• Title/Summary/Keyword: security service history

Search Result 54, Processing Time 0.018 seconds

The Investigate of Security Service History focused on 1920s after the Provisional Government in Korea (임시정부 수립 후 1920년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.53-68
    • /
    • 2008
  • The purpose of this study is to investigate about security service history as enlightenment period from the provisional government to 1920s. This study used materials by historical facts for the regulations and books in provisional government, newspapers in 1920s. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Kim Gu, a prominent Korean nationalist leader, was understand of security service which was to protect provisional government from the enemy. So, Kim Gu participated in training of security service agents in the police department of provisional government. Secondly, there was security service agency in the provisional government. In 1920s, security service agency and agents appeared for the first time in regulations of the provisional government. At the beginning of the security service agency's appearance was influenced on background and circumstances for Korean independence activist who helped the independence of Korea from Japan. Thirdly, security service agents leaded an active for independence movement of the private organizations in 1920s. They carried on an independence movement in defiance of Japanese coercion as nationalist in Korea history. Fourthly, security service came out the general society of Korea in 1920s. The security service was not just for safety, but also for its security system and peace of mind, which were influenced by the political situation, social environment in 1920s. For the this reason, now security service has safety perception in Korea despite the historical progress.

  • PDF

The Security Service History focused on 1930s in Korea (1930년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.23-41
    • /
    • 2009
  • The purpose of this study is to investigate about security service history on 1930s in Korea. This study used materials by historical facts for the regulations, books and newspapers in 1930s. In 1930s, security service was unknown details of the historical contents so far. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Korean regional government in Manchuria, which Kokminbu(國民府) organized the security service agency(警護局) for protect government and public security. Most importantly, the security service agency appearanced an important place which were the independence movement and self-governing administration for Koreans in Manchuria. And the security service agency was required by the security service regulations(警護條例) as law. Secondly, diversity activities of security service in police were exposed the duty as 'car escort service(車輛警護)' for offenders, the 'township office guard' from mobsters, 'woodland protect service(林野警護團)' for fire-raisers. security service as police officer were widely application for protection and safety from danger. Thirdly, Mass society was needed to service for public security in daily events such as 'noted singer meeting', 'funeral procession to the graveyard', 'athletic meeting' as private establishment of security service agency in nowadays. people were wanted the private security service(私警護) from 1930s to present. Fourthly, Overseas security service mentioned in attack of politician, protect from poison and security service about train vessel fleet. In 1930s, security service is comprehensive protection which were not only bodyguard, but also safeguard for hazardous materials.

  • PDF

The Development and Expansion of Teukgongmusul focused on Security Service History (특공무술의 개발과 발전에 관한 경호사(警護史)적 함의)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.73-87
    • /
    • 2008
  • The purpose of this study is to investigate the historical progress about Teukgongmusul as bodyguard martial arts focused on security service history through the meaning of its development and expansion. This study used secret materials from presidential security service, military service headquarters and special merit unit in Korea, and also used interview materials by oral history. For the above tasks, the conclusions of this study are as follows: Firstly, consideration about the background and circumstances of Teukgongmusul when it was developed in 1970s. No.606 special merit unit's soldiers who worked in presidential security service in Korea organized Teukgongmusul. Secondly, consideration about the meanings of Teukgongmusul presented through its development and expansion process. Teukgongmusul was bodyguards' martial arts which was based on Army's martial arts in 1970s. For this reason, Teukgongmusul now has the perception as Bodyguard Martial Arts. Thirdly, consideration about the expansion process of Teukgongmusul when it was adopted in Army and presidential security service in Korea. In 1970s special merit unit was included in presidential security service in Korea where Teukgongmusul was developed. Afterward Teukgongmusul was expanded in two different ways which were Army and presidential security service in Korea. In Army Teukgongmusul was expanded by no.5 special merit brigade and was expanded by Hapkido master who was worked as martial arts instructor for presidential security service in Korea. Fourthly, the historical progress of Teukgongmusul as bodyguard martial art was influenced by the political situation.

  • PDF

Emergency Detection Method using Motion History Image for a Video-based Intelligent Security System

  • Lee, Jun;Lee, Se-Jong;Park, Jeong-Sik;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.39-42
    • /
    • 2012
  • This paper proposed a method that detects emergency situations in a video stream using MHI (Motion History Image) and template matching for a video-based intelligent security system. The proposed method creates a MHI of each human object through image processing technique such as background removing based on GMM (Gaussian Mixture Model), labeling and accumulating the foreground images, then the obtained MHI is compared with the existing MHI templates for detecting an emergency situation. To evaluate the proposed emergency detection method, a set of experiments on the dataset of video clips captured from a security camera has been conducted. And we successfully detected emergency situations using the proposed method. In addition, the implemented system also provides MMS (Multimedia Message Service) so that a security manager can deal with the emergency situation appropriately.

An Historical Reconsideration of Korean Presidential Security Service during the 1st and 2nd Republic: Focused on the Chief of the Presidential Security, the Law of Presidential Security Special Order, Presidential Security Organization (제1⋅2공화국 대통령 경호의 역사적 재조명: 경호책임자, 대통령경호특별수칙, 대통령경호대를 중심으로)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.37-59
    • /
    • 2016
  • The purpose of this study is to investigate about security service history during the 1st and 2nd Republic. The 3rd Republic, one of the important periods, deserves special emphasis until now. But Compared with 1st and 2nd Republic, the 3rd Republic is inferior. Although security service history excluded the 1st and 2nd Republic. This research focused on the two points about the chief of the presidential security and the law of presidential security special order. Firstly, the chiefs of the presidential security in 1st Republic were Kim, Jang-Heung Seo, Jung-Hak Kim, Kuk-Jin Kwak, Young-Joo. Secondly, The law of presidential security special order be specified in Korean presidential security for the first time. Before the 1st Republic already recognized the importance of security services when they adopted the first security service regulations on December 29, 1949, which comprised 25 articles. But this law was only focused on presidential security and promulgated the law more than 10 years ago than law of the office of the Presidential Security in 1963. Deplorable in this law was declared by statute on July 7, 1953 from the 1st Republic, but repealed in 1960 after the 2nd Republic. Thirdly, 2nd Republic established the presidential security organization with the new government has been formed. In spite of this organization can not be kept for a long time, 2nd Republic attempted to professional forms of presidential security organization. The research of secret service history must continue to advance for academical learning.

  • PDF

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

A Study on The United States Secret Service (미국 대통령경호제도에 관한 고찰)

  • Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.299-317
    • /
    • 2001
  • The United States Secret Service is the strongest presidential protective organization in the world. Almost every country's security organization in the world is benchmarking its organization, protective operation system, security equipments and etc. In this paper, I study largely on the protective operation system of the U.S Secret Chapter I is the introduction part. Chapter II introduces the establishment and the background of its development of the U.S Secret Service. Chapter III deals with the organization and ranking system of the U.S SS. Chapter IV consider the protective operation system of the 5.5. The main theory of the protective operation is the 'Protective Envelope Philosophy' which emphasizes the "Cover and Evacuate". Also the protective operation system is developed with the principle of the democracy and in the history of continuing assassination attempt against president. Chapter V describes the legal basis and missions of the S.S. Every protective operational mission of the U.S SS is peformed by the legal basis and democratic procedure. It is followed by concluding observation made in Chapter VI.

  • PDF

Design Blockchain as a Service and Smart Contract with Secure Top-k Search that Improved Accuracy (정확도가 향상된 안전한 Top-k 검색 기반 서비스형 블록체인과 스마트 컨트랙트 설계)

  • Hobin Jang;Ji Young Chun;Ik Rae Jeong;Geontae Noh
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.85-96
    • /
    • 2023
  • With advance of cloud computing technology, Blockchain as a Service of Cloud Service Provider has been utilized in various areas such as e-Commerce and financial companies to manage customer history and distribution history. However, if users' search history, purchase history, etc. are to be utilized in a BaaS in areas such as recommendation algorithms and search engine development, the users' search queries will be exposed to the company operating the BaaS, and privacy issues will be occured. Z. Guan et al. ensure the unlinkability between users' search query and search result using searchable encryption, and based on the inner product similarity, they select Top-k results that are highly relevant to the users' search query. However, there is a problem that the Top-k results selection may be not possible due to ties of inner product similarity, and BaaS over cloud is not considered. Therefore, this paper solve the problem of Z. Guan et al. using cosine similarity, so we improve accuracy of search result. And based on this, we design a BaaS with secure Top-k search that improved accuracy. Furthermore, we design a smart contracts that preserve privacy of users' search and obtain Top-k search results that are highly relevant to the users' search.

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).