• Title/Summary/Keyword: Security Service Model

Search Result 759, Processing Time 0.028 seconds

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

A Study on the Development of Public Design Strategy Based on the Service Design Methodology -Focus on Signboard renovation Business Jungangro, Chung-yang (서비스 디자인 방법론을 활용한 지역 활성화 전략 연구 - 청양군 간판개선사업 중앙로 일대를 중심으로)

  • Chung, Yong-Jin;Kim, So-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.380-389
    • /
    • 2022
  • Service design refers to an activity to design a user's service experience and a design area for professionally executing it. In order to design services from the people's point of view away from the supplier-oriented policy decisions in the past, the recent public participation business model using the service design methodology is increasing. In particular, the Ministry of Public Administration and Security formed the 'National Design Team' in 2014 to design services from the perspective of the public throughout the policy process. The public participatory policy model is being operated in which the public as policy consumers, service designers and public officials as suppliers participate in the overall policy process to develop and develop public services through service design techniques. This study is meaningful in that it presented the developmental direction of the actual project site through the case of the National Design Team sign improvement project with the goal of establishing a regional revitalization strategy using the service design methodology. However, as this study is about the current project, verification of the application of future project sites and user satisfaction evaluation have not been conducted. When the project is completed in the future, it is necessary to conduct a project satisfaction survey targeting consumers.

Effects of Police Officer's Job Motivation (신임경찰관의 입직동기)

  • Cho, Ho-Dae;Park, Jae-Poong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.283-290
    • /
    • 2008
  • This study explored the relationship between Police Officer's Job Motivation and Organizational Commitment. The Police officers' Job Motivation has been measured, and then how their Job Motivation affects Organizational Commitment has been examined. So, the ultimate purpose of this study is to suggest the ways for the human resource management plan and then to raise the organizational Commitment. The methodology used in this study is based largely on the motivation model. A Police Officer's Job Motivation Perception questionnaire comprises 4 categories; 'Responsibility and Service', 'Job Security', 'The reputation of police', and 'Aspiration for police work'. And Organizational Commitment. In the conclusion, policy implications for developing an effective recruitment strategy and Necessity of training program are discussed.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Aid Effectiveness in Practice: A Case Study on the National Data Center in Mongolia

  • Hong, Sung Gul;Lee, Sang Joon
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.1-17
    • /
    • 2013
  • The main purpose of this paper is to examine the aid effectiveness of ODA projects through a case of an e-Government ODA. The case at hand is the Mongolian National Data Center project, which was supported by Korea International Cooperation Agency in 2007~2009. In this paper, we analyze aid effectiveness through a case instead of a long-term macroeconomic analysis. By using OECD DAC guideline for performance evaluation of ODA project combined with PRM (Performance Reference Model) for evaluating e-Government, authors undertakes a post-implementation evaluation on the Mongolian NDC project. The result shows that the NDC project has been relevant and implemented effectively and efficiently given the political instability incurred by the election fraud in 2008. However, there have been problems as well. Provision of defected monitors was a critical problem while disagreement on the safety of the building was lasted for two more years to be settled. Some comments on the training program are also worth to hear to ameliorate similar projects. But more fundamental problems are found in impacts and sustainability areas. Low political status of ICTPA as a coordinating organization for ICT ODA and unstable job security of NDC are serious hurdles to increase effectiveness and efficiency of NDC. ICTPA has played very limited roles in coordinating government-wide ICT ODA projects because it lacks actual power and control over them. Other government organizations do not fully trust NDC as a reliable government data center due to low political status and lack of job security. Thus critical factors to affect the effectiveness and efficiency of e-Government ODA projects are political and organizational instead of economic.

  • PDF

Development of vision-based security and service robot (영상 기반의 보안 및 서비스 로봇 개발)

  • Kim Jung-Nyun;Park Sang-Sung;Jang Dong-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.308-316
    • /
    • 2004
  • As we know that there are so many restrictions controlling the autonomous robot to turn and move in an indoor space. In this research, Ive adopted the concept ‘Omni-directional wheel’ as a driving equipment, which makes it possible for the robot to move in horizontal and diagonal directions. Most of all, we eliminated the slip error problem, which can occur when the system generates power by means of slip. In order to solve this problem, we developed a ‘slip error correction algorithm’. Following this program, whenever the robot moves in any directions, it defines its course by comparing pre-programmed direction and the current moving way, which can be decided by extracted image of floor line. Additionally, this robot also provides the limited security and service function. It detects the motion of vehicle, transmits pictures to multiple users and can be moved by simple order's. In this paper, we tried to propose a practical model which can be used in an office.

  • PDF

A Study on the Influence of Career Satisfaction and Commitment on Career Anchor Style (경력 닻의 유형이 경력만족과 경력몰입에 미치는 영향 연구)

  • Park, Hee-Dong;Park, Min-Saeng
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.97-116
    • /
    • 2012
  • This pager purposed to investigate the style of career anchor and influence of career satisfaction and career commitment. also to concept each variable. The empirical research questions for the study are what kind of the career anchor is selected and what impacts on career satisfaction and career commitment. To examine the model, 299 questionnaires was collected from Korean workers. Each questions is based on a 7 point Likert-type scale, and the data were analyzed by SPSS and AMOS for Windows. The results of study are summarized as follows: First, style of career anchor(technical/functional, security, pure challenge, life-style integration) has an positive influence on career satisfaction. but partial style of career anchor(managerial, creativity, autonomy/independence, service/dedication) unconnected with career satisfaction. Secondly, style of career anchor(technical/functional, managerial, security, service/dedication) has an positive influence on career commitment. but partial style of career anchor(creativity, autonomy/independence, pure challenge, life-style integration) unconnected with career satisfaction.

  • PDF

Design of Anomaly Detection System Based on Big Data in Internet of Things (빅데이터 기반의 IoT 이상 장애 탐지 시스템 설계)

  • Na, Sung Il;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.377-383
    • /
    • 2018
  • Internet of Things (IoT) is producing various data as the smart environment comes. The IoT data collection is used as important data to judge systems's status. Therefore, it is important to monitor the anomaly state of the sensor in real-time and to detect anomaly data. However, it is necessary to convert the IoT data into a normalized data structure for anomaly detection because of the variety of data structures and protocols. Thus, we can expect a good quality effect such as accurate analysis data quality and service quality. In this paper, we propose an anomaly detection system based on big data from collected sensor data. The proposed system is applied to ensure anomaly detection and keep data quality. In addition, we applied the machine learning model of support vector machine using anomaly detection based on time-series data. As a result, machine learning using preprocessed data was able to accurately detect and predict anomaly.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.