• Title/Summary/Keyword: Public Functions of Private Security

Search Result 20, Processing Time 0.023 seconds

Police Officers' Perception Concerning the Roles of Private Security (민간경비의 역할에 대한 경찰관의 인식연구)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.101-118
    • /
    • 2009
  • Despite large increases in the growth of the private security industry in the last few decades, very little empirically based information has been collected on the roles of private security within current Korean literature. Attempting to address this gap, this study examined perceptions of the roles of private security by surveying 212 police officers. In order to measure the strength of police officers' perception, not only quantitative but also qualitative methods were adopted. Overall, results of the study indicate that police officers considered private security as an adjunct to the police. However, they also believed that private security industry would grow to get square with the police in the near future. Concerning the specific roles of private security, police officers rated the roles of loss prevention and protection more highly than those of crime prevention and order maintenance. This result reveals that police officers thought private security had focused more on the roles related to the pursuit of profits than on the roles tied to its public functions.

  • PDF

Measures to Enhance Emergency Management Capacity of Private Security Industry

  • Park, Dong-Kyun;Kim, Do-Kyuo
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.27-32
    • /
    • 2009
  • The private security will overcome the limit of public police system and implement a small and efficient government concept. Especially in recent years, this security system has naturally been expanded in its functions from crime prevention to prevention of disasters. To manage the emergency by the private security industry, the private security services to involve some peculiarity and specialty. The policy agenda of private security industry for crisis management are suggested. First of all, to provide quality services for emergency management, the guards from private organizations should receive professional education and training to secure the specialty. Second, we need to improve the quality of security instructors with intensive education system for them. Security instructors should be able to effectively handle lots of different matters in the fields of security, but examination of the current curriculum of education for security instructor indicates that there is not much chance of it. Third, must be natural in light that the private organizations have some limitations in their operational capabilities and scopes. Private security duties are well established in cooperation with related institutions such as the police. Lastly, development of high quality crisis management commodities in the private security becomes even more significant. The government should be determined to make an effort to grow the private industry and foster a political environment for the same purpose.

Necessity and Task of Qualification System in Protection Specialist Guard (신변보호사 자격제도의 필요성과 과제)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.25-33
    • /
    • 2011
  • Quantitative rise and qualitative seriousness in crime have limitation to preventing crime just with public police security. Ultimately, in order for private security guard to fulfill the duty of preventing crime, its members' excellent quality and ability need to be preceded. This change in the environment of crime prevention came to demand professionalism in the security field. Furthermore, it became an opportunity of being emerged the necessity of specialist qualification. For this, first, there is a need of reinforcing the public confidence of the security guard association, and of vitalizing a certificate of qualification. Second, qualification functions as linking education and labor market. Thus, many qualification acquisitors need to strengthen direction that the security guard company can reflect and utilize this. Third, there is a need of positively supplementing the result of utilizing qualification or the insufficient management system so that the private security guard qualification system can be recognized as the qualification system of being authorized by the country.

A Study on the Prevention of Smartcard Forgery and Alteration Using Angular Multiplexing and Private Key Multiplexing based on Optical Encryption (영상 암호화 기반에서의 각다중화 및 암호키 다중화 기법을 이용한 스마트카드 위 .변조 방지에 관한 연구)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.63-69
    • /
    • 2001
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This paper proposes a method to prevent card forgery and alteration using angular multiplexing and private key multiplexing method on optical encryption, and proposed a Public Key Infrastructure(PKI)-based authentication system combined with One-Time Password (OTP) for verification of forgery and alteration .

A Study on the controversial Issues of the Private Investigator System (공인탐정제도 도입에 따른 주요 쟁점 논의)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.254-261
    • /
    • 2023
  • Purpose: With the diversification of modern society, it is difficult to predict crime types, and the limitations of the state's functions, such as human limitations and lack of budget, are increasing. Method: However, as the number of private investigation companies that do not use illegal means to solve the request increased, attempts were made to introduce a public detective system that would manage and supervise it and compensate for the gap in public power. Result: However, due to the nature of the Private Investigator system, legislation has not progressed as the National Police Agency and the Ministry of Justice are at odds with existing laws that guarantee existing jobs such as lawyers and credit research. Conclusion: Therefore, this study analyzes the bills related to the authorized detective to the National Assembly, examines major issues such as the scope of work of the authorized detective business, the selection of management and supervisory authorities, and suggests ways to improve the successful settlement of the Private Investigator system.

A Study on the Privatization of the Function Security to Improve Efficiency in Function of the Police (경찰기능의 효율성 제고를 위한 경비기능의 민영화 방안)

  • Han, Heung-Tai
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.306-335
    • /
    • 2000
  • The desires for safety of body and life can be said to be fundamental and natural in human beings. But the rapid industrialization and urbanization phenomena in our modern society is accelerating the treand for increasing diverse social pathology. Rise of serious crimes such as robbery and rape has already become an especially serious social problem and is at the point of threatening our welfare and social order. But the police, which is primarily responsible for the maintenance of welfare and social order of the public, is unable to respond actively to the increasing demand for policing due to the lack of available manpower and overwork. Thus, the purpose of this thesis is to look for a plan to actively respond to the daily increasing outcry for law and order so that the public may maintain safe and happy lifestyles without the threat of crime. One concrete and practical strategy is to resolutely separate and transfer some of the many functions of the police that can be handled by citizen organizations to those groups so that the police can be relied upon to become functionally efficient. This will decrease the work of the police, thereby allowing the police to concentrate on its inherent responsibilities. As its primary example, 'transferring the function of security' of the police to the private security industry is suggested in this thesis.

  • PDF

Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security (S/W 개발 보안의 필요성에 따른 법 제도 및 규정 사례 분석)

  • Shin, Seong-Yoon;Jeong, Kil-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.117-124
    • /
    • 2014
  • Software Development Security is defined as a sequential procedure such as deleting potential security vulnerability for secure software development, designing or implementing various functions with considering security, and so on. In this paper, we research on domestic or international hacking cases that could damage us mentally or financially. Seventy five percent of Web-site attacks abuses weak points of application programs, or software. We also research on major issues related to software development security with these demerits. And then, we propose public and private laws, regulations, or systems and give some examples with detailed descriptions.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

A Study on the Efficient Countermeasures of Military in Accordance with Changing Security Environments (4차 산업혁명에 따른 군사보안 발전방안 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.47-59
    • /
    • 2020
  • The Army, which is dreaming of a military leap forward through the fourth industrial revolution, needs to also consider the side effects and adverse functions of the fourth industrial revolution. In particular, this study conducted an analysis of whether it was consistent with the global technological trend of normal 'military security'. This paper focuses on the countermeasures that could result from 4th industrial revolution by utilizing the text-mining technique and social network technique of big data. 1. Active promotion of a convergence program with private, public, militaryand industrial, academic, and solidarity, 2. Information Sharing for International Cooperation and Cooperation in Cyber security, 3. Military Innovation and Military Unsymmetric Cyber security innovation, 4.The Establishment of Military Security Convergence Interface Management System in accordance with the Fourth Industrial Revolution, 5. Cooperation in the transition from technology engineering to social technology, 6. Establishing a military security governance system in the military, 7. Specifying confidential military digital data We look forward to providing useful information so that the results of this study can help develop the military and enhance military confidentiality.

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.