• 제목/요약/키워드: Special security

검색결과 545건 처리시간 0.027초

표백(漂白)이 필요없는 무공해(無公害) 전통한지(傳統韓紙)의 제조(製造)에 관한 연구(硏究) (II) -특수 한지 초지기 개발- (Studies on the Manufacturing of Pollution-free Korean Traditional Paper without Bleaching (II) -Development of the Special Sheet Former for Korean Traditional Paper-)

  • 조남석;최태호;서원성;김종규;양윤욱
    • Journal of the Korean Wood Science and Technology
    • /
    • 제21권3호
    • /
    • pp.67-73
    • /
    • 1993
  • This study was attempted to develop the Special Sheet Former for Hanji (Korean Traditional Paper), which could be easily used anyone who has no any special skill, and to evaluate its sheet forming characteristics. The sheet former for Hanji was designed, manufactured and tested its sheet forming features. This former was resulted in superior even basis weights and good formation of sheets without any special technological experiences, but poor consolidation according to the difficulty of web pressing during dewatering process. Sulfomethylated pulping resulted in the superior pulp with high yield and better quality compared to those of alkali and alkali-peroxide pulps. Since the pulp was so bright, there was almost no need additional bleaching.

  • PDF

초임 특수경비원의 직업사회화 과정 분석 (The Process of Occupational Socialization of Special Guard Firstly Appointed)

  • 박옥철;김태환
    • 한국재난정보학회 논문집
    • /
    • 제7권4호
    • /
    • pp.316-327
    • /
    • 2011
  • 본 연구의 목적은 초임 특수경비원들이 직업사회화 과정에서 산출하는 다양한 경험요소를 규명하여 예비 특수경비원 및 경호경비 교육서비스 전략수립에 필요한 기초자료를 제시하고자 하였다. 이에 초임 특수경비원 4명을 대상으로 심층면담과 문화 기술적 연구를 실시하였다. 그 결과 초임 특수경비원의 직업사회화 과정은 태동기, 준비기, 적응기, 갈등 및 성숙기로 구분하였으며, 첫째, 태동기는 가정환경, 운동경험, 대학진학 결정이다. 둘째, 준비기는 학과의 비전, 대학 교육과정, 직업준비를 위한 자격증, 멘토이다. 셋째, 적응기는 업무의 특수성, 업무의 전문성, 직업 만족이다. 넷째, 갈등 및 성숙기는 업무 스트레스, 이직, 회사 내 갈등, 자기발전 노력, 직업의 장래성이다. 따라서 특수경비원의 업무향상을 위한 지침으로 활용될 수 있을 것이며 추후 연구를 위한 교육적 기초 자료를 제공할 것이다.

공경비와 민간경비의 협력방범체제 구축방안 (A Study on the Plan of Construction of Cooperating Crime Prevention System between Public Police and Private Security of Korea)

  • 이상원
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.67-101
    • /
    • 2003
  • This study presents a plan of construction for cooperating crime prevention system between public police and private security to provide positive safety, and crime prevention activity for clients. A method of this study, this paper used statistics analysis and literature study. This study, an introduction is at the chapter I , a role of public police and private security at the Chapter II, the realities of private security industry of korea at the Chapter III, the police service relating with private security and operating realities at the ChapterIV, the problems and a plan of construction for co-operating crime prevention system at the ChapterV, and conclusion at the ChapterVI. In conclusion, It is needed a public information strategy, partnership between the police and guard, establishment of special office for private security, and the improvement of the quality in security corporation.

  • PDF

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF

특수경비조직의 조직문화와 조직신뢰 및 조직성과의 관계 (Relationship between Organizational Culture, Organizational Trust and Organizational Performance of Special Guard Organization)

  • 김효준
    • 시큐리티연구
    • /
    • 제29호
    • /
    • pp.59-86
    • /
    • 2011
  • 이 연구의 목적은 특수경비조직의 조직문화와 조직신뢰 및 조직성과의 관계를 규명하는데 있다. 이 연구는 2011년 3월 서울소재 4개소 민간경비회사의 특수경비원을 모집단으로 설정한 후 판단표집법을 이용하여 최종분석에 이용된 사례 수는 총 161명이다. 연구에 사용된 설문지는 총 42문항으로 구성되었으며, SPSSWIN 18.0을 이용하여 빈도분석, 요인분석, 신뢰도분석, 상관분석, 다중회귀분석, 경로분석 등을 실시하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .60이상으로 나타났다. 결론은 다음과 같다. 첫째, 특수경비조직의 조직문화는 조직신뢰에 영향을 미친다. 즉, 개발적, 합리적, 합의적, 위계적 문화가 활성화 되면 인지 감정적, 행동적 신뢰를 증가시킨다. 둘째, 특수경비조직의 조직문화는 조직성과에 영향을 미친다. 즉, 합리적, 합의적 문화가 활성화 되면, 직무만족은 높다. 반면, 개발적, 합의적, 위계적 문화가 활성화 되면, 조직몰입은 높다. 셋째, 특수경비조직의 조직신뢰는 조직성과에 영향을 미친다. 즉, 인지 감정적, 행동적 신뢰가 높게 작용하면, 직무만족, 조직몰입은 증대된다. 넷째, 특수경비조직의 조직문화는 조직성과에 인과적 영향을 미친다. 즉, 조직문화는 조직성과에 직접적인 영향을 미칠 뿐만 아니라, 조직신뢰의 하위 요인인 행동적 신뢰를 통하여 조직성과에 간접적인 영향을 미친다.

  • PDF

개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링 (The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information)

  • 서우석;전문석
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

전쟁 다큐멘터리 시청이 수용자의 안보 의식에 미치는영향 - 'KBS 특집, 우크라이나 침공 100일, 포화속으로'를 중심으로- (Effect of Watching War Documentary on Audience's Security Consciousness - Focusing on 'KBS Special, 100 Days of Invasion of Ukraine, Into the Fire' -)

  • 박덕춘
    • 한국멀티미디어학회논문지
    • /
    • 제25권11호
    • /
    • pp.1613-1620
    • /
    • 2022
  • Through previous studies, it was found that news from legacy media, including television, has an agenda-setting effect and priming effect on the perceptions and attitudes of audiences about politics and war, and that film media also has an agenda-setting effect and political priming effect on war issues. However, it is difficult to find studies on the effects of war-related TV documentaries on media audiences. Therefore, in this study, An experimental study was conducted to investigate whether there is a change in 'recognition of the importance of security', 'will for South-North Unification' and 'will to participate in war in case of emergency' for the audience who watched the KBS special <100 Days of Invasion of Ukraine, Part 1 into the Fire>. As a result of the analysis, it was found that watching a war-related TV documentary reinforced the audience's 'recognition of the importance of security' and 'will for South-North Unification'. However, it was confirmed that watching a war-related TV documentary did not strengthen the audience's will to participate in war in case of emergency.

An eCK-secure Authenticated Key Exchange Protocol without Random Oracles

  • Moriyama, Daisuke;Okamoto, Tatsuaki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권3호
    • /
    • pp.607-625
    • /
    • 2011
  • Two-party key exchange protocol is a mechanism in which two parties communicate with each other over an insecure channel and output the same session key. A key exchange protocol that is secure against an active adversary who can control and modify the exchanged messages is called authenticated key exchange (AKE) protocol. LaMacchia, Lauter and Mityagin presented a strong security definition for public key infrastructure (PKI) based two-pass protocol, which we call the extended Canetti-Krawczyk (eCK) security model, and some researchers have provided eCK-secure AKE protocols in recent years. However, almost all protocols are provably secure in the random oracle model or rely on a special implementation technique so-called the NAXOS trick. In this paper, we present a PKI-based two-pass AKE protocol that is secure in the eCK security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and does not rely on implementation techniques such as the NAXOS trick.

전자거래의 데이터 무결성 분석 자동화 시스템 설계 및 구현 (Design and Implementation of System for Integrity Evaluation on E-commerce)

  • 김점구
    • 융합보안논문지
    • /
    • 제5권1호
    • /
    • pp.63-74
    • /
    • 2005
  • 전자거래상의 각종 사이버 침해 사고에 대처하기 위한 네트워크 보안 제품이 보급되고 있으나, 유지 관리 면에서 보안 전문가 정도의 전문 기술력이 요구되는 관계로 기업체나 공공기관에서 보안 제품의 설치 운영의 필요성은 절실하게 느낌에도 실제 보안제품의 보급이 빠르게 이루어지지 않아 국내 각종 사이트들에 대한 보안 취약성이 심각한 실정이다. 본 논문은 이러한 전자거래 환경의 보안관리를 비전문가도 효율적으로 관리할 수 있는 데이터 무결성 분석의 자동화 도구를 설계 구현하였다.

  • PDF

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.