• Title/Summary/Keyword: Security Activities

Search Result 983, Processing Time 0.028 seconds

A Study of Institutional Restrictions for Private Security's Activities as for Profit Businesses (영리기업으로서 민간경비의 영업활동에 대한 제도적 제약성 고찰)

  • Gong, Baewan
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.3
    • /
    • pp.181-189
    • /
    • 2011
  • Private Security company concentrated on the commerciality as a for-profit businesses. Even so, his role is concerned with public welfare and public security over personal gain. Establishing a company and the business activities are free and protected by the constitutional law and the commercial law such as natural rights. However, it would be restricted in case of need for the national security affairs, public security violation and public weal problems. On the other hand, even though private security law is a for-profit businesses, the natural rights of the text of the Constitution is ignored and distinct from the different apply the rules for the establishment standard and for the business activities. Also, over a certain size of place and capital are required to establish a private security company. Therefore, this paper will study the public interests and the profits of commerciality for the private security by constitutional law and commercial law which assure and conserve the natural rights and the business activities.

Enhancing utilization and ensuring security: Insights to compromise contradicting conditions in new research reactors

  • Alrammah, Ibrahim
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1479-1482
    • /
    • 2021
  • Research reactors are typically well-suited for outreach activities at different levels. However, unplanned seeking to increase the utilization of a research reactor may result in weakening the nuclear security of this facility. Research reactor staff might be in shortage of a functional nuclear security culture; specifically, there might be a conviction that the necessities of research can be given the priority over consistence with security procedural requirements. Research reactors are usually parts of bigger institutes or research labs of different activities. Moreover, the employments of research reactors are usually with the purpose that easy entry to the reactor premises is fundamental. So, they could be co-situated in places with different sorts of activities, mostly under similar security arrangements. The co-area of research reactor offices among different kinds of research labs introduces explicit security issues, the effects of which should be viewed as when building up a nuclear security framework. Notwithstanding potential security vulnerabilities presented in the design, research reactors frequently have devices kept promptly accessible to encourage research and education. The accessibility of these sorts of hardware could be used by an authorized person to commit an unapproved activity or cause harm. This paper aims to present insights to compromise contradicting conditions in new research reactors in which both enhancing utilization and ensuring security are satisfied.

A Study on the Diverse Activities for Coast Guard Services (해양경계활동의 다각화 방안에 관한 연구)

  • Park, Seong-Ryong;Jin, Seong-Ryong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.109-114
    • /
    • 2007
  • The changed environment on marine security and the security activities such as coast guard and sea patrol in civil domain are analyzed. In order to respond diverse threats and requirements of sea petrol, the system of civil patrolman and coast guard's auxiliary are discussed. The civil boats and aircraft and civilian's security activities make an important role to enhance the effectiveness and the efficiency of coast guard and patrol.

  • PDF

Introduction SWING(Seoul Women's University Internet & Security Group) and Research Activities (서울여대 보안 동아리 스윙에 관한 소개와 연구활동)

  • 김미애
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.99-103
    • /
    • 2003
  • Introduction SWING and progress of research activities. Then I will explain about Anti-Virus research concretely. It will deal with Computer Virus infection route, Computer Virus diagnostic methods, exsisting Anti-Virus Engine operation principle, performming research activities and future research course.

  • PDF

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

Empirical Analysis of the Relationship between a Market and Technological Characteristics and Performance of the Activities of Technology Security (시장특성과 기술특성이 기술보호성과에 미치는 영향)

  • Kim, Kyung Sun;Cho, Kuen Tae
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.97-105
    • /
    • 2015
  • Technology Security, especially in knowledge-intensive society, is becoming the most important organizational activity for the long-term success of a firm. However, there is not sufficient empirical research of activities of technology securities and business performance. This is one of the reason why Korean firms are reluctant to invest their resources to the technology security. We have tried to empirically analyze the relationship between a market and technological characteristics, which is one of the important business environmental characteristics and the activities of technology securities of Korean business firm by taking three hypotheses related to this research and investigating 209 Korean firms. According to the statistical research, results of the analyses suggest that the market and technological characteristics have positive impact on the activities of technology securities. Also the activities of technology securities have positive impact on the performance of technology security. More specifically, the results suggest that the relationship between the competitiveness of market and technological excellency and the activities of technology securities is supported statistically. But, the reverse relationship between the easiness of market entrance and the activities of technology securities is supported statistically. Also, there is no moderating effect of firm size between the relationship between a market and technological characteristics and the activities of technology securities. Finally, the relationship between the activities of technology securities and the risk of technology leakage is supported statistically.

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

A Study on Aviation Security System on Airport (국제민간항공협약의 표준과 관행을 고려한 공항보안체계의 문제점고찰)

  • Yoo, Kwang-Eui
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.165-182
    • /
    • 2004
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. It is generally recognized that the three major parties responsible for the aviation security at an airport are appropriate government departments, airport operator and airlines. The airlines are the beneficiaries of security activities as well as the provider of security activities. So, their responsibilities have been critical in protecting civil aviation from unlawful interferences. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. The government has the responsibilities not only for establishing regulatory system but also for oversighting the implementation of aviation security activities. The paper is to review the revision of aviation security regulation and the changes of aviation security responsibilities, and costs and task assignment in Republic of Korea after September 11 event. The responsibilities, tasks and costs assigned to airlines, airport operators and government are introduced and evaluated in terms of economic fairness, effectiveness and efficiency of aviation security activities. The drawbacks of new legal system are pointed out and the suggestions to remedy them are proposed as conclusions.

  • PDF

Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities (보안 인지 및 실천 현황 분석을 통한 대학 연구정보보안 수준 제고 방안)

  • Park, Il-Hyung;Kim, Seong-Woo;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.91-108
    • /
    • 2010
  • Universities are one of leading R&D institutes, however, their scarce security investment allows research information to leak outside. This paper proposes methods for improving security level of academic institutes to protect research information by analyzing security awareness and activities. To do that, we verified the current status of information security and awareness level by analyzing the survey which was conducted for a member of Seoul National University. As a result of statistical analysis using correlation, analysis of variance, multi regression and so on, we concluded that it is essential to improve security awareness, activities, professor's security level and management process for research labs. Thus, we suggest the following methods, security awareness and knowledge development through education, security management for research labs through provision, introduction of data protection softwares and physical control of visitors which are to be adopted to improve security level.

A Study on New High-Technology Protection System Model Using The Social Engineering Techniques (사회공학 가법을 이용한 새로운 첨단기술보호시스템 모텔에 관한연구)

  • Park, Ji-Hyung
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.3-11
    • /
    • 2011
  • Today the protection of high-tech is one of the most important requirements to survive in competition between companies or countries. In these circumstances, government's industrial security activities have been transformed into independent activities of the private center. So, Company has introduced a high-tech security system for the sake of Technology protect. But, Several Security Incident have occurred in recent years, and so New security measures became necessary. In this study, I will suggest a new high-technology protection system model Using the social engineering techniques to analyze security threats.