• Title/Summary/Keyword: public security agency

Search Result 144, Processing Time 0.022 seconds

Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations - (국내외 개인정보보호정책 비교 분석 - 개인정보보호 법률과 전담조직을 중심으로 -)

  • Jeong, Dae-Kyeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.923-939
    • /
    • 2012
  • In the information society, to serve the normal economic activity and to delivery the public service is to secure the privacy information. The government endeavors to support with the privacy protection laws and public organizations. This paper is to study the privacy protection policy in the major countries by analyzing the laws and organizations. At last, The study is to examine the policy tasks to support the privacy protection policy.

A Study on the Reform of the Police in Korea: Focused on Institutional Approach

  • Kim, Taek;Jung, In Whan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.120-126
    • /
    • 2022
  • As part of the police reform, the current government is trying to establish a police bureau under the Ministry of Public Administration and Security and improve the personnel management of the police. Like the prosecution bureau under the Ministry of Justice, the main goal of the police is to establish a police support bureau in the Ministry of Public Administration and Security to have personnel, budget, disciplinary action, and inspection. However, the government's control of police rights was opposed mainly by the "Police Workplace Council," which is like a police union, and even police officials agreed with it, and the opposition was severe. It is becoming a form of struggle between the government and police organizations. As a police major, I don't want to side with anyone and support the police. However, I thought about what democratic control of the police should be with, considered what the police reform plan is, and analyzed the legal and institutional aspects of the current police, and expressed the following issues. First, this paper is as follows: First, we considered what the democratic control of the police was. Second, We focused on reform measures such as the personnel system and institutional approach. Third, I presented my argument on what the police reform plan is.

A Study on Difference between Private Security and Private Investigation (민간경비업과 민간조사업의 차이점 연구)

  • Son, Dong-Woon;Jo, Sung-Gu;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.295-317
    • /
    • 2014
  • In advanced country, private investigation system is made up of private security and in domestic, there is growing need constantly to introduce private investigation but it is not passed until now in assembly so a messenger office which is run illegally is growing because of demand by subdividing business areas. That is a proof that both the police and private security don't meet demand of public peace to the public. that's why the police has own businesses like a investigation, traffic, intelligence, crime prevention and private security's business areas are limited like a facilities security, escort security, protection of a person, machine security, special security as the Private Security Act. This study attempts to know structural difference between private security system and private investigation system in case private investigation system becomes one of the private security. on some question, respondents reply like that private security and private investigation is very different(71.2%), different(22.4%), average(6.3%), similar(0.0%), very similar(0.0%). the result seems like respondents recognize private security and private investigation as different businesses. In the result of non-quantity analysis, the differences seem like a business character, expense, business scope, public power, scale of organization, object of threat, legislation. In domestic, effort to legislate private investigation system has undergone difficulty since congressman Ha Soon Bong's motion in 1999 and today, congressman Yoon Jae Ok's All Amendments Private Security Act and congressman Song Young Geun's Private Inveswtigation Act are pending in assembly. This study's result is intended for examining difference in exploration between private security and private investigation and then there is going to propose to the policy in case private investigation system is passed in assembly by amending Private Security Act like congressman Yoon Jea Ok's All Amendment Private Security Act.

  • PDF

A Study on the Policy Advice of Integrated CCTV Control Center

  • Chung, ChoongSik
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.46-55
    • /
    • 2017
  • In recent years, public area CCTV has also begun to become more popular in the Korea. 2011, Korea's Ministry of Public Administration and Security has recommended that other local governments set up an integrated CCTV control center in each of their districts. The ministry was planning to make it compulsory for local governments to install an integrated CCTV control center by 2015. More than 570,000 public cameras are managed by public agencies and local government offices. Currently, the integrated CCTV control center is playing a very positive role in fighting crimes in the district particularly through its liaison with the district police. The CCTVs were operated by a several different agencies and departments in the district, resulting in considerable redundancy in public service, inefficiency and delays in response to crimes, and other emergency situations. Therefore, Control Center should be operated lawfully and efficiently. CCTV Control Center will be managed by three ways: (1) IT Governance through cooperation with civil areas (2) by regulated with proper laws and (3) managed by proper guideline and personal training.

The relation between the five critical crime of criminal law and the private security services (형법범죄 중 5대 범죄와 민간경비 간의 관계)

  • Joo, Il-Yeob;Jo, Gwang-Rae
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.361-377
    • /
    • 2004
  • This study is to examine the relations between the big five critical crime that consist of homicide, robbery, rape, theft, violence and the private security services. To achieve this objective, this research selected the subject of study, specially, 2002 status of the private security such as the number of companies and employees classified by areas along with the big five crime mentioned above classified by area. The research data is secondary data that is from '2003 Crime Analysis' of the Supreme Public Prosecutors' Office and 'The private Security Related Data' of the National Police Agency. The selected data were analyzed according to the variables by using SPSS 10.0 statistics software program. Each hypothesis was verified around the level of significance ${\alpha}$=.05 by using the statistical techniques, such as Descriptive Statistics, Correlation, Regression, etc. The following was the result of the study, First, the total number of the big five crime affects the number of the companies at significant level. Second, the number of the security companies can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder. Third, the total number of the big five crime affects the number of the security employees at significant level. Forth the number of the security employees can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder.

  • PDF

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

A Study on the Cosponsorship Network in the National Basic Livelihood Security Legislative Revision : Focusing on the ERGM Analysis on the structrual Factors (국민기초생활보장개정법률안 공동발의에 대한 연구 : 구조적 요인에 대한 ERGM 분석을 중심으로)

  • Jung, Yuiryong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.313-320
    • /
    • 2020
  • The aim of this study is to analyze the structural factors of cosponsorship network in the National Basic Livelihiid Security Legislative Revision. This study use ERGM method and Korea Congress Data. The result of the analysis shows outlet effect and transilative effect is negative. It suggests that inactivaion of the congress on the public welfare.

Risk Scoring System for Software Vulnerability Using Public Vulnerability Information (공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템)

  • Kim, Min Cheol;Oh, Sejoon;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1449-1461
    • /
    • 2018
  • As the number of software vulnerabilities grows year by year, attacks on software are also taking place a lot. As a result, the security administrator must identify and patch vulnerabilities in the software. However, it is important to prioritize the patches because patches for all vulnerabilities are realistically hard. In this paper, we propose a scoring system that expands the scale of risk assessment metric by taking into consideration attack patterns or weaknesses cause vulnerabilities with the vulnerability information provided by the NIST(National Institute of Standards and Technology). The proposed scoring system is expanded based on the CWSS and uses only public vulnerability information to utilize easily for any company. In this paper, we applied the automated scoring system to software vulnerabilities, and showed the expanded metrics with consideration for influence of attack pattern and weakness are meaningful.

A RodSecurityRobot Model (로드경비로봇 모델 연구)

  • Yang, Keyong-ae;Shin, Seung-Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.401-406
    • /
    • 2018
  • According to the National Security Service of the National Police Agency, intrusion into empty houses increased form 2013 to 2016. Consequentially this statistics seemed that house intrusion, burglary is increasing. Also according to the statistics of Public Prosecutors'Office, a total 203,573 theft crimes occurered in 2016, of which 18.9% were theft after intruding. By reson of this is most frequent case of intrusion and theft, we have been studing the RodSecurityRobot model to enhance security in many factories to manage. In order to care for security to the high place, we have propsed a road guard robot model which controls the ground in cooperation with the robot that manages the ground by using the drones. The robot and the drone move together to autonomy to avoid objects. And they check time interval. they also goes to the charger to charge when there is no battery.

Study on Cryptographic Analysis of Erebus Ransomware (Erebus 랜섬웨어에 대한 암호학적 분석 연구)

  • Kim, Soram;Kim, Jihun;Park, Myungseo;Kim, Daeun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.339-346
    • /
    • 2018
  • Ransomware is a malicious program that requires money by encrypting data. The damage to ransomware is increasing worldwide, and targeted attacks for corporations, public institutions and hospitals are increasing. As a ransomware is serviced and distributed, its various usually emerge. Therefore, the accurate analysis of ransomware can be a decryption solution not only for that ransomware but also for its variants. In this paper, we analyze a cryptographic elements and encryption process for Erebus found in June, 2017, and investigate its cryptographic vulnerability and memory analysis.