• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.022 seconds

A Study on the Effects of Service Quality in Machine Security Systems on Customer Satisfaction (기계경비시스템의 서비스품질이 고객만족에 미치는 영향에 관한 연구)

  • Huh, Koung-Mi;Hong, Tae-Kyung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.361-381
    • /
    • 2008
  • Quality rating of machine security systems is difficult because both tangible and intangible services are included. However, still, the research template applied the SERVQUAL model with the intention of confirming machine security systems' service quality formation and experimentally inspecting the relationship between service quality and customer satisfaction. Therefore, the following highlights the experimental research outcomes and their implications for small-scale businesses utilizing machine security systems in the Daegu region. First, after observing whether the determining factors constitute service quality, four components were found to have significant influence on customer satisfaction. Additionally, in observing any differences in their influences, the following in order were observed as having influence on customer satisfaction: empathy, assurance reliability, responsiveness, and tangibility. Moreover, though companies‘ newest facilities and equipment are important, it can be concluded that a company employees’ prudent consideration, individual interest, reliability, and assurance for the customer carry greater importance. Secondly, though we intended to survey machine security systems by employing the SERVQUAL model, determinant factor analysis results found applying SERVQUAL model in its original state a challenge. According to results from determinant factor analysis, the basis for forming service quality is determined by assurance reliability, empathy, tangibility, and responsiveness. Furthermore, in future research, while more accurately distinguishing between assurance and reliability, a more appropriate model must also be considered for modification in domestic machine security system industry‘s service quality evaluation.

  • PDF

Study and Scheme Presentation for Generator testing Rules (발전 설비 시험에 대한 규정 검토 및 방안 제시)

  • Choi, H.K.;Kim, D.J.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.362-364
    • /
    • 2005
  • In abroad, thousands of generator testing were accomplished because of importance about generator stability parameters. But it was introduced TWBP and processing in Korea. In addition to, related rules of generator testing had been weaken. Without guidelines, practical uses are much limited. So, it studied compliance life cycle about generator facility parameters for stability analysis. This paper presents security scheme and working rules using generator testing and disturbance recordings, considering domestic circumstance.

  • PDF

An Evaluation Methodology of Information Systems in Business Contingency Planning (업무연속성 계획 수립을 위한 정보시스템 평가 연구)

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.119-128
    • /
    • 2016
  • Growing threats from environments and natural disasters cause information systems to suspend the operation of business. To assure the continuity of business, information systems should not halt in the emergency. This paper suggests an evaluation method for importance of information systems and verifies the method in a real organization. The results to the study can be utilized for establishing business continuity of organizations.

Trends and Future Prospects for Transborder Regional Cooperation in Northeast Aisa (뉴스초점: 동북아 초국경적 지역협력의 동향 및 전망)

  • Lee, Sun
    • Journal of the Korean Professional Engineers Association
    • /
    • v.43 no.5
    • /
    • pp.25-30
    • /
    • 2010
  • The 2010 PCRD(Presidential Committee on Regional Development) International Conference aims at designing regional policies to enhance regional growth potential and inter-regional cooperation. Increasing economic interdependence in Northeast Asia in particular among the 3 countries of China, japan and Korea, requires enlightened territorial development policies of each country to accommodate the need for close cooperation and networking across the border. The security problem in the Korean peninsula requires the importance for earnest dialogue and discussion between neighbors about the common future of Northeast Asia. Cross-border cooperation and networking will contribute to enhancing regional stability and development in this era of borderless globalization.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

An Empirical Study on Korea's Open and Integrated Counter-Terrorism System (한국의 개방・통합형 대테러시스템에 관한 실증적 연구)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.137-156
    • /
    • 2018
  • The purpose of this study is to analyze the current status of counter terrorism system and to identify the causes of problems and to suggest alternatives by selecting legal and operational sectors based on theories of open systems and integrated systems. According to the results of the research, first, the degree of agreement on the open system and the integrated system is low with regard to the characteristics of the counter-terrorism system. Second, in relation to the importance and necessity of major factors of construction and operation of counter-terrorism system, counter-terrorism workers recognize that it is the most important and necessary. In the case of strengthening international cooperative system, the difference of recognition between importance and necessity was the biggest. The importance and necessity of reviewing the Anti-Terrorism Act for the protection of the public and public safety were relatively low, and the cooperation with the private sector showed the lowest importance and necessity. In the case of academic achievement, the average level of high school graduates is higher than that of professional high school graduates. Therefore, this research concludes that counter terrorism operation system with open and integrated system has to be applied to national counter terrorism operation structure in South Korea in increasing the quality and efficiency of nation counter terrorism response capability.

A Study on the Relationship between the Interpersonal Stress in Private Security Officers and Their Job Satisfaction and Turnover Intention (민간경비원의 대인관계스트레스와 직무만족, 이직의도의 관계에 관한 연구)

  • Kim, Chang-Ho;Ha, Jung Hoon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.115-137
    • /
    • 2013
  • This study aims to confirm the effect of different types of interpersonal stress factors of private security officers that are prevalent in the course of carrying out their duties on job satisfaction and turnover intention. The authors have examined 175 of the 200 survey questionnaires distributed to the employees of private security firms located in Seoul and Gyeonggi Province in December 2012. The result of the analysis indicates that the primary source of stress in the private security officers is the interaction with customers, followed by the relationships with colleagues and superior officers. In addition, colleague-related stress is found to be the only interpersonal stress factor with a statistically significant negative effect on job satisfaction, while both the stress from the relationships with colleagues and superior officers are positively correlated with turnover intention. Furthermore, the colleague-related stress is revealed to mediate job satisfaction which has a statistically significant effect on turnover intention. The result from the study emphasizes the importance of managing the interpersonal stress in private security officers and confirms the necessity of effectively handling the stressful situations in the relationships with colleagues. Moreover, in order to raise job satisfaction levels and minimize turnover which is vital in accomplishing the goal of each organization, causal factors of the stress need to be recognized and handled appropriately. This will provide the future research with an insight into the effective interpersonal stress management and examining other factors of job satisfaction and turnover intention of private security officers.

  • PDF

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF