• Title/Summary/Keyword: 경비교육

Search Result 288, Processing Time 0.025 seconds

The Relationship between the Stage of Exercise Behavior Change and Physical Self-Concept and Self-Efficacy of Casino Security Employees (카지노 시큐리티 종사자의 운동변화단계에 따른 신체적 자기개념과 자기 효능감의 관계)

  • Chun, Yong-Tae;Oh, Jung-Il
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.95-120
    • /
    • 2009
  • This study was designed to investigate the relationship between the stages of exercise behavior change and physical self-concept and self-efficacy of security employees in hotel casinos. The sampling was drawn from employees at 8 casinos which had more than 30 employees. Participants were selected by convenience sampling method and they completed questionnaires about Physical Self-Concept and Self- Efficacy by self-administration method under supervision of trained researchers SPSS 16.0 (Statistical Package for the Social Science) was used for data analysis in the present study. Reliability and validity were examined for the present study. The principle component factor analysis and varimax rotation were used for the present study. Eigen value 1.0 was the criterion for selecting factors. Chi-square (X) 2 test was utilized for measuring the difference in gender and types of job duties at the stages of exercise behavior change. One-way ANOVA was employed to examine the relationship between the stages of exercise behavior change as an independent variable and physical self-concept and self-efficacy as dependent variables. The Scheffe method was used to determine mean differences of groups as a follow-up test. Multiple regression analysis was utilized to test the difference of physical self-concept as dependent variable and self-efficacy as independent variable. To verify hypothesis for the study, a statistical significance level of $\alpha$=.05 was used. The results were as follow: first, there were differences found for gender and types of job responsibilities in the stages of exercise behavior change. Secondly, as security employees progressed through the stages of exercise behavior change, their physical self-concept and self-efficacy improved. Finally, physical activity and body fat had significant main effects on self-efficacy.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

The Judgment of Criminal Liability and Psychiatric Evaluation for Mentally Defective Person (정신장애자의 형사책임능력 판단과 정신감정)

  • Jung, Yong-Gi
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.177-204
    • /
    • 2015
  • The Korean Criminal Code ${\S}10$ (1) provides that "The act of a person who, because of mental disorder, is unable to make discriminations or to control one's will, shall not be punished". Therefore, it'll not be able to be given criminal punishment if a mentally defective person is determined to lack the criminal liability. The problem about judging the criminal liability for the mentally defective person exists in areas where the criminal law intersects with psychiatry. Although the supreme court ultimately judges whether the criminal liability by mental defectiveness exists or not, the judgment of mental defectiveness, which is biological element, needs psychiatric knowledge and it is no wonder to rely on this. In particular, a change is required in the procedure and contents of mental examination for a mentally defective person as implementation of the Civil Participation in Criminal Jury Trial. It is needed the improvement of procedure to submit more accurate mental examination and the result of it in order that jurors are able to understand the result of mental examination and make an decision. This is because jurors consisting of ordinary citizens take part in trial. For guaranteeing the precise result of mental examination in the criminal justice procedure, it is necessary to establish the pool of manpower consisting of psychiatrists or psychologists who have completed the specific educational programs about the criminal justice and legal psychiatry, and it is desired to carry out the psychiatric test with selecting appraisers who belong to a pool of manpower. Furthermore, it is required to draw up and submit the written appraisal of mental examination which is easy to be known because of considering the nonprofessional of jurors consisting of ordinary citizens in the Civil Participation in Criminal Jury Trial. In order to gain a fair verdict of the jury about whether mental defectiveness exists or not, it is recommended the prompt submission of the written appraisal of mental examination, the presentation of the written appraisal of mental examination summarizing the important contents, and making out the written appraisal of mental examination for jurors to understand it easily.

  • PDF

A Study on Streamlining the Legal Framework for the Efficient Management of Protection and Security of the Government Complexes (정부청사의 효율적 방호·보안관리를 위한 법령체계 정비방안에 대한 소고)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.39-57
    • /
    • 2019
  • The executive authority of the Ministry of Public Administration and Security on the 'management of security of the government complexes' is not sufficiently secured only with the organization law, the Government Organization Act. It is needed to establish an administrative actions law, an individual law that sets detailed contents and limitations of the executive authority to be stipulated. The current regulation, Regulation on the Management of the Government Complexes which is a Presidential Decree, is a legal decree that lacks a legal basis. The decree does not match with the current constitutional framework and raises the issue of its legality. The regulation may have the characteristics as a public property management law so far as it stipulates such matters as supply and maintenance management for the complexes, acquisition and disposition of complexes, facilities management of complexes, etc. However, the regulation includes high authority actions by an administrative organization, such as facilities security and order maintenance including restriction and control of access. This makes the regulation have the characteristics of a public property policy act as well. To supplement the legal framework for this situation, it is needed to level up some of the provisions relating to protection and security management to the level of an act as they stipulate high authority actions by an administrative organization. Other matters in the Regulation on the Management of the Government Complexes such as provisions relating to supply and allocation of complexes, etc. may be maintained as they are. In addition, the protection officers (general service official) does not own legal authority and have limitations on securing the capability to deal with the situations on implementing the on-site protection duty. Therefore, it is needed for the protection officers to secure protection duty-related authority by stipulating in a law. The main contents of the law on the protection and security of the government complexes may be those matters providing reservations on the implementations of laws. These may include the limitation of rights of and charging obligations on the people such as restricting the actions of personnel in the complex, rights and obligations of protection personnels relating to their duties, use of weapons, training of protection personnel, penal provisions, etc. These legal reservations should be included in an individual act.

Research on the Measures and Driving Force behind the Three Major Works of Daesoon Jinrihoe in North Korea in Case of the Respective Types of Unification on the Korean Peninsula (한반도 통일 유형별 북한지역의 대순진리회 3대 중요사업 추진 여건과 방안 연구)

  • Park, Young-taek
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.39
    • /
    • pp.137-174
    • /
    • 2021
  • The main theme of this paper centers on how to promote Three Major Works of Daesoon Jinrihoe, charity aid, social welfare, and education projects, during the unification period. Determining the best methods of promotion is crucial because the Three Major Works must be carried out after unification, and the works must remain based on the practice of the philosophy of Haewon-sangsaeng (the Resolution of Grievances for Mutual Beneficence). The idea of Haewon-sangsaeng is in line with the preface of the U.N. Charter and the aim of world peace. North Korean residents are suffering from starvation under their devastated economy, which is certain to face a crisis of materialistic deficiency during reunification. In this study, the peaceful unification of Germany, unification under a period of sudden changes in Yemen, and the militarized unification of Vietnam were taken as case studies to diagnose and analyze the conditions which would affect the implementation of the Three Major Works. These three styles of unification commonly required a considerable budget and other forms of support to carry out the Three Major Works. Especially if unification were to occur after a period of sudden changes, this would require solutions to issues of food, shelter, and medical support due to the loss of numerous lives and the destruction of infrastructure. On the other hand, the UNHCR model was analyzed to determine the implications of expanding mental well prepared and sufficiently qualified professionals, reorganizing standard organizations within complex situations, task direction, preparing sufficient relief goods, budgeting, securing bases in border areas with North Korea, and establishing networks for sponsorship. Based on this, eight detailed tasks in the field of system construction could be used by the operators of the Three Major Works to prepare for unification. Additionally, nine tasks for review were presented in consideration of the timing of unification and the current situation between South and North Korea. In conclusion, in the event of unification, the Three Major Works should not be neglected during the transition period. The manual "Three Major Works during the Unification Period" should include strategic points on organizational formation and mission implementation, forward base and base operation, security and logistics preparation, public relations and external cooperation, safety measures, and transportation and contact systems.

Effects of Seeding Rate and Nitrogen Fertilizer Level on Growth and Seed Productivity of Rye Cultivar in Sancheong Province (산청지역에서 파종량 및 질소 시비량에 따른 호밀의 생육과 종실 수량)

  • Kim, J.S.;Kim, J.J.;Han, O.K.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.22 no.2
    • /
    • pp.89-97
    • /
    • 2020
  • This experiment was conducted at Sancheong from 2013 to 2015. The objective of this study was to establish the seeding rate, and to clarify the optimum nitrogen fertilizer level for rye seed production in the southern area of Korea. We employed Korean rye cultivar 'Gogu' in this test. The experimental design was a split-plot design with three replications. A split-plot design was used with three seeding levels (3, 5, and 7 kg 10 a-1) on the main plots and other treatments fully randomized in sub-plots. A factorial arrangement of treatments included three different nitrogen fertilizer levels (0, 3, 6, and 9 kg 10 a-1). The grain yields of rye affected by increasing the seeding rate. The number of spike per m2 and immature grain weight was increasing, while the fertility rate and the number of grain per spike were decreased as seeding rate were increased from 3 kg 10 a-1 to 7 kg 10 a-1. The percentage of a productive tiller, 1-liter weight, and 1000-grain weight also decrease by increasing seeding but the grain yields of rye had less effect. There was an increase in the number of spike per m2, the number of grain per spike, and grain yields as nitrogen fertilizer level was increased from 0 kg 10 a-1 to 9 kg 10 a-1 and followed a delaying heading and an increasing lodging of the plant. But grain yields did not affected by the interaction of seeding rate × nitrogen fertilizer levels. The best seeding rate and nitrogen fertilizer level for rye seed production were 5 kg and 3 kg 10 a-1, respectively, considering seed and fertilizer reduction and the prevention of pollution by excess fertilization.