction of legal, social, medical aspect, Bora-mae hospital case has many legal problems. First, as to criminal law rule 250(murder), the problem is whether discharge and withdrawing life-sustaining treatment is commission or omission. this study concluded omission(district court: omission, appeal, supreme court: commission). Because legal denounce point of discharge and medical treatment withdrawing is omission that physician who is obligatory on patient to cure. If physician's act is regarded omission, it is necessary to determine whether he has guardian status and obligation. Without guardian status and obligation, omission crime can't exist. This study decided that physician had guardian status and obligation and foundation of guardian status was pre-action or acceptance of emergency patient. Physician's medical treatment duty finished when patient(or patient's guardian) demands discharge. But when patient death is foreseen and other possible treatment does not exist, his duty of life prolonging treatment does not finish. This originate from physician's social responsibility and public status that limits patient's private liberty. This study regarded physician's action as accomplice about whether physician's discharging action is accomplice or the principal offender(district court: the principal offender, appeal, supreme court: accomplice). Though the principal offender needs criminal determination and action, there is no this common determination and functional action control of physician in Bora-mae case(chapter 3). Bora-mae hospital case partly originated from deficiency of legal, institutive system including medical security system shortage, the instruction is 1. medical security system strengthening, 2. hospital ethical committee's activity strengthening, 3. institutionalization of withdrawing life-sustaining treatment, 4. acceptance of pre-decision making system, 5. sufficient persuasion of physician for patient and faithful writing of medical paper, 6. respect for patients' self-determination and rights, 7. consciousness's changing for withdrawing life-sustaining treatment and persistent education about medical ethics(chapter 4). Considering Bora-mae case, medical sector is not the dead ground of a criminal punishment. Intervention of criminal law in medical sector give rise to ill effect, that is, excess medical examination and treatment, safeguard treatment, delay of discharge from a hospital. Because sufficient guarantee of life becomes mere empty slogan under situation that impose a burden of heavy cost to family or hospital, public and systematic solution should be given(chapter 5).

  • PDF

A Study on Issues and Improvements Plan for National Safety Assessment (국가안전대진단의 문제점과 개선방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.334-342
    • /
    • 2018
  • Purpose: The purpose of this study is to examine and improve the issues related to National Safety Inspection currently operation and reform the system for response to various disasters. Method: For the completion, this study established theoretical background using materials related to National Safety Inspection and identified the issues using the open statistical data for National Safety Inspection to suggest the improvement plans. Results: National Safety Inspection has been operating a complete large-scale inspection on risk factors in cooperation with the central government, local governments, and citizens since 2015 to remove various disaster factors neglected in people's daily lives. Operation of National Safety Inspection had positive influence in preventing major disasters. However, inefficient activity is pointed out due to issues related to cooperation with other institutes, limitation for citizen's positional role, and superficial inspection. Conclution: To solve this issue, this study proposed strengthening of communication activity with disaster institutes, strengthening of efficiency through citizen participation by type, and actualization of checklist used in National Safety Inspection.