• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.03 seconds

A Study on the Procedure Model to Carry on Works of the Private Security Company (민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

A Study on the Relationship between the Interpersonal Stress in Private Security Officers and Their Job Satisfaction and Turnover Intention (민간경비원의 대인관계스트레스와 직무만족, 이직의도의 관계에 관한 연구)

  • Kim, Chang-Ho;Ha, Jung Hoon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.115-137
    • /
    • 2013
  • This study aims to confirm the effect of different types of interpersonal stress factors of private security officers that are prevalent in the course of carrying out their duties on job satisfaction and turnover intention. The authors have examined 175 of the 200 survey questionnaires distributed to the employees of private security firms located in Seoul and Gyeonggi Province in December 2012. The result of the analysis indicates that the primary source of stress in the private security officers is the interaction with customers, followed by the relationships with colleagues and superior officers. In addition, colleague-related stress is found to be the only interpersonal stress factor with a statistically significant negative effect on job satisfaction, while both the stress from the relationships with colleagues and superior officers are positively correlated with turnover intention. Furthermore, the colleague-related stress is revealed to mediate job satisfaction which has a statistically significant effect on turnover intention. The result from the study emphasizes the importance of managing the interpersonal stress in private security officers and confirms the necessity of effectively handling the stressful situations in the relationships with colleagues. Moreover, in order to raise job satisfaction levels and minimize turnover which is vital in accomplishing the goal of each organization, causal factors of the stress need to be recognized and handled appropriately. This will provide the future research with an insight into the effective interpersonal stress management and examining other factors of job satisfaction and turnover intention of private security officers.

  • PDF

Security Assessment Metrics Model for Online Services (온라인 서비스를 위한 보안성 평가 지표 모델)

  • Choo, Yeun-Su;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.326-333
    • /
    • 2014
  • Internet Services have security issues. To prepare proper security measures for these security issues, security level setting is positively necessary. Until now, we use a security level with CIA (Confidentiality, Integrity, and Availability) Security Levels. However, CIA Security Levels has problems with ambiguous measures for the middle level of security setting. Moreover, security level overlap occurs, in some cases, when user authentications are not done. Additionally, there exist some levels among CIA Security Levels which cannot be applied to Internet services. In this paper, new security level model, CIAA Security Levels with deletion of ambiguous middle level of security setting and addition of authentication to one of security level setting factors, is proposed. The CIAA Security Levels model can be applied to more concrete security measures than CIA Security Levels. The proposed Security Levels model is applicable to almost any on-line services and it can be applied to new online services.

The relationship between internal marketing and food safety, and the moderating effect of employment type in food service industry (외식업체 근로자의 내부마케팅과 식품 안전분위기의 관계 및 고용형태의 조절효과)

  • Ahn, Kwan-Young;Bae, Jung-Nam
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.2
    • /
    • pp.151-159
    • /
    • 2013
  • This paper reviewed the relationship between internal marketing(management support, education, pay system, internal communication, employment security) and food safety climate(prevention, superior attitude, work condition), and the moderating effect of employment type(permanent or temporary employees) in food service company. Based on the responses from 304 responses, the results of hierarchical multiple regression analysis showed that 4 factors(management support, education, internal communication, employment security) effect positively on food safety climate(prevention, superior attitude, work condition). The positive effect of internal communication on superior attitude and work condition appeared to be more positive in permanent employees than in temporary employees. And the results of t-test analysis showed that permanent employees perceived more positively all internal marketing factors(management support, education, pay system, internal communication, employment security) and food safety climate(precaution, superior attitude, work condition) than temporary employees.

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

An Analysis of the Case Study on Fashion Show Planning and Production (패션쇼 연출기획의 사례분석연구)

  • 오현남;김현주
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.11
    • /
    • pp.11-20
    • /
    • 2003
  • The purpose of this study is : first, to examine factors of fashion show planning and production and to classify types of fashion show planning and production: second, to compare and analyze the factors through a case analysis to defined their differences. For the purpose, data are collected to compare and analyze from literature as well as the interview with fashion show planning and production companies in Korea. The result shows that all the factors are considered on a practical level except security and publicity among 15 factors presented in literature : the purpose of the show, target spectators, product selection, product prices, type of show, size, location, models, time of show, duration, theme, security, budget, and publicity. Show types are divided into national brands, designer brands, imported brands, and collections. The result of the comparison and analysis of the factors of the planning and production by type shows that factors vary greatly depending on the purpose of the show, target spectators, and form of the show and products. By analyzing the case study on fashion show planning and production on a practical level, the study recognizing the need of specialized development of fashion show planning in Korea's fashion industry, is a basic process of theory systematization for the planning and production in its marketing aspects, and will provide relevant theories in such aspects for those who want to enter into the field.

Factors Affecting User Acceptance of Mobile Commerce Services

  • Jun, Jungho;Lee, Kyoung Jun;Kim, Byung Gon
    • Asia pacific journal of information systems
    • /
    • v.26 no.4
    • /
    • pp.489-508
    • /
    • 2016
  • Growth in the use of mobile commerce services (MCS) as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technology. As more and more companies are finding ways to utilize MCS, an important issue is to understand what factors will affect the decisions of consumers in adopting the services. Based on TAM with two additional groups of external factors (i.e., service-related factors [ubiquitous access and contextual service] and technology-related factors [perceived security risk and network connectivity]) that are theoretically justified to affect both perceived usefulness and perceived ease of use, which are also considered, a research model for the investigated technology acceptance was developed and empirically examined. The major results of this study are as follows. First, ubiquitous access affects perceived usefulness and perceived ease of use. Contextual service affects perceived usefulness. Second, perceived security risk affects perceived usefulness and perceived ease of use. Finally, network connectivity affects perceived usefulness and perceived ease of use.

Development of Success Attribution Scale for Body Guard in Korea (한국 경호원의 성공귀인 측정도구 개발)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.173-183
    • /
    • 2017
  • This study is for presenting the factors about success attribution that fit the korean security service conditions and developing the actual analysis of measurement tools by investigating the success factors of the security service agents. To this end, conducted a meeting from the fully open questionnaire at first, and then formed the semi-structured questionnaire, finally carried out the survey from the closed questionnaire and analyzed data from SPSS 21.0, AMOS 21.0 and developed the measurements. It was conducted from December, 2014 to June, 2015. This survey was conducted of 170 security guards after the verification of the content validity though the pilot survey and presented the success attribution factors and standards on the basis of the result form this survey. At the first and second analysis process, the success attribution factors of the guards consisted of inner qualities, external qualities, induction factors for inner qualities, and induction factor for external qualities. On analysis of the final data and documents, however, at the third analysis, the success attribution factors of the guards consisted of 'martial arts and physical ability'(4 questions), 'attitudes to work'(3 questions), 'support for the working environment'(3 questions), 'organized business skills'(3 questions), 'attitudes to the duty'(3 questions), and 'coping with crises(2 questions).

For the efficient management of electronic security system false alams Study on hybrid Crime sensor (기계경비시스템 오경보의 효율적 관리를 위한 복합형 방범센서에 관한 연구)

  • Kim, Min Su;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.71-77
    • /
    • 2012
  • Expenses in the form of personnel expenses in the past, in modern times, machine guards to gradually transition has been. This is because the machine guard is more efficient than personnel expenses. But due to false alarms, despite the high expectations of the effects of electronic security in the operation of the electronic security system due to factors that hinder the development of machine guards growth slows. Defect removal aspects of this paper, using IPA (Importance Performance Analysis) techniques to study the operation of electronic security systems and its importance in the development of machine guards, look at how high the technical aspects of electronic security systems composite type of malfunction to minimize crime sensor are presented.

A study on the managed security services(MSS) method for energy-based SCADA Systems (에너지 기반보호시설의 보안관제 방안에 관한 연구)

  • Jang, Jeong-Woo;Kim, Woo-Suk;Yoon, Ji-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.279-292
    • /
    • 2015
  • In this study, we propose an effective network managed security services model that can detect a presence of potential malicious codes inside the energy-based SCADA Systems. Especially, by analyzing the data obtained in the same environment of SCADA Systems, we develop detection factors to applicable to the managed security services and propose the method for the network managed security services. Finally, the proposed network managed security services model through simulation proved possibility to detect malicious traffic in SCADA systems effectively.