• Title/Summary/Keyword: 민간보안

Search Result 268, Processing Time 0.026 seconds

Regulation and Its Tasks of Privately Contracted Armed Security Personnel on Board Ships Against Somali-based Piracy (소말리아 해적행위 대응을 위한 민간무장보안요원 승선의 규제 및 그 과제에 관한 연구)

  • Keum, Jong-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • The increased threat to commercial shipping by Somalia-based pirates has triggered an increased use of PMSC(Private Maritime Security Contractors). The use of PMSC to protect merchant ships against Somali-based piracy threat seems to have been most effective counter-piracy measures. However, there are various legal and practical questions around using PMSC and PCASP(Privately Contracted Armed Security Personnel) on board at sea. This paper aims to study the regulation and its problems of PMSC and PCASP on board to protect merchant ships against Somali-based piracy in the Indian Ocean and Gulf of Aden. In particular, this paper focuses on the legal issues including jurisdictional issues of PCASP on board merchant vessels, use of force by PCASP in self-defense, and authority for using PMSC. Currently, the legal framework relating to use of PMSC and PCASP on board protecting ships from Somali-based piracy is complex, sometimes ambiguous or inconsistent, and currently in a state of flux. Thus, this paper concludes that at this juncture an effort to coordinate this legal framework is necessary, as regards both the interpretation of existing rules related to PCASP on board merchant ships under UNCLOS(United Nations Convention on the Law of the Sea) and the creation of new rules. Also, this paper suggested that there is an urgent need to establish the PMSC-specific laws in Korea.

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

A Study on Private Security Officers' Willingness to Comply with Security Policies (민간경비원의 보안정책준수의지에 관한 연구)

  • Lee, Sang-Hak;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.137-161
    • /
    • 2019
  • The purpose of this research is to explore ways to improve private security officers' compliance with security policies by analyzing the effects of transformational leadership and organizational trust. Data were collected from private security officers employed in the cities of Seoul and Busan by using survey questionnaire. Statistical analyses were conducted with SPSS 22.0 and AMOS 23.0. The results showed that transformational leadership increased organizational trust which was found to have a positive effect on willingness to comply with security policies. In addition, transformational leadership did not affect willingness to comply with security policies directly but had an indirect effect on it through organizational trust. The findings of current research suggest the leaders of security businesses consider various ways to increase officers' organizational trust such as improved job security and benefits in order to maximize their willingness to comply with security policies.

A Study on the Application of International Conventions to Respond to Cyber Threats in Civil Aviation (민간항공의 사이버위협 대응을 위한 국제협약 적용에 관한 연구)

  • Park, Man-Hui
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.41-42
    • /
    • 2023
  • 항공편과 승객의 흐름을 효율적으로 처리하기 위한 디지털 시스템에 대한 의존도 증가와 승객용 기내 와이파이 서비스 등으로 인해 민간항공의 사이버 보안 취약성은 매년 증가하고 있는데 비해 공항에 대한 무장 공격, 항공기에 폭발물 설치 및 납치와 같은 전통적인 테러에 맞춰 마련된 항공보안 관련 국제협약은 사이버 위협에 직접적으로 적용하기 어렵다는 문제를 갖고 있다. 본 연구는 민간항공에 대한 사이버 공격의 예방 및 기소와 관련된 국제협약의 적정성을 검토한 후, 사이버 위협 대응을 위한 기존 국제협약 체계, 잠재적 차이 해석 등을 중점적으로 분석하여 민간항공의 안전을 위협하는 불법방해행위로부터 중요정보 및 시스템을 보호하는 항공 사이버 보안 국제표준 마련 및 이행 촉진을 강조하고자 한다.

  • PDF

A study on the job creating process of ISE(public private certificate) (공인민간자격 산업보안관리사(ISE)의 창직 과정 고찰)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.11-17
    • /
    • 2018
  • The number of certificates in Korea is about 32,364(2018.09). There are 252 national technical qualifications, 149 national professional qualifications, 99 public private qualifications, and 31,894 private qualifications. The purpose of this study is to examine the process by which KAITS ISE is created. The course was examined and formalized for 10 years from the establishment of KAITS to the first test. As a result of the research, (1) Preparatory considerations (2) Development of qualifications framework (3) Job analysis and drafting (4) Development of problem banks (5) Design of curriculum (6) Development of verification strategy (7) Execution of verification (8) Revenue plan (9) Expansion of qualification demand (10) Opinion formation. After that, the module of the creativity is studied. It is expected that it will be used as a model for certification development in industry security consulting experts.

  • PDF

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center (클라우드 데이터센터로의 전환을 위한 보안요건 - N데이터센터를 중심으로)

  • Ra, Jong-Hei;Lee, Jae-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.299-307
    • /
    • 2014
  • N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.

Study on Private Security Ideology (민간경비 이념에 관한 연구)

  • Seo, JinSeok
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.207-213
    • /
    • 2013
  • As the axis of the private security maintain social order in order to achieve the original purpose of all society must move in the direction of motion, and so in order to be a private security based philosophical values and ideological composition should be based. In this process, to be followed by private security value or direction, philosophy private security is the norm. In this regard, this study pursued by the private security justification ever truly normative principles are intended to establish. The public nature of the ideology of private security, public, efficiency, legality, responsiveness and the like. Conflict occurs between the value of these ideals, although complementary are in harmony.

A Comparative Study on Private Investigators in the United Kingdom and South Korea - Focusing on the Missing Person Investigation System - (영국과 한국의 민간조사원 비교 연구 - 실종자 조사시스템을 중심으로 -)

  • Kwak, Minjun;Choi, Yeon-Jun;NamKung, Lock
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.189-215
    • /
    • 2019
  • As modern society has become specialised and complex in all areas of politics, economy and society, it has reached a point where it is difficult to control crime with the general public power. Private security, which began to fluctuate after the 19th century, has expanded its scope to subsidise public power in various areas, sometimes beyond public power. Among these private security activities, the private investigate system has long been used to provide private investigate services that are safe from personal human rights protection and crimes. This study investigate the private investigation system in the United Kingdom and South Korea focusing on the missing person investigation system by using the qualitative content analysis of research methods. First, the results of the qualitative content analysis are described through methods such as literature reviews and interviews on how the British private investigation system and the missing persons search system are implemented. Next, the results of the content analysis are presented through the methods of literature reviews and questionnaires on how the implementation of the civilian survey in Korea and the search for missing people is proceeding. It is a very important field in both countries, and there is a very limited study, especially from a Korean perspective. Therefore, it is expected that this study will not only facilitate discussions for the successful legalisation of the private research system, but also provides a basic foundation for future research. The study of the private research system should be ongoing and periodic, not temporary. In addition, in order to introduce Korea's private survey system, the private investigation system should be developed by discovering the problems of the Private Investigation Law mentioned in this study and collecting opinions from citizens, academics and related institutions. The introduction of the private investigation system requires the connection of the efforts and interests of citizens, academia and related institutions.

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

The Activation Strategy and Diagnostic Issues through Business Environment (SWOT) Analysis for Private Security Industry (민간경비 산업의 경영환경(SWOT)분석과 활성화 전략)

  • Ahn, Hwang-Kwon;Park, Young-Man
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.229-248
    • /
    • 2009
  • This research is looking for the private security industry and diagnostic issues and enable our strategy will be presented through SWOT analysis for the management environment of private security industry to ultimately contribute to the private security industry. Along, the purpose of this research is to want to reach key factors which affect the competitiveness of the private security industry. This study was to conduct literature research and surveys. And analyzing literature and data was collected. And determined the status of private security industry by conducted a comprehensive survey with 13 experts is causal. The question investigation hemisphere the question which harmonizes became accomplished in the center. Like this question analyzed the opinion of the identical research participant and 3 times was executed repetitively, and 2 to verify the data through multiple data as a basis for the SWOT analysis of the environment. Accordingly, the following conclusion emerges. First, the private security industry-related legislation will complement the systematic. This is the task of the public security authority and the relationship will be in the direction for improvement. Second, to develop strategies for diversification of products and services through the use of IT. This business what development security services and products based on IT advanced technology can provide a solution to maximize profits to large security companies and to all of the small companies. Third, it should seek ways to make exports that social safety net project based on security technology and capital of Kore for other Asian countries or developing countries in the world.

  • PDF