• Title/Summary/Keyword: private security policy

Search Result 197, Processing Time 0.025 seconds

Mid- to Long-term Food Policy Direction

  • Bo-ram Kim
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.6-6
    • /
    • 2022
  • Prolonged Russia-Ukraine war, and unstable situation of supply and demand of global crops including the COVID-19 pandemic have raised awareness regarding food crisis, and in addition to this situation, export restriction measures imposed by some countries have accelerated the rise in the prices. Since the Republic of Korea depends annual crop consumption (21.32 million tons) mostly on the imports (food self-sufficiency rate in 2020 was 45.8%, crop self-sufficiency rate was 20.2%), our main task is to stably secure food. Now we need to put focus on building capacity to secure stable food supply, and actively manage and respond to risks. To overcome this condition, the Korean government set robust food sovereignty as its policy task, and has been focusing on the policy capacity by providing financial and policy support in parallel. We need to implement mid- to long-term measures to strengthen food security as well as to ensure domestic price stability. While increasing the domestic capacity to supply food in the mid- to long-term perspective, we are implementing projects to bring in crops which are inevitable to be imported by private companies. Specifically, we are making efforts to expand infrastructure for the public reserve and domestic production of wheat and beans which have low self-sufficiency rate, and to secure food sovereignty by providing support to secure global crop supply chain to private companies. The Ministry of Agriculture, Food and Rural Affairs plans to set a target for food self-sufficiency rate and prepare a policy to strengthen mid- to long-term food security by establishing a task force to strengthen mid- to long-term food security in the Ministry. Especially, although wheat is the second staple food, domestic wheat production and the foundation for the industry is poor. Compared to the wheat imports, domestic production of wheat is 30 thousand tons (self-sufficiency rate of 1%), leading to a vulnerable status against internal and external shocks. Through the establishment of the Wheat Industry Promotion Act (Feb. 2020) and the First Master Plan for Wheat Industry Promotion (Nov. 2020), the Korean government has developed a policy basis, and has been providing financial support in overall across the production, distribution and consumption process. In addition, the government established a production complex for Korean wheat and beans in order to supply affordable government-supplied commodities, provide education and consulting services, and create a high-quality stable production system, including facilities and equipment. We are also continuing to increase the public reserve for wheat and beans with the purpose of stable supply and demand as well as food security. The Korean government will establish and implement mid- to long-term measures to strengthen the foundation for domestic production across production, distribution and consumption process, and to stably secure global supply chain including through diversified import channels.

  • PDF

Convergence of Related Standard of CC and ISO for Security Evaluation of VPN (VPN의 보안성 평가를 위한 CC와 ISO 관련 표준의 융합)

  • Lee, Ha-Young;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.341-348
    • /
    • 2016
  • Because VPN(Virtual Private Network) uses internet network, the security technique should support it and evaluation technique based on standard should support it. Therefore the method should be organized that can evaluate the security of VPN based on the related standard. In this study, we intended to construct the security evaluation model through combining CC(Common Criteria) which is a evaluation standard and a part of security(Confidentiality, Integrity, Non-repudiation, Accountability, Authenticity) evaluation of ISO which is the standard of software quality evaluation. For this, we analyzed the quality requirements about intra-technology and security of VPN and constructed the evaluation model related to the quality characteristics of two international standard. Through this, we are able to construct a convergence model for security evaluation of VPN. Through accumulating the evaluation practices for VPN in the future, the suitability and validity of the evaluation model must be improved.

Analysis on the Leisure Constraint and Index Concentrate Here Improvement's Leisure Activities among the Private Security Agents Applying PPA Technique (PPA기법을 적용한 민간경호경비원의 여가제약과 중점개선 여가활동 참가지수 분석)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.317-325
    • /
    • 2010
  • This study aims to deduct the extensive improvement types of leisure activities of private security agents using PPA technique and to examine the influence of leisure constraint on the index of participation. Through this process, this study consequently will draw the priority list of investment on the policy for improving the welfare status of private security agents. In this study, judgement sampling was applied to 6 security agencies located in Seoul, 2010, and 267 cases were used in the final analysis. Collected data went through factor analysis, reliability analysis, paired t test, PPA analysis, and regression analysis by using SPSSWIN 17.0. The conclusions were drawn as follows. In regard to the reliability, Cronbach's $\alpha$ was over .768. First, there was a difference between the preference rate and the participation rate which are the participation index of the private security agents' leisure activities. concentrate here in leisure types turned out to be fitness activities, walking/jogging, tourism, a day-long travel, and keep up the cood work in leisure types are movies, domestic tourist attractions, dating, eating out, personal relationship, watching sports, reading, karaoke, TV video watching, drinking etc. low priority in leisure types are water sports, hiking, biking, soccer, photography, ball games, sky sports, playing go/janggi, inline skates, and cooking. Second, the leisure constraint affects the participation index of leisure activities. As the personal constraint, and surrounding conscious constraint which are the subordinate factors of the leisure constraint get bigger, the participation index of favored leisure activities become lower. In contrast, when the difficulties such as structural constraint, time and economical constraint are overcome, participation index of leisure activities go on the rise.

Impacts of Punishment and Ethics Training on Information Security Compliance: Focus on the Moderating Role of Organizational Type (처벌과 윤리교육이 정보보안준수에 미치는 영향: 조직유형의 조절효과를 중심으로)

  • Ahn, Joong-Ho;Park, Jun-Hyung;Sung, Ki-Moon;Lee, Jae-Hong
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.23-42
    • /
    • 2010
  • Although organizations are given various benefits with information technologies, they sometimes have suffered fatal damages due to information security incidents now such as computer virus, hacking, counterfeiting, plagiarizing, etc. The fundamentalcauses of information security incidents are closely related to individuals who do not comply with information security policy or rules. The spontaneous self-control of individuals and monitoring for individuals could be the most essential solution for the ongoing observance of information security policy. Thus, the purpose of this study is to analyze effects of punishment and ethics training on compliance of information security policy of individuals in organizations, to determine individual divide among security propensity depending on organization types, and to find the more fundamental solution which leads change of organizational members’ behaviors and self-control. Regardless of the type of organizations, the results of the study suggest that there exist positive effects of punishment and ethics training in all types of organization on compliance of information security rules or regulations. A member of unitary form organization has higher cognition of punishment than a member's cognition of the multi-divisional form organization, while relatively lower awareness of ethics training. Also, a member of public organization has higher awareness of ethics training than a member’s awareness of private organization, while lower cognition of punishment. Finally, the result shows that punishment and ethics training may be major factors which affect information security. It also suggests that organizational security managers have to understand and consider organization member’s propensity relying on organization form and organization characteristics for establishment and enforcement of information security policy.

A study on Development of Certification Schemes for Cloud Security (국내 클라우드 보안 인증스킴 개발에 관한 연구)

  • Jung, Jin-Woo;Kim, Jungduk;Song, Myeong-Gyun;Jin, Chul-Gu
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.43-49
    • /
    • 2015
  • As the cloud computing law was passed in March, 2015, many private companies and public organizations give consideration to introduce cloud computing services. However, most of them are still concerned about the security issues in cloud computing services. To solve the problem, a certification system of cloud security is necessary as an enabler for adoption of the trusted cloud services. There have been a number of studies about certification systems for cloud security, but only few studies exist about certification scheme of cloud security. Therefore, in this study, foreign certification systems for cloud security are analyzed to draw requirements for developing a domestic certification scheme for cloud security. Based on the result of analysis, this study proposes the three certification schemes of cloud security, which have been reviewed by the focus group interview method to draw advantages and disadvantages of each scheme.

App Store security policy trends (앱스토어 보안정책 동향)

  • Bae, Jung-Min;Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.587-590
    • /
    • 2014
  • Spread of smart devices increases, the App Store market is formed so huge, even at this point, every day the scale is increasing now. As a result, for the benefit of companies and private individuals, malicious apps that threaten the security of smart devices, have appeared occasionally in the App Store. Security of the terminal, has issued various solutions through research at many universities and companies, and country. However, solutions for research and policy approaches that are blocking the procedure to register the application malicious app, so that it is not registered in the App Store, Only company that operates the app store is doing it. And the reference is also insufficient, various problems have occurred. In this study, after analyzing the problem of the security policy of the current App Store, presenting the breaking point.

  • PDF

Private sector engagement in large scale solar power deployment in Sri Lanka: Role of green climate fund

  • Liyanage, Namal
    • Bulletin of the Korea Photovoltaic Society
    • /
    • v.6 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • Sri Lanka has strongly understood the importance of mitigation of climate change and various measures have been taken. To tackle the climate change, after ratifying Paris Agreement, Sri Lanka has pledged to reduce her greenhouse gas emission in the energy sector by 20% (16% unconditional and 4% conditional) by 2030 based on the BAU scenario. Simultaneously, the government introduced its new energy policy and strategies in 2019 with a vision of achieving carbon neutrality by 2050. This paper survey related key government documents, policies, reports, and academic articles to investigate opportunities for the private sector to invest large scale solar power deployment (10 MW or above) and to get support from climate finance under article 6 of the Paris Agreement. It has found, growing concern on the environment, energy security issues and increase import expenses for fossil fuels are the main influencing factors to move renewable sources. Further, government investment and FDI both have gradually decreased in the energy sector. Therefore, an alternative financing mechanism is needed. Although the private sector allowed investing in the energy sector since 1996 with the introduction of IPP (Independent Power Producers), it could not make considerable progress on involving large scale solar utility projects. This has revealed government policy is not aligning with the long term generation plan of the electricity sector. The study has also found, it needs more strategic road map, coordination with different institutions, monitoring system to enhance large scale solar contribution.

The Development Path of China's Private Health Insurance and Its Role in the Health Care System (중국 민간의료보험의 발전경로와 의료보장체계에서의 역할)

  • Jung, Kee Taig;Fan, Jian Cheng;Chen, Wan Yun
    • Health Policy and Management
    • /
    • v.31 no.4
    • /
    • pp.423-436
    • /
    • 2021
  • This article summarizes the structure of China's current social health insurance system and reviews the development status of China's private health insurance (PHI). China's medical security system is mainly composed of two parts: basic medical insurance (BMI) and PHI. Among them, the BMI provides reimbursement of basic medical expenses for the insured persons according to different proportions. PHI is a necessary supplement to the BMI and provides assistance to the insured persons in the event of illness or accident. By having PHI, people can obtain medical protection outside the coverage of BMI. In the development of PHI in China, the total medical cost is high and the insurance market size is large, but the proportion of PHI expenditure is low and the personal burden is high. Through this Chinese case, it will be helpful for mutual development between Korean PHI and national health insurance, for Korean insurance companies to enter the Chinese market, and for removing the medical burden on the people.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Assessment Of The Place And Role Of Personnel Management In The General Management System Of The Organization

  • Kovalenko, Yelena;Kirdan, Oleksandr;Krivonos, Anatoliy;Dobrovolska, Olena;Gutsul, Tetiana;Hromov, Sergii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.271-275
    • /
    • 2021
  • The article assesses the role of the human factor in management, analyzes the personnel policy, as well as the style and methods of management at the enterprise. The purpose of the article is to study the place and role of personnel management in the general management system of an organization. Particular tasks of the research have been solved: the place and role of personnel management in the system of general management theory have been determined; determined the place of personnel management in the system of modern sciences.