• Title/Summary/Keyword: 경비능력

Search Result 144, Processing Time 0.022 seconds

Development of Measurement Tools for Success and Failure Factors of Education and Training of Korean Bodyguard

  • Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.199-206
    • /
    • 2020
  • This study was conducted for the purpose of developing a measurement tool for success and failure factors of education and training of Korean bodyguards. conducted a meeting from the fully open questionnaire at first, and then formed the semi-structured questionnaire, finally carried out the survey from the closed questionnaire and analyzed data from SPSS 21.0, AMOS 21.0 and developed the measurements. It was conducted from May, 2019 to December, 2019. This survey was conducted of 150 security guards after the verification of the content validity though the pilot survey and presented the success attribution factors and standards on the basis of the result form this survey. As a result, the success factors of the training of the bodyguards were accidental education (5 item), vocational mental education (2 item), vocational mental education (2 item), work ability enhancement education (2 item), realistic practical education (2 item) ), Including 4 items, 11 items, The failure factors consisted of 12 item of three factors: formal education and training (5 item), lack of leadership qualities (4 item), and lack of education (3 item).

Standardized Integration of Different Systems for the Establishment of a Korean Maritime Domain Awareness System (한국형 해양상황인식체계 구축을 위한 시스템간 표준화 연계방안에 관한 연구)

  • Kim, Young-Sup;Song, Chae-Uk
    • Journal of Navigation and Port Research
    • /
    • v.45 no.4
    • /
    • pp.204-211
    • /
    • 2021
  • The Maritime Domain Awareness system is a component that is necessary to enhance the awareness of all situations occurring at sea in relation to security, safety, economy, and the environment. To establish a marine situation recognition system that is currently being introduced in major maritime countries after approval by the International Maritime Organization's Maritime Safety Committee in 2010, operational measures should be established. For the purpose of establishing a technological foundation for the efficient construction of a Korean maritime situation recognition system, this study analyzed the status of each system (RADAR, VHF, and V-PASS, etc.) and proposed the application of data and communication standards.

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

Research on the New and Senior Security Guard's State Anxiety before Task Performance (신입경호원과 선임경호원 간의 업무수행 전 상태불안에 관한 연구)

  • Jung, Joo-Sub;Park, Jeong-hun
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.109-131
    • /
    • 2010
  • This research analyzed how the new and senior security guards employed privately are influenced on their task performance by the factors operated before task performance: cognitive state anxiety, physical state anxiety and state confidence which are the sub-factors of the Competitive State Anxiety(CSAI-II) according to the educational background, career, gender and athletic capacity. First, as for the new and senior security guards' state anxiety before task performance, the senior guards felt the cognitive anxiety more than the new guards, but there was not a distinct difference statistically. Therefore, it is estimated that there is little difference in the level of cognitive anxiety between the new security guards with insufficient career and the seniors. Second, the level of the physical state anxiety was shown higher from the senior guards than from the new ones and had a distinct difference. However, it seems to be derived from the extent of physical development as the seniors are at the time of vigorous physical development. Third, the level of state anxiety had no distinct difference between them statistically though the new security guards felt it higher than the seniors. Fourth, the state confidence was shown higher from the seniors than from the new and had a distinct difference statistically, also. Fifth, as for gender, the male and female guards did not have a difference so much in the cognitive and physical state anxiety, and state confidence. Sixth, as a whole, the state anxiety was highest as for the security guards with athletic capacity level 1 and 2. Those with the level 2, and 3 and the level above 7 felt it less than those with the level 5-6, which had a distinct difference in statistics. The manager of the new and senior security guards should make them dispel anxiety in piece of mind through physical and mental education encouraging them to have self-confidence, practical training, and psychological training based on the analysis of causes of various cases.

  • PDF

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

A Study on Women's Casino Security Employees (여성 카지노 시큐리티 종사원에 관한 연구)

  • Kim, Hyeong-seok
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.135-158
    • /
    • 2020
  • In casinos, security personnel who manage the safety of customers and employees play a very important role. In particular, there is a high percentage of female employees in casinos, and because the ratio of female and male employees is similar, the probability of female customers or female employees experiencing accidents may be similar to or higher than that of males. Women's security agents who handle women's case accidents can provide female customers and employees with a security service that only women can do. However, most of the agents doing security work at casinos are male, and the proportion of women is very low. Therefore, this research is about employees who are currently working as women in casinos and conducted qualitative research to find out about various experiences they experienced while working in the casino. A total of five study participants were interviewed three times to analyze and categorize the data collected. The first question is the professor's recommendation, his personal information search and his acquaintance's recommendation. The second question, the factors behind the necessary skills at work, are various athletic skills, good physical conditions and foreign language skills. In the third question, the satisfaction factors of the task are the scarcity value of the work, the satisfaction of the pay, the suitability of the individual and the expectation of the future, and the unsatisfactory factors of the work are the risk of the work, the stress on the customer, the discrimination against the sex, the gaze around, the tiredness of the shift work. In the fourth question, factors on the need for female casino security agents are providing differentiated services to female customers, protecting female employees and providing opportunities for women in related majors. The results of this study were interviewed by an expert of more than 20 years in the casino security business, and female casino security agents said that since it is a necessary requirement, they should seek a direction for development through institutional and cognitive improvement.

Optimal Cost Design of Pipe Network Systems Using Genetic Algorithms (遺傳子 알고리즘을 이용한 管網시스템의 最適費用 設計)

  • Park, Yeong-Su;Kim, Jong-U;Kim, Tae-Gyun;Kim, Jung-Hun
    • Journal of Korea Water Resources Association
    • /
    • v.32 no.1
    • /
    • pp.71-81
    • /
    • 1999
  • The objective of this study is to develop a model which can design an optimal pipe network system of least cost while satisfying all the design constraints including hydraulic constraints using a genetic algorithm technique. Hydraulic constraints interfaced with the simulation program(KYPIPE) checked feasible solution region. Genetic algorithm(GA) technique is a relatively new optimization technique. The GA is known as a very powerful search and optimization technique especially when solving nonlinear programming problems. The model developed in this study selects optimal pipe diameters in the form of commercial discrete sizes using the pipe diameters and the pumping powers as decision variables. The model not only determines the optimal diameters and pumping powers of pipe network system but also satisfies the discharge and pressure requirements at demanding nodes. The model has been applied to an imaginary and an existing pipe network systems. One system is adopted from journal papers which has been used as an example network by many other researchers. Comparison of the results shows compatibility of the model developed in this study. The model is also applied to a system in Goyang city in order to check the model applicability to finding of optimal pumping powers. It has been found that the developed model can be successfully applied to optimal design of pipe network systems in a relatively simple manner.

  • PDF

Government position, failure causes over 9.11 terror, Iraq war (9.11 테러와 이라크전에 미친 정보의 역할, 실패원인)

  • Baek, Jong-Kap;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.207-234
    • /
    • 2007
  • This study examines the roles of government and reasons of defeat on 9.11 terror, iraq war between 2001 and 2003. The administration functions critical role of national security. And punctual, accurate information supply capability helps policymaker's decision-making. Hence, information of punctuality and accuracy should be given to policymakers. And without two above written factors, it will result in failing. Information concoction on policymaker's pressure, biased informant, inaccurate information and lack of assembly means under the extensive organization and technologized spying means, Fail to keep information objectivity, leads to information failure. In the context of a series of facts, we shall cover the position of government and reasons of calamities. Two incidents deem as information failure by national security service, but concoction of Iraqi mass destruction weaponry is believed as bush administration's deception on account of political gains. For fully functional government role, governing body should reinforce all aspects of gathering, analyzing, and making use of information more objectively in the first place. In particular, information concoction involving policymakers post massive stumbling block to organized outcome. The thesis presents a prospective view of government position under the U.S. secret agent over 9.11 terror and Iraq war.

  • PDF

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.