• Title/Summary/Keyword: Social Security System

Search Result 768, Processing Time 0.023 seconds

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

Psychological and Pedagogical Cooperation as a Factor in Increasing the Level of Tolerance for Innovation

  • Kirdan, Olena;Kovalenko, Nataliia;Miloradova, Natalia;Sabat, Nataliia;Kovalchuk, Olena;Hirnyak, Andriy
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.684-688
    • /
    • 2021
  • The article highlights the features of professional activity teacher on the basis of tolerance, the content and types of this phenomenon are stated, the value bases of education of tolerance in students are substantiated, psychological, culturological and communicative aspects of pedagogical tolerance of the teacher are considered. Methodical recommendations on self-training of the teacher, tolerant interaction with subjects of educational process are included.

Theoretical Aspects of Blockchain Technologies in The Sphere of Education

  • Liashkevych, Antonina;Babyshena, Mariana;Vorokhaev, Oleksandr;Pylypiv, Volodymyr;Oliinyk, Oksana;Kinakh, Nelia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.185-190
    • /
    • 2021
  • The article provides a literary and analytical review in the following areas of search: problems and prerequisites for changes in the field of education, innovations and innovative models in education, the use of new technologies in teaching. A proposal for a business plan and accompanying documentation for a new methodology based on blockchain technologies were developed, to assess the economic efficiency of the project. The main systems of the new model were modeled on the basis of the proposed methodology, to develop a prototype based on the project documentation.

A Study on Problems and Improvement of Personal Protective Regulations in Security Industry Act (경비업법상 신변보호 관련 규정의 문제점과 개선방안)

  • Park, Jung-Sub
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.81-100
    • /
    • 2017
  • Recently, Crime patterns in our society are diversifying as followed on the urbanization of population and the influx of immgrants. Existing murder, kidnap, sexual assault, etc. Especially, the crimes such as school violence, dating violence, domestic violence, violent abuse and even social hatred a crime, motiveless crime are spreading into every phase of national life. Due to the social situation, the sharp increase in demand for personal protection, the scale of private security industry has been constantly expanded. Following this trend, the personal protective regulations in Security Industry Act has been revised several times since the it was enacted in 1995. However, despite the fact that the legal and institutional aspects should have been amended and improved systematically according to the industrial development, the regulations adopted initially adopted has been maintained so far, which have resulted in various problems as they could not coincide with the purpose of private security, being divorced from the reality of private security industry and social changes. Especially, in the case of personal protection service and facility security service, the legal requirements of both services are identical with each other in terms. Such legal systems may cause confusion to security businesses and employees, or the police managing and supervising them, regarding the scope and duties of security services. In order to improve such problems, the regulations of permission requirement that the personal protective regulations in Security Industry Act should be revised system. In this study, relevant personal protection provisions prescribed in the Security Industry Act have been reviewed critically in this paper. And also the regulations were review of those personal protection provisions enacted in security industry Act, so that the improvement plan for the personal protection provisions that are apposite to the cases in this country could be suggested in order to amend the current laws and provide real grounds for the law enforcement.

  • PDF

The Changing Social Expenditure Structure of OECD Countries on A New Social Risk Structure (새로운 사회적 위험구조에 의한 OECD 국가의 사회지출구조 변화)

  • Byun, Young Woo
    • Korean Journal of Social Welfare
    • /
    • v.64 no.4
    • /
    • pp.337-357
    • /
    • 2012
  • This study explores a changing social expenditure structure of welfare states on new social risks, using logistic regression analysis with Panel Corrected Standard Errors Model on panel data of 1997-2007 years from 27 OECD nations. The result of this study presents that social expenditure structures have been adjusted with new social risk structure due to trade openness, female employment rates, and child population rates. Greater trade openness, higher women's employment rates, and lower child population rates are, more social investment expenditures are than income security expenditures. Rates of employment in service industries and elderly population rates are not statistically significant on the change of social expenditure structure. This result does not imply a complete switch from demand-based to supply-based social policy, but somewhat reflects transitions of a social welfare system for changing economic and social environments in order to sustain welfare state economically.

  • PDF

A Study on the Security Problems of Smart TV and Consumer's Purchase Intention (스마트TV의 보안 문제와 소비자의 구매의도에 관한 연구)

  • Cho, Sung-Phil;Lee, Gi-Hyouk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.382-393
    • /
    • 2017
  • Smart TV sareequipped with an operating system and combined with internet functionality. They can use various apps and contents, and provide personalized and interactive services. However, the Internet connectivity of smart TVs has several security vulnerabilities that can cause significant personal and social harm. Therefore, it is necessary to develop a smart TV with a higher level of security than is currently available. In this study, we analyze consumers' purchase intention for smart TVs with security reinforcement by applying the UTAUT2 model. The results are as follows. Firstly, it was found that performance expectancy, social influence, facilitating conditions and price value, as important variables under the existing UTAUT2 model, have significant effects on purchase intention. Secondly, effort expectancy did not have a positive impact on purchase intention. Thirdly, there was a moderating effect of gender on social influence. According to the results of this study, social influence has the most powerful effect on the purchase intention of smart TVs with security reinforcement. Therefore, in order to improve the purchase intention of smart TVs, it is necessary to expand the publicity activities designed to promote the necessity and importance of reinforcing the security of smart TVs and make them easier to use.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Factors of the Acceptance Affecting the e-Payment System : Focusing on service quality and social influence (전자결제시스템의 수용에 미치는 영향요인 : 서비스품질.사회적 영향요인을 중심으로)

  • Jeon, Soo-Yong;Ha, Kyu-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3239-3248
    • /
    • 2010
  • A number of people using e-payment system has been increasing drastically during the recent period and the trend still continues. The purpose of this article was to investigate the effect of service quality and social factors on the e-payment system acceptance and the moderating effects of self-efficacy in the perspective of the interactional approach. In this research, data were collected from 2331 e-payment system users with structured questionnaires and analyzed using regression analysis method. This research found that security, responsiveness, mass media, word of mouth, security and self-efficacy of interaction effect have significant positive effects on acceptance intension. The result of this research showed that the social influence and self-efficacy interactional approach are more adequate than only service quality in accounting for the e-payment system acceptance.

A Study on the Improvement of Job Satisfaction of Private Security Guard (민간경비원의 직무만족도 개선방안에 관한 연구)

  • Kim, Joon-Ki;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.127-148
    • /
    • 2018
  • As the role and the importance of private security are emphasized in an independent way, as well as in a supportive way for police affairs, this study aims to figure out factors affecting job satisfaction of private security guards by investigating their job satisfaction. This study also suggests some solutions for improvement of their job satisfaction, such as enhancing task motivation and professionalism of private security guards. For the research were used SPSS(Statistical Package for the Social Science) WIN 24 programs. Frequency analysis, correlation analysis, multiple regression analysis and Crosstabulation analysis were performed as analytic methods. As a result of the study, the most fundamental factor in the job satisfaction of the private security guards was 'social recognition'. Social recognition forms when private security guards are trusted as professionals and the value of a job is enhanced. The policy recommendations to improve the job satisfaction of private security guards can be explained as follows. First, a government certification system should be established in an attempt to recruit professional private security guards. Second, in order to improve the work ability of private security guards, it is necessary to designate a special educational institution for a private security guards and provide systematic education. Third, the wage of private security guards should be readjusted to a realistic level. Fourth, it is necessary to secure substantial effect on the permission and the supervision of private security business. Finally, the business area based on public interest should be expanded.

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF