• Title/Summary/Keyword: Security Activities

Search Result 980, Processing Time 0.028 seconds

Computer-Aided Cognitive Rehabilitation of Stroke Patients in Cognitive Function and Research on the Ability to Their Daily Living

  • Park, Seung-Kyu;Yang, Dae-Jung;Kang, Jeong-Il;Kim, Je-Ho;Jeong, Dong-jin
    • The Journal of Korean Physical Therapy
    • /
    • v.27 no.5
    • /
    • pp.375-380
    • /
    • 2015
  • Purpose: The purpose of this study was to evaluate the impact of differences in computer-aided cognitive rehabilitation aimed at stroke patients on cognitive function and daily life. Methods: The study subjects were Gwangju, Jeonnam including the attention group (group I), memory group (group II), and visual perception group (group III), who were randomly placed in each of a 10 by one problem solving group (group IV). The PSSCogRehab was applied to all subjects who underwent eight weeks once a week after 20 minutes in each group by strengthening mediation 10 minutes 30 minutes total, with a five minute break in the middle. Results: Cognitive function and activities of daily living is security and inter-group differences before intervention, and post-test results in the memory training group II, the intervention group I, III, IV and more on cognitive function and activities of daily living compared to it was effective. Conclusion: The results of computer-aided cognitive rehabilitation measuring cognitive function and ADL in patients with stroke in accordance with the group I, III, and IV group cognitive function and activities of daily living compared to IV showed that it was more effective.

A Study on the Perceived Health Status, Depression and Activities of Daily Living for the Low-income Elderly in Urban Areas (저소득층 노인이 지각한 건강상태와 우울 및 일상생활수행능력 간의 관계)

  • Kim, Myung-Hee
    • Journal of Korean Biological Nursing Science
    • /
    • v.11 no.2
    • /
    • pp.149-156
    • /
    • 2009
  • Purpose: This study was designed to identify the correlation among perceived health, depression and activities of daily living in low-income community dwelling elderly. Methods: The subjects consisted of 254 basic livelihood security person aged over 65, who live in house located in Buk-gu, Daegu city. The data was collected through interview with questionnaire from July 1 to August 20, 2009. Results: The average number of the perceived status in study subjects was 2.37. The average scores of activities of daily living (ADL) were 5.55. There was a significant relationship between perceived health status & ADL (r=.270, p=.01) and between depression & ADL (r=-.163, p=.01). The general characteristics which significantly affected depression was sex (t=-1.986, p=.49), education (F=8.968, p=.000), marital status (F=2.588, p=.037), occupation (t=33.258, p=.000). The general characteristics which significantly affected ADL was occupation (t=-7.677, p=.000). Conclusion: The finding of this study give useful information for constructing an intervention program and care for low-income elderly.

  • PDF

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

A Study on the Security Problems of Smart TV and Consumer's Purchase Intention (스마트TV의 보안 문제와 소비자의 구매의도에 관한 연구)

  • Cho, Sung-Phil;Lee, Gi-Hyouk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.382-393
    • /
    • 2017
  • Smart TV sareequipped with an operating system and combined with internet functionality. They can use various apps and contents, and provide personalized and interactive services. However, the Internet connectivity of smart TVs has several security vulnerabilities that can cause significant personal and social harm. Therefore, it is necessary to develop a smart TV with a higher level of security than is currently available. In this study, we analyze consumers' purchase intention for smart TVs with security reinforcement by applying the UTAUT2 model. The results are as follows. Firstly, it was found that performance expectancy, social influence, facilitating conditions and price value, as important variables under the existing UTAUT2 model, have significant effects on purchase intention. Secondly, effort expectancy did not have a positive impact on purchase intention. Thirdly, there was a moderating effect of gender on social influence. According to the results of this study, social influence has the most powerful effect on the purchase intention of smart TVs with security reinforcement. Therefore, in order to improve the purchase intention of smart TVs, it is necessary to expand the publicity activities designed to promote the necessity and importance of reinforcing the security of smart TVs and make them easier to use.

Policing the police service quality, service satisfaction and life satisfaction relationship (경찰의 치안서비스품질과 서비스만족 및 생활만족의 관계)

  • Ahn, Dong Hyon;Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.71-81
    • /
    • 2014
  • The purpose of this research is to find out the relationship among the quality of service, the satisfaction of service and the satisfaction of life in public security of Police. This research made by Final Judgment based on Seoul Citizens living in Seoul as a focus group, total number of citizens for final analysis is 491. The research consists of 60 questionnaires shows frequency analysis, factor analysis, reliability analysis, multiple regression, path analysis by SPSSWIN 18.0 and reaches the following. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.607. results; First, the quality of service in public security of Police in fluences the satisfaction of service. Second, the quality of service in public security of Police in fluences the satisfaction of life. Third, the satisfaction of service in public security in fluences the satisfaction of life. Fourth, the quality of service in public security of Police in fluences the satisfaction of service in public security and the satisfaction of life directly and indirectly.

A Study on Korean Security association - In comparison with All Japan Security Service Association - (한국경비협회(韓國警備協會)의 활성화(活性化) 방안(方案) -한일경비협회(韓日警備協會)의 비교(比較)를 중심으로-)

  • Choi, Eun-Ha;Kim, Hak-Bu
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.317-336
    • /
    • 2008
  • Thus in order to have a better understanding about the KSA(Korean Security association) and to express opinions on its role and security, this paper introduces and discusses about All Japan Security Service Association(AJSSA), which is the prototype of the KSA. There are several positive aspects to consider the introduction of, when these two associations are compared: the traffic security, a supporting member, ex-high-ranking police executive directors practically run AJSSA. These are to enhance financial ability and to promote better relationship with police. KSA needs to improve such relationship and to diversify activities as well. In addition, not just dismissing their duty by giving them the license, AJSSA provides several educations to revitalize the related people so that they can deal in effective and productive services. In another words, JSA perceives it is indispensable to educate the relevant people in the business. In contrast, it is reality that KSA has not put much emphasis on educations. Concisely, the most prompt issue is it should be more beneficial to its members by strengthening itself. Not simply following the example of foreign cases, but putting diverse efforts, KSA can make it substantial and stabilize future private security market in a long term.

  • PDF

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

King Jeongjo's Jangyongyoung and its Value in Terms of Security (정조대(正朝代) 장용영(壯勇營)의 경호학적 가치)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.131-152
    • /
    • 2011
  • Jangyongyoung was a royal guard in the King Jeongjo Period. The guard was established after the inauguration of King Jeongjo to protect the king and strengthen the royal authority. In terms of security study, it has high value in that it gives insights to the development of security system and its achievements and new role of supporting king's cultural events. Jangyongyoung was a formal guard established to achieve king's political reform. After the King Injo restoration, there sprouted many security guards, including Howicheong, Eoyounggun, and Gemgun. Those were all makeshift systems. But Jangyongyoung grew as a standing and futurist system as it went through some different names, Sukwiso, Jangyongwi, and finally Jangyongyoung. It served to protect the legitimacy of King's succession, to strengthen royal authority, and to bring stability to people's lives. Jangyongyoung had an efficient organization and operation. It also had the characteristics of modern security, integration, professionalism and size. In Jangyongyoung, military training and security were not separate. They protected king from dangers and guarded king's bed, and they trained themselves to deal with unforeseen occurrences. By doing so, they could support king's many activities, including visit to royal tombs, touring of Hwaseong Fortress, and watching military training. Jangyongyoung not only served as a military guard but also it had a cultural function. They made it possible that king and people met in the king's procession. Jangyongyoung supported Jeongjo's political reform, and as a royal guard it enhanced the authority of royal family and exemplified a new security guard by supporting king's cultural events where king, servants and people could become one.

  • PDF

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF