• Title/Summary/Keyword: Social Security System

Search Result 763, Processing Time 0.033 seconds

The Effect of Service Quality on Consumer Loyalty in Security System (경비업체의 기계경비 서비스 품질이 고객충성도에 미치는 영향)

  • Wang, Sug-Won;Kang, Min-Wan;Park, Yong-Jin
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.183-201
    • /
    • 2006
  • In modern society, increasingly easier access to Internet makes people want higher and more advanced services. This trend, of course, appears in the field of Security System. This study which has been performed to prove the way service quality of Security System has an influence on customer satisfaction brought the following results. First, customer satisfaction depends on social demographic characteristics. In other words, each customer satisfaction to service quality makes a difference the way he/she gains information on available facility. Usually customers showed higher satisfaction when they accepted the information from other people. Second, customer satisfaction depends on service quality itself. The effort for improvement of work efficiency or service quality in both facility itself and surroundings can make more people use and recommend the Security System without cease.

  • PDF

The Research of the Development of Security Industrial and Proffessional Certificate in the Private Security (민간경호${\cdot}$경비 산업의 발전을 위한 전문교육 및 인증제도의 필요성 제고)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.1-25
    • /
    • 2005
  • Recently the demand for civil bodyguards and security guards shows rapid growth. However the supply and training system have some limitations. Educational and training systems for civil body and security guards are in the basic level and private organizations trained the professional work force. University level training started recently. To protect individual life and property, body and security guards have to be trained professionally. For it the role of professional training organizations is emphasized. The purpose of this article is to analyse current situation of civil body and security guard training industry and to seek an educational model. For it, the following questions will be examined. ${\cdot}$ Do the professional training organizations meet social demand for the body and security guards? ${\cdot}$ What kind of training has to be provided for the body and security guards? ${\cdot}$ What tare the qualifications of the trainers? ${\cdot}$ What are the differences in training courses between private organizations and universities? ${\cdot}$ Is there any differences in the job placement among the trainees of private organizations and universities? In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

A Study on the Institutional Improvement Arrangement of the Private Security in Korea (한국 민간경비 교육${\cdot}$제도의 문제점과 발전방안)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.51-72
    • /
    • 2006
  • Recently the demand for civil bodyguards and security guards shows rapid growth. However the supply and training system have some limitations. Educational and training systems for civil body and security guards are on the basic level and private organizations trained in the professional work force. University level training started recently. To protect individual life and property, body and security guards have to be trained professionally. For it the role of professional training organizations is emphasized. The purpose of this article is to analyse current situation of civil body and security guard training industry and to seek and educational model. For it, the following questions will be examined. ${\cdot}$ Do the professional training organizations meet social demand for the body and security guards? ${\cdot}$ What kind of training has to be provided for the body and security guards? ${\cdot}$ What are the qualifications of the trainers? ${\cdot}$ What are the differences in training courses between private organizations and universities? ${\cdot}$ Is there any differences in the job placement among the trainees of private organizations and universities? In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

Debating Universal Basic Income in South Korea (기본소득 논쟁 제대로 하기)

  • Back, Seung Ho;Lee, Sophia Seung-yoon
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.37-71
    • /
    • 2018
  • Since 2016, public and political interest on basic income has been increased beyond academic interest. The recent debate on basic income has expanded on issues regarding to the concrete implementation of basic income moving further than the debate on conception of the basic income in the abstract level. This study examines major critiques of basic income which was raised from social policy area and makes a counter-argument on these critiques. Major points summarized as follows. First, the problem of jobs and social insurance exclusion is not serious enough to call for basic income. Second, existing social security systems will be crowded out by excessive financial burden if basic income is introduced. Third, policies to cultivate citizens' capacities to cope with a technological change should be given priority over basic income. This study disputes these critiques by counter arguing four points. First, it is necessary to reconstruct welfare state based on basic income, given the labor market changes, such as long-term trend of employment change, newly emerging employment of platform companies, and inconsistency of platform labor and social insurance. Second, hypothesis of crowding-out effect on social security system is just a criticism that can be applied to the basic income initiative of the right-wing. Also, it is unable to find a logical basis or evidence of this hypothesis from the historical process of welfare state development or previous studies. Third, it is necessary to discuss how to reconfigure existing social security system and basic income which are complementary to each other and also have consistency with labor market as a configuration, not as a matter of choosing between basic income and social security system. Fourth, de-laborization does not mean a refusal to labor but a free choice, and the basic principle of social security is not needs but right. In conclusion, in order to develop more productive debate on basic income, it requires more sophisticated discussion and criticism from the point of view of the distributive justice; the debate on the sustainability of social insurance-centered welfare states; and debates on the political realization of basic income.

Priorities And Problems In The Development Of Modern Information Technologies In Education

  • Prykhodkina, Nataliia;Tymoshko, Hanna;Zuieva, Alona;Sholokh, Olena;Noskova, Margaryta;Lebid, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.231-236
    • /
    • 2021
  • The article assesses the functioning of the DE system or a separate educational institution, where it can be carried out on the basis of developed criteria or on a regulatory basis. The assessment was carried out on the basis of a qualitative and quantitative nature by comparing the actual state of affairs with a certain "ideal" (educational standard), which must be defined and used as a kind of benchmark against which the assessment is made. Conducted an assessment based on a regulatory framework that represents an alternative approach. It has been emphasized that the exceptional difficulty in determining the ideal indicators (norms) of the activities of universities, it has been found that the normative approach, in which the activities of traditional and open universities are compared, taking into account the differences in social, cultural and economic conditions, is the most acceptable.

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

A Guidelines for Establishing Mobile App Management System in Military Environment - focus on military App store and verification system - (국방환경에서 모바일 앱 관리체계 구축방안 제시 - 국방 앱스토어 및 검증시스템 중심으로 -)

  • Lee, Gab-Jin;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.525-532
    • /
    • 2013
  • Recently. smartphones have been popularized rapidly and now located deep in our daily life, providing a variety of services from banking, SNS (Social Network Service), and entertainment to smart-work mobile office through apps. Such smartphone apps can be easily downloaded from what is known as app store which, however, bears many security issues as software developers can just as easily upload to it. Military apps will be exposed to a myriad of security threats if distributed through internet-basis commercial app store. In order to mitigate such security concerns, this paper suggests a security guidelines for establishing a military-excusive app store and security verification system which prevent the security hazards that can occur during the process of development and distribution of military-use mobile apps.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Design and Implementation of File Access Control Module for Secure Operating System Using on Windows (윈도우 기반의 보안 운영체제를 위한 와일 접근 제어 모듈 설계 및 구현)

  • 한석재;김완경;소우영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.131-137
    • /
    • 2004
  • With the rapid development of information sharing through network, If system is exposed to various threatener and security incident are became a social problem. As a countermeasure, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. In this paper, design and implementation of file access control module for secure operation system. The module, implemented in this paper, is based on Windows and has effect integrity and non-repudiation for a file.

  • PDF

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.