• 제목/요약/키워드: Security Strategies

검색결과 620건 처리시간 0.03초

Study on the Layout of Water Diversion Projects Influenced by China's Macro Developing Strategies

  • Peng, Xiang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2008년도 학술발표회 논문집
    • /
    • pp.59-66
    • /
    • 2008
  • A country's macro developing strategies will greatly impose upon its water resources allocation. Based upon the relationship between national macro developing strategies and water diversion projects layout, the paper discusses the vital influence of water diversion projects caused by China's food security and sustainable development strategy implemented in recent years, and points out that it is an inevitable choice of constructing inter-basin water diversion projects in north China in view of local water resources can't meet the demand of socio-economic development and eco-environment protection, and then recommends China's water diversion projects layout in the current and future, which attaching most importance to the South-to-North Water Diversion Project.

  • PDF

The Influence of Private Security Guard's Stress Coping on Job Burnout (민간경비원의 스트레스 대처방식이 직무소진에 미치는 영향)

  • Lee, Man-Jong;Lim, You-Seok
    • Korean Security Journal
    • /
    • 제34호
    • /
    • pp.209-232
    • /
    • 2013
  • As time goes by, the diversity of crime has become a serious social problem in modern society, and the policing is increasing the role of private security guards in order to fill the policing. But Private guards stressful experience to perform the actual work is exposed to various crisis situations. Then, private security guards should be management because of private security impact on job burnout. This study aims to determine the empirical work experience in the field of private security guards to cope with stress according to the degree of job burnout. The results are as follows: First, it was the negative effects of the stress coping strategies of private security guards on physical and psychological burnout, and the statistic effects of the wishes coping strategies of private security guards on physical and psychological burnout. Second, stress coping strategies of private security guards, were not found to affect the dehumanization of job burnout. Third, the center of the problem of private security guards of the ways to cope with stress coping was lacking in a static(+) affecting the accomplishment of the job burnout. Therefore, the different types of stress that may arise private security guards physically exhausted, psychologically exhausted, lack of accomplishment in the course of the private security business perform. Finally, Managers of the private security guards, job burnout occurs should be focused on the factors pre-management and co-ordination.

  • PDF

An Application of The Islamic Methodology in The Enactment of Criminal Laws and Policy Formulation

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.169-174
    • /
    • 2022
  • Public policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of criminal law.

An Application of The Islamic Methodology in The Enactment of Commercial Laws and Policy Formulation

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.129-134
    • /
    • 2022
  • Public policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of commercial law.

Innovation and investment strategies to intensify the potential modernization and to increase the competitiveness of microeconomic systems

  • Tulchynska, Svitlana;Vovk, Olha;Popelo, Olha;Saloid, Stanislav;Kostiunik, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.161-168
    • /
    • 2021
  • Within the article, strategic guidelines for the modernization of microeconomic systems are identified. Modernization levels of the potential implementation are formalized for enterprises: contractile, extensive technical, technological, progressive, adaptive, steady, intensive, creative, absolute and leader modernization. This allowed to specify the directions and tasks of the enterprise modernization at different management levels. Accordingly, the conditions and criteria for selecting resource tools are set. It is proved that the strategies of the potential modernization of enterprises must be carried out at four main management levels: first, at the enterprise level; secondly, for a particular type of product / service; third, by functional directions of modernization of separate spheres of the enterprise activity or responsibility, fourth, at the level of structural units of the enterprise. It is substantiated that in the processes due to the activation of the potential modernization, the resources are transformed into the results of the innovation implementation and the investment strategies modernization. A system of tasks for the corporate strategies implementation in order to modernize microeconomic systems has been formed. Key vectors of the activation determine the nature and properties of investment resources and necessary innovations to enhance the modernization potential. Therefore, the system of innovation and investment strategies' modernization, based on the vector and resource provision of the modernization process, is specified:

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • 제16권1호
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

The 21st Century Maritime Strategies in the Northeast Asia - US, China, Japan and Russia - (21세기 동북아 해양전략 - 미·중·일·러를 중심으로 -)

  • Park, Nam-Tae;Jung, Jae-Ho;Oh, Soon-Kun;Lim, Kyung-Han
    • Strategy21
    • /
    • 통권38호
    • /
    • pp.250-286
    • /
    • 2015
  • The main purpose of this article is to provide an understanding on current maritime issues in the Northeast Asia, and thereby help formulating the right strategy for our national security. The article summarizes core arguments in the recently published 『The 21st Century Maritime Strategies in the Northeast Asia: Dilemma between Competition and Cooperation』. It will help readers to comprehend historical backgrounds as well as recent updates related to maritime issues and strategies in the region. Also, readers may find guidance to conceive their own maritime strategies for the Republic of Korea. Currently, the U.S. is shifting its focus from Atlantic to Pacific, and increasing its naval presence in Asia-Pacific region. Meanwhile, the 21st century China views the maritime interests as the top priority in its national security and prosperity. PLA Navy's offensive maritime strategies and naval building such as aircraft carriers and nuclear submarines are unprecedented. Japan is another naval power in the region. During the Cold War JMSDF faithfully fulfilled the mission of deterring Soviet navy, and now it is doing its job against China. Lastly, Putin has been emphasizing to build the strong Russia since 2000, and putting further efforts to reinforce current naval capabilities of Pacific Fleet. The keyword in the naval and maritime relations among these powers can be summarized with "competition and cooperation." The recent security developments in the South China Sea(SCS) clearly represent each state's strategic motivations and movements. China shows clear and strong intention to nationalize the islands in SCS by building artificial facilities - possibly military purpose. Obviously, the U.S. strongly opposes China by insisting the freedom of navigation(FON) in international waters as recent USS-Lassen's FON operation indicate. The conflict between China and the U.S. surrounding the SCS seems to be heading towards climax as Russia and Japan are searching for their own national interests within the conflict. Also, the neighboring small and middle powers are calculating their own economic and security interests. This is no exception for us in establishing timely strategies to maximize our own national security. Hopefully, this article leads the readers to the right direction.

Small nations' choices to cope with direct security threats: a comparative study on the security strategies of the five East-Central European states between two world wars (안보의 진공을 타개하기 위한 약소국의 선택: - 전간기 중·동부유럽 5개국의 외교, 안보정책 비교연구)

  • Kim, Shin-Kyu
    • East European & Balkan Studies
    • /
    • 제32권
    • /
    • pp.257-281
    • /
    • 2012
  • Are the policies and strategies which weak and small states choose to follow for ensuring their's own security meaningless? Can the fate of weak states be guaranteed only by the neighboring benign strong states and be in certain international relations favoring for them? In this paper, to answer these questions, what kinds of security policies and foreign policies had small states chosen which were in the face of threats of great powers will be examined. Between the two world war, the series of event which took place in central and eastern European countries(CEEc) have been selected to examine the hypothesis and theories of international relations and foreign policies, and at the same time cited as examples of failed foreign policy and security strategy. During interwar periods, CEEc were the prime examples for examining what kind of policies and strategies had the small states chosen over the international relations in which the smalls had to struggle to survive between neighbouring the powers and between the hostiles. Furthermore, for the measures which the smalls had chosen had no effect when the great power threatened military to them, the main purpose of this paper is to examine what was the best choose to depend their survival. For this purpose, in this paper, several strategies which the smalls can choose and the counterfactuals, that is "if the smalls chosen another strategies, they could...", will be examined.

Cyber Security Governance Analysis in Major Countries and Policy Implications (주요국 사이버보안 거버넌스 분석과 정책적 시사점)

  • Joo, Moon-ho;Kwon, Hun-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제28권5호
    • /
    • pp.1259-1277
    • /
    • 2018
  • This study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Under this goal, this study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Based on the results of this analysis, this study suggests suggestions and directions for improvement of domestic cyber security governance.

A Safe Qperati ng Strategy for Information System of Small and Medium Enterprises (중소기업 정보시스템의 안정적 운영 전략)

  • Yeo, Sang-Soo;Hwang, Su-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권7호
    • /
    • pp.105-112
    • /
    • 2009
  • Small and medium enterprises have more dependency on their information technology than large enterprises have. but they can't pay much for information technology and information security due to financial restrictions, limited resources, and lack of know-how. So there are many vulnerabilities in small and medium enterprises and these would make many security incidents. Security managers of small and medium enterprises think that information security in their company is simply equivalent to updating the antivirus solutions. managing firewall, and patching systems regularly. However, security policies, prevention of information theft. business continuity, access controls, and many other information security issues should be considered for mitigating security incidents. In this context, we redefined security countermeasures and strategies which are only appropriate to large enterprises. for making them appropriate on a secure operating for information system of small and medium enterprises, and we investigate information security issues in the four views of information system and company, and finally we present information security strategies for each view, in this paper.