• Title/Summary/Keyword: Security Activities

Search Result 973, Processing Time 0.027 seconds

Study on the effect of fear of crime on the selection of private security (범죄에 대한 두려움이 민간경비 선택에 미치는 영향에 관한 연구)

  • Kim, Sang-Woon;Shin, Jae-Hun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.33-63
    • /
    • 2012
  • Humans are influenced by economic factors, physical environment factors, social and environmental factors, influenced by the media. In particular, the occurrence of the crime for fear of crime due to the human activities of the area has reduced. Fear of crime inflienced by direct victim of a crime, disorder of the surrounding environment, and indirect victims of crime. Therefore, in order to reduce their fears about crime in the private security through crime prevention and. About the factors affecting their fears about crime in the actual selection of the private security and private security activities in order to solve these problems through crime prevention, through this study will be described. In this study, we randomly select the survey was in August 2011, as detached house in Seoul and Daegu. As a result, the fear of crime fears about crime were influenced directly or indirectly by factors of private security selection.

  • PDF

South Korea and EU Practices for Maritime Transport and Port Security: A comparative Study on Attitude to respond (한-EU 해상운송보안 제도 대응전략 비교연구)

  • KIM, Si-Hyun;SHIN, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.23-42
    • /
    • 2015
  • According to the increasing attention to safety and security in maritime shipping, there are diverse security systems in international logistics activities. Although prior studies on maritime transport and port security reviewed security policy and practices in order to provide useful insights for strategic agenda, a few focused on attitude to respond it. Moreover, there are no prior study on a comparative study between continents. To tackle this, this paper compared confrontation attitude to maritime transport and port security between South Korea and European Union. Results identified that maritime shipping security incorporates container cargo security management, logistics security management, logistics security certificate system, and environmental impacts management caused by maritime shipping. Further, the comparison between two countries suggests that South Korea need to take more positive attitude to respond, such as investment in equipment and technologies for maritime shipping security, construction of comprehensive management system, political supports for logistics security, and training and education for safety and security. The results provide useful insights for strategic review of security systems in South Korea, and to help strategic agenda for future improvement.

  • PDF

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

An Exploratory Study for Clustering of Technology Leakage Activitie (기술유출행위 군집화를 위한 탐색적 연구)

  • Kim, Jaesoo;Kim, Jawon;Kim, Jeongwook;Choi, Yurim;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2019
  • Most of security countermeasures have been implemented to cope with continuous increase leakage of technology, but almost security countermeasures are focused on securing the boundary between inside and outside. This is effective for detecting and responding to attacks from the outside, but it is vulnerable to internal security incidents. In order to prevent internal leakage effectively, this study identifies activities corresponding to technology leakage activities and designes technology leakage activity detection items. As a design method, we analyzed the existing technology leakage detection methods based on the previous research and analyzed the technology leakage cases from the viewpoint of technology leakage activities. Through the statistical analysis, the items of detection of the technology leakage outcomes were verified to be appropriate, valid and reliable. Based on the results of this study, it is expected that it will be a basis for designing the technology leaking scenarios based on future research and leaking experiences.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

A Study on The Protection Organization for The Chief of State in North and South Korea (${\cdot}$북한의 국가원수 경호조직에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.17-50
    • /
    • 1997
  • I study on the security organization for the chief of state in North and South Korea. The paper, purporting to analyze security system in comparative prospectives, comprise four chapters. Chapter I Which sets out purpose, scope and method, is followed by Chapter II , dealing largely with the power structure on The Socialist Constitution of Democratic People's Republic of Korea, the protection organization and security activities for the chief of state in North Korea. Chapter III concerns the security environment - terrorist groups, firearms, explosives, suspects, movements of hostile countries and orthers - and the protection organization on The Presidential Security Service for the president in South Korea, culminating in projection of certain problem area. It is followed by concluding observation made in Chapter IV. To be operated security systems effectively, these need to be regulated according to a protective scale, function, authority of a existing.

  • PDF

Study on Improving Airport Security to Prevent Air Terrorism (항공테러 방지를 위한 공항보안 개선대책 연구)

  • Kim, Kwanho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.4
    • /
    • pp.90-105
    • /
    • 2013
  • As witnessed in September 11 attacks, air terrorism is often the most effective means to achieve their goals, and thereby requires a sophisticated level of security measures. Moreover, considering the nature of air transportation, the prevention of air terrorism demands a wide range of international cooperation and joint efforts such as timely sharing of information related to air terrorism (such as latest terror techniques and list of terrorists) between nations, International Air Transport Association (IATA) and International Civil Aviation Organization (ICAO) As most air terrorism can be effectively prevented through security and search activities in airports, this study has focused on researching security measures and issues in major airports around the world, along with the potential measures to improve them. To achieve this effect, this paper offers solutions to preventing air terrorism by exploring appropriate responses to various type of air terrorism, deployment of advanced security and search equipment, techniques to identify terrorists, R&D on equipments to physically take down terrorists and systematic improvements on airport security search process.

Information Security Activities of The Design Phase (설계단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.745-746
    • /
    • 2016
  • The design phase is a process that is embodied to be interpreted and implemented in a requirement of the system information in the analysis phase. In the design phase, the design privacy, information security test plan is established, activities are carried out.

  • PDF

A study on the model of homebound senior's meal satisfaction related to the quality of life

  • Lee, Sun-Mee;Joo, Na-Mi
    • Nutrition Research and Practice
    • /
    • v.6 no.4
    • /
    • pp.357-365
    • /
    • 2012
  • This study was conducted to develop a construct model regarding the daily activities, emotional security provided by food, enjoyment of food, level of satisfaction with delivered food, and the quality of life of homebound seniors who benefitted from meal delivery programs. The data were analyzed by SAS 9.2 and the Structural Equation Model (SEM), which was created by Analysis of Moment Structure (AMOS) 5.0 packages. The reliability of the data was confirmed by an exploratory factor analysis and through a Cronbach's alpha coefficient, and the measurement model proved to be appropriate by a confirmatory factor analysis of the measurement model in conjunction with AMOS. The results of the correlations between all the variables showed significant positive correlations (P < 0.05). The path analysis demonstrated that the daily activities (P < 0.01) and the emotional security created by food (P < 0.05) had positive correlations with the foodservice satisfaction (P < 0.05), while the daily activities (P < 0.05), the sense of emotional security made by food (P < 0.05), and food enjoyment (P < 0.05) also presented significant positive correlations with the quality of life. However, the food service satisfaction was shown to directly, but not significantly, affect the quality of life. This revealed that the current meal delivery programs needed to be improved in several directions.

A study on the improvement of BCM industry through legal systems (BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구)

  • Han, Jong-U
    • Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF