• Title/Summary/Keyword: constraints of private security

Search Result 12, Processing Time 0.02 seconds

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Relationship of Leisure Constraint, Boredom and Satisfaction among the Private Security Agents (민간경비원의 여가제약과 여가권태 및 여가만족의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.459-468
    • /
    • 2011
  • This study was to analyze the relationship of leisure constraint, boredom and satisfaction among the private security agents. To attain the goal of this study, the employee of private security organization located in Seoul, 2011 year were sampled 400 peoples by purposive sampling method. The result of reliability check up was here below; over Cronbach's ${\alpha}$=.587. To analyze materials, reliability analysis, factor analysis, T test and F test, multiple regression analysis and path analysis were used as statistic analysis techniques. The conclusion are here below. First, leisure constraints, boredom and satisfaction have a difference in demographic and socio-economic characteristics. Second, leisure constraints influence on the leisure boredom. Third, leisure constraints influence on the leisure satisfaction. Fourth, leisure constraints influence directly, indirectly on leisure boredom and satisfaction. Leisure boredom is very important variable connecting leisure constraints and satisfaction.

Ecological and Economic Aspects of Innovative Development of Urban Logistics Infrastructure Taking Considering Pandemic Constraints

  • Rusanova, Svitlana;Kuzkin, Olexiy;Melkonov, Hryhorii;Lavrushchenko, Yuliana;Kuzmenko, Oksana;Zhurian, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.9-16
    • /
    • 2022
  • The relevance of the topic is determined by the existence of inconsistencies between economic and environmental aspects of innovative development of urban logistics infrastructure, as well as the conflict of public, state and private commercial interests in this issue. The purpose of the article is to determine the principles and effective tools for innovative development of urban logistics infrastructure, taking into account pandemic constraints. The influence of the environmental aspect on the dynamics of transport flows was analyzed in detail and characterized, the scheme of determining the optimal solution for the development of the city was proposed considering the compromise between economic and ecological interests of society, state and business entities. A scheme of innovative development of urban logistics infrastructure under pandemic constraints was also developed. Materials of the article are relevant for developers of city plans, managers of urban logistics infrastructure, employees of enterprises participating in transport and logistics markets, scientists, and doctoral students.

Relation between Leisure Constraints and Participation by Leisure Types of Security Agent (시큐리티요원의 여가유형에 따른 여가제약과 참가의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.826-835
    • /
    • 2009
  • This study is to examine the relation between leisure constraints and participation by leisure type of security agents. By using purposive sampling method, this study collected 387 questionnaires in 14 private security service registered in 2009 at the Seoul National Police Agency. Cronbach's $\alpha$ .673. The conclusion are as follow. First, leisure constraints difference in socio-demographic characteristics such as sex, age, education level, income, position, job pattern. Second, in case of hobby and cultural activities, higher time constraints showed lesser frequency of participation, higher structural constraints showed lesser period of participation, higher personal constraints showed lesser intensity of participation. On the other hand, high time constraitns had high intensity of participation. In case of play and entertainment activities, even with high self-conscious constraints, it showed increased frequency and period of participation and high personal constraints showed increased period of participation but in contrast, higher structural constraints showed decreased frequency of participation and period. In case of viewing and appreciative activities, even with high interpersonal constraints, frequency and period of participation increased and higher time constraints also had increased period of participation. On the other hand, higher structural constraints showed decrease in frequency of participation and period.

(Design and Implementation of RTP Security Control Protocol for Protecting Multimedia Information) (멀티미디어 정보 보호를 위한 RTP 보안 제어 프로토콜 설계 및 구현)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1223-1234
    • /
    • 2002
  • RTP payload must be encrypted for providing commercial VOD service or private video conference over the Internet. Encryption/decryption delay is minimized because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic md load. During many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Application Study applied to the Encryption at Virtualization Launcher (가상화 런처에서 암호화를 적용한 어플리케이션 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.87-92
    • /
    • 2014
  • Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

A Model of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할계층 모델)

  • 이용훈;김용민;이형효;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.37-45
    • /
    • 2003
  • Role-based Access Control(RBAC) model has advantage of easy management of access control with constraints such as permission inheritance and separation of duty in role hierarchy. However, previous RBAC studies could not properly reflect the real-world organization structure with its role hierarchy. User who is a member of senior role can perform all permissions because senior role inherits all permissions of junior roles in the role hierarchy. Therefore there is a possibility for senior role members to abuse permissions due to violation of the least privilege principle. In this paper, we present a new model of role hierarchy, which restricts the unconditional permission inheritance. In the proposed model, a role is divided into sub roles(unconditional inheritance. restricted inheritance, private role), keeping organization structure in corporate environment. With restricted inheritance, the proposed model prevents permission abuse by specifying the degree of inheritance in role hierarchy.