The objective of this study is to generally check the present situation of private security industry by analyzing the current situation of private security industry in Korea so as to find which policy base is reflected to amend law by analyzing the amendment process of private security law in order to suggest policy direction of private security industry in Korea. Viewing through amendment process of private security law, enhancing publicity and enterprise are not judged to form any definite policy base. They are merely interpreted to partially reflect enterprise under the strong base of publicity. Such policy base may cause overall stagnation of private security industry. For sound development of private security industry, it is required to get out of the existing policy direction so as to change policy base to the direction of enhancing enterprise of private security industry. The power of police for instruction and supervision should be largely transferred to Korea Security Association so as to cultivate autonomous purifying function of private security industry. Police should strive to develop policy in the level of joint production of security service.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.7
no.4
/
pp.860-877
/
2013
Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.
Private security will be of great importance in the coming 21st century. In the future, most of the crimes will be violent and frequent. In order to prevent crimes private security must be dealt with in public service area and private area. For this reason, nowadays studies on private security is going on actively. But in reality, serious studies on theoretical backgrounds of private security has not been made yet. Currently, almost all of the theories propose various grounds, such as administrative, economic, and social grounds. And they are based on five backgrounds, that is, profit-oriented enterprise theory, economic reduction theory, vacuum theory, interest group theory, and private management theory. The article furnishes several grounds in addition to these. They are local self-government, management of local self-government, and task-force of guard enterprise. In this article, I am going to present some perspectives in classifying the theories. They are administrative, economic, and social perspective. They are shown as follows by figure. In conclusion, based on theoretical backgrounds mentioned above, private security will be advanced constantly in the future. But in carrying out studies on private security, approaching method of proposing the developmental model is more important than theoretical approaching method.
Journal of the Economic Geographical Society of Korea
/
v.8
no.2
/
pp.285-299
/
2005
The economic reform in China since 1978 has been increasingly sped up and deepened. The recent development of private enterprises, especially, has significant economic and political implications, whereas its regional differentiation has considerable impacts on both the development potential of certain regions and overall regional growth pattern. This study aims to understand the regional pattern of private enterprise growth as well as the institutional change which has structured the growth process. The development of private enterprises turned out to be closely tied to the marketization strategy of dual-track system and policy needs to reduce the unemployment level in both urban and 겨ral China. The regional pattern of the private enterprise growth can be characterized as ever-increasing spatial differentiation. Based on the basic statistical analysis results, it is argued that the private enterprise growth is closed related with the marketization level of the regional economy. Therefore, the strategy of developing private sector will be more important in shaping the regional development path as well as potential.
The dispute on the object of study in the business management have been carried out since 1912 in Germany, and then it is the situation of "business management" academic world there is no the confirmed object. But P. F. Drucker has prescribed the large enterprise as the object of his study of management, because the large enterprise it the decisive, the representative, and constitutive in modern industrial country. And it is usual that we would consider the large manufacturing enterprise as the object of study. But, in fisheries management, because large fisheries enterprises are almost attached too much to the pelagic fisheries, it is judged that they are not "decisive". And it is judged that they are not "representative", because the large fisheries enterprises can not sufficiently symbolize the managerial characteristic of fisheries industry. The coastal and inshore fisheries which constitute th real part of fishing industry have been operating by private enterprises which are small business in scale, so the large fisheries enterprises could not be considered "constitutive " Therefore, the private fisheries enterprises is "decisive" because it is distributed in all most fisheries management, "representative" because it is exceedingly symbolize the managerial characteristic of fishing industry, and constitutive because it constitute the real part of fisheries industry. From the above-mentioned, it could be concluded that the object of study is regarded the private fisheries enterprise as appropriate as long as it is engaging in producing fisheries product as good and conducts the pursuit of principle of profit maximization. Because the object of study can not include all the thing which has to be observed in order to study, the materialization of the object is actually necessary. And then as aforesaid we intend to realize the materialization through taking the private fisheries enterprise as the object in fisheries management theory. And the materialization does mean a necessary process in choosing the object of analysis, but not the entity itself.choosing the object of analysis, but not the entity itself.
The Journal of Asian Finance, Economics and Business
/
v.9
no.6
/
pp.69-79
/
2022
The purpose of the study is to look into the likelihood of private sector enterprises going bankrupt due to COVID-19 pandemic-related issues. The data for this study was taken from the World Bank's Enterprise Survey, which was intended to assess the impact of the COVID-19 pandemic on the business sector. This study uses the Ordinal Logit Method to analyze the model with dependent variables having ordinal values. The determinants reflect business performance, innovation, business relationships, and government support. According to the estimation results, a lower probability of business closures, illiquidity, and payment delays are found in businesses that maintain sales growth, operating hours, temporary workers, product portfolio, consumer demand, and input supply. Meanwhile, the increase in online business activities and receiving support from financial institutions and the government do not help businesses reduce the risk. Moreover, higher survival is found in manufacturing and developing countries. This implies the fragility of businesses in the retail and service sectors, especially for mega-enterprises in developed countries. In addition, the negative impact of the COVID-19 pandemic on businesses in Europe and West Asia is less severe than in other regions. The results imply policies to support the private sector during the pandemic, such as increasing labor market flexibility or rapidly implementing supportive policies.
While demands on private securities have been increase, expectations on the service quality as compensation for the investment expensive is also rising. However, private security services are in situations of not satisfying various customer's needs owing to insufficient special manpower, capital, and skills in spite of expected high-quality services toward customers. Therefore, this study aims to find out the causality between private security enterprises and relationship characteristics, purchasing behaviors of customers, and then searching for a marketing strategy that can provide best services to the enterprises that are confronting to limitless competitive systems by grasping customer's needs and necessities. For achieving this goal, the study objected to shop employees using private security enterprises after diving Cheonan City of South Chungcheong Province into South, East and East, West, and then collected 236 persons by using the convenience sampling. Regarding to research tools, this study used questionnaire having been recomposed based on previous researches home and abroad, and frequency analysis, reliability analysis, factor analysis, correlation analysis, and regression analysis were carried out data was treated by treatments by using SPSS version 18.0 statistic package for treating the data. Through above research methods and procedures, results could be gotten same as followings. First, correlations between private security enterprise's relationship characteristics and purchasing behaviors showed positive (+) relations, and the latter was increased as much as relationship characteristics were high. Second, as the result of analyzing correlations between private security enterprise's relationship characteristics and purchasing behaviors, reputation, physical features, and communication affected influences to word of mouth activities. Third, reputation and communication affected to repeated purchasing behaviors as the result of analyzing private security's relationship characteristics and repeat purchasing behaviors.
In the initial stage of a national economic development of China, the family business takes enterprise's organizational form ruling position. The private enterprise of China is mainly family business; the family makes the mainly proprietorship in other words. Even in the private enterprise after developing, 70 percents are managed as a family This paper start to study the Transferring Power Patterns in family business using the Company's Life Circle Theory and some other correlative theories. Based on the Transporting Power Model, the paper gives a comprehensive explanation for the choice of transferring power pattern in the family business of China.
This article estimates the scale of impact of expanding governmental fiscal expenditure for R&D investment on the private business enterprise's investment for R&D, and the relationship between business enterprise and university for expanding investment of R&D. According to my results, first, an expanding fiscal expenditure from government for R&D investment leads to increase R&D investment from business enterprise. However, an expanding expenditure from university rather leads to decrease R&D investment from business enterprise. Secondly, the crowding-out effect of expanding R&D investment from University on business enterprise's is very strong, and it is affected by structural changes such as the country's economic power, fiscal stance and cyclical volatility. Third, the more governmental expenditure on university expansive is, the stronger asymmetric relationship between business enterprise and university is, and investment sources of university from business enterprise is the main factor of this relationship. Finally, it is not easy to solve out this asymmetric relationship even through the governmental subsidy.
Purpose: This study aims to overcome the problem of private education market environment which is polarized into commercialized large private education institutions and small and medium sized private education institutions in a poor business environment, and develop systematic performance measurement model applicable for small and medium sized private education institutions. Methods: To develop the BSC which measures financial and non-financial indicator in a balanced manner and introduce the BSC into private education institutions that contain conflicting goals "EDUCATION" and "PROFIT". In particular, Utilizing the methodology of AHP, the priority of strategies and execution assignments are derived. Results: BSC model was developed and introduced by cooperating with executives of the private education institution. Moreover, the study permits to achieve the strategy, enterprise-wide vision and mission by deriving strategy map and applying it to the private education institution. To measure the performance of BSC model instruction, KPI corresponding to the strategic objectives of each perspective was derived. Conclusion: BSC model generally introduces to large-sized companies and public institutions. In this study, BSC model is developed by focusing on small and medium sized private institution. Furthermore, this study is more than simple model development, it makes a connection with achievement of strategic objectives, enterprise-wide vision and mission through strategy map and strategy execution method. Through the developed BSC model and strategy execution method, utilization plan in practice and customized model for private education institutions coexisting profit and non-profit objectives were developed, and academic implications were presented.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.