• Title/Summary/Keyword: 보안 법률

Search Result 157, Processing Time 0.025 seconds

The Factor Influencing to the Effectiveness of Prevention Policies of the Criminal Victimization of North Korean Defectors (북한이탈주민 범죄피해 예방정책의 효과성에의 영향요인)

  • Lim, Chang-Ho;Kim, Yun-Young
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.223-249
    • /
    • 2017
  • The purpose of this study is to analyze the actual situation of crime victimization by North Korean defectors and to examine whether any of the protection and support systems for defectors has a statistically significant effect on the perceived effectiveness for preventing the criminal victimization of North Korean Defectors. The subjects of this study were 107 police officers from the 17 provincial police departments. Independent variables were (1) social adaptation education in Hanawon, (2) protection officer system, (3) legal support system, (4) private participation system, (5) support for family life, (6) community participation activity. And the dependent variable is the crime prevention effectiveness for the defectors. As a result of multiple regression analysis, it was found that the independent variables that have a significant effect on the effectiveness of prevention of crime victimization were protection officer system and support for family life. First, in order to prevent the crime victimization of North Korean defectors in advance, three kinds of protection officer system that will be received after the transfer of the residence should play the role successfully. Second, the efforts of the government and municipalities alone are insufficient for the early settlement of North Korean defectors. Therefore, it is necessary to diversify the support and protection programs for North Korean refugees through cooperation with civic organizations. Third, it is necessary to expand the legal education time so that North Korean defectors do not suffer crime because of lack of legal knowledge. Fourth, in order to prevent North Korean defectors from being victimized by various kinds of crime, it is necessary to actively support them so that family life can be stabilized.

  • PDF

A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection (개인정보의 관리적·기술적 보호조치 기준의 상대적 중요도에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2014
  • As the collection and use of personal information increases, the accidents that abuse and leak personal information are continuously increasing. The nation has established new laws and strengthened related laws for the prevention of the mass leakage of personal information and the secondary damage due to the leaked personal information. The nation also established the guidelines that need to be implemented by the institutions handling personal information for the safety of the personal information. For the efficient implementation of guidelines under the limited time and resources, it is necessary to establish the priorities between guidelines. This paper compares the relative importance of the guidelines by AHP (Analytic Hierarchy Process) technique. We performed the analysis on two expert groups, the group of consultants working in information security consulting company and the group of information security staffs handling personal information directly in the company. We compared the differences between groups and recommended the relative importances of the guidelines.

A Smart Security Equipment and An application for Sexual Offense Prevent GPS device (스마트 보안장비와 성범죄 예방 GPS 애플리케이션)

  • Kim, Dong-Je;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.27-49
    • /
    • 2012
  • "Do not ask crimes", such as "child sexual abuse" and according to the known through media reports, the people's fear and worry increasingly severe become and the damage increasing day by day and is Still unable to find effective countermeasures that national security policy is a reality. In this study, the result was the development of new security equipment for the purpose of the research team to the solution of the problem of domestic policing these sexual offenses prevention of GPS applications and existing smartphone to suit the era of 20 million development in the online and offline sales and is proposed to complement the problems of the samdanbong multifunction smart samdanbong. First, the function will be applied according to the trend due to the increase of heinous crime, both online and offline sales surge in self-defense products that are being sold on the market, finding problems samdanbong of smart multifunctional smart samdanbong the actual crime and the corresponding effective products were planning to have a secure management system, through a legal review on the current law. Second, sexual offenses, such as Internet use, travel, residential location, and management of sexual offenses Felon Felon's daily life strictly sexual offenses prevention of GPS applications to the characteristics of the sexual offenses scrutinized nearly enough to the frequency of recurrence of 50% is high, look at the case of foreign proposed the streets of sex offenders and the development of applications that can be checked in real-time by considering the basic characteristics to manage.

  • PDF

EDI감사용 의사결정시스템의 개발

  • 이상재;한인구
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.234-251
    • /
    • 1995
  • 본 연구에서는 EDI감사 의사결정지원시스템을 개발하였다. 이를 위해서 기존의 EDP감사 의사결정지원시스템 및 감사전문가시스템분야의 연구를 고찰했다. EDI감사를 위한 의사결정지원시스템은 통계, 위험, 회사의 개요, 테스트 항목등의 데이타를 저장한 데이타베이스 시스템이다. 시스템 개발을 위해서 E/R(Entity Relation)이나 DFD(Data Flow Diagram)분석을 통해서 논리적인 설계를 하였다. 시스템 개발은 개인용 데이타베이스팩키지인 FoxPro를 사용하였다. 이 시스템을 통해서 감사인이 필요한 테스트 결과를 조회하거난 저장할 수 있고 통제, 위험, 회사등의 상호조회를 통한 필요한 통제나 위험정도를 쉽게 조회해 볼수 있다. 회사마다 필요한 통제, 위험, 테스트 항목등의 체크리스트가 달라지는 경우에 이 시스템을 통해서 입력 저장하여 각각의 회사에 대해 다른 체크리스트를 저장하여 놓을수 있다. 본 시스템은 EDI감사뿐만 아니라 일반 EDP감사분야에도 적용가능할 것이다. 종이를 사용한 감사증적이 없음으로 인해 수작업에 의한 EDI감사는 어려움이 있고 EDP감사시스템분야의 국내 연구가 전무한 실정에서 EDI감사를 지원하는 시스템의 연구는 의의를 갖는다고 생각된다. 본 시스템을 통해서 EDI의 보안 및 감사업무의 효율성이 높아지고 EDI에 대한 위험에 효율적으로 대처할수 있게 될 것이다. 그리고 이러한 보안 및 감사기법과 통제모형을 지식베이스로 구축해서 실제의 위험노출상황에서 가능한 보안을 위한 통제방안이 여러가지가 있는 경우에 비용/편익 분석, 효율성, 회사방침 및 법률적인 문제등을 고려해서 최적의 보안통제 및 감사기법을 선택하는 것을 지원할 수 있을 것이다.고리듬을 개발 함으로써 내부점 선형계획법의 수행속도의 개선에 도움이 될 것이다.성요소들을 제시하였다.용자 만족도가 보다 높은 것으 로 나타났다. 할 수 있는 효율적인 distributed system를 개발하는 것을 제시하였다. 본 논문은 데이타베이스론의 입장에서 아직 정립되어 있지 않은 분산 환경하에서의 관계형 데이타베이스의 데이타관리의 분류체계를 나름대로 정립하였다는데 그 의의가 있다. 또한 이것의 응용은 현재 분산데이타베이스 구축에 있어 나타나는 기술적인 문제점들을 어느정도 보완할 수 있다는 점에서 그 중요성이 있다.ence of a small(IxEpc),hot(Tex> SOK) core which contains two tempegatlue peaks at -15" east and north of MDS. The column density of HCaN is (1-3):n1014cm-2. Column density at distant position from MD5 is larger than that in the (:entral region. We have deduced that this hot-core has a mass of 10sR1 which i:s about an order of magnitude larger those obtained by previous studies.previous studies.업순서들의 상관관계를 고려하여 보다 개선된 해를 구하기 위한 연구가 요구된다. 또한, 준비작업비용을 발생시키는 작업장의 작업순서결정에 대해서도 연구를 행하여, 보완작업비용과 준비비용을 고려한 GMMAL 작업순서문제를 해결하기 위한 연구가 수행되어야 할 것이다.로 이루어

  • PDF

A study on 112 crime call system (112 범죄신고체제에 관한 연구)

  • Hwang, Hyun Rak
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.23-32
    • /
    • 2012
  • The police is responsible for protecting nation's property and life. Protecting nation from crime among the core duties is the most important activity of the police. But the big problem on reported crime system of the police was founded in the recent Suwon incident. Unfortunately, the unprofessional response made a toll of human sacrifice. Taking this opportunity, we need to consider closely the problems of the reported crime and system of the police and the solutions on the problems. This study analyzes the reported crime system of the police from the law and institutional and try to seek the solutions. This study searches the management status of the police system and arranges the problems in legal and institutional terms. And then, it arranges the solutions on the problems.

The Study of Protective Solution and People in Technology Outflow about SMEs (중소기업 기술유출 및 기술인력 방지제도에 관한 연구)

  • Chung, Jason
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.133-152
    • /
    • 2015
  • Cause of the technology leakage and trade secrets can be leaked to the lack of infrastructure, lack of coping skills of SMEs. In addition, small businesses can avoid technology outflow and re-experience the same half of the damage, even when the external leak developed after the fact and does not demonstrate such technology leakage time for the technology and situation which did not take any action, security, infrastructure investments difficult, work-related knowledge, lack of security, trade secret protection dedicated staff, inadequate legal and institutional measures have been identified as such complaints to date. For subcontracting, etc. mid-sized transactions, hinder the growth of SMEs, SME cross-technology leakage to the increase in unfair practices, including useful, and this has been accompanied by growth-based business-to-business it weakened.

  • PDF

A Study on the Civil Resource Utilization of Military Defense (국방 분야의 민간자원 활용에 관한 연구)

  • Park, Kyun Yong;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.3-10
    • /
    • 2016
  • This study is to actively respond to changes in terms of age, it was to find a possible way to realize the effective application of research to expand the civilian use of resources in the defense sector. Utilization of civil resources were first introduced by the previous government institutions to be applied to the military, our country, the use of private resources began with the 1948 case of a consignment of rubbish. In particular, in the process of overcoming the economic crisis IMF 1990s the government increased its advantage in the public service sector while introducing elements of civil to the public sector. Meanwhile, the Pentagon was promoting policies that foster and promote the civil sector in defense of "defense reform law" in terms of the advancement of military operations. The results of the work carried establish schemes for the civil use of resources, which can be protected by legal and institutional supplement, it is determined that you need a dedicated organization for the construction of projects.

The Reinforcing plan of private security capabilities (민간경비역량의 강화방안)

  • Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.19-28
    • /
    • 2015
  • Recently in the condition of increasing of cruel-hearted crime, it is limited to keep the community safe by only police force and expanding role of private security is required. But current private security law and relation law have many delimitations. So reinforcing of Private security capabilities is needed and several measures are required. Integration of private security law and private police guards is the foundation of rule introduced of specific rights of private guards. Also authority of the private security should be ruled in private security law to prepare the conditions of performed guard duties. In relation to this, questioning of a suspicious person by a patrolman should be granted to the private security. Strengthening authority of private security can be helpful in preventing crime and policing.

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

A model for preventing the spread of infectious diseases using beacons (비콘을 활용한 감염병 확산 방지 시스템에 관한 모델)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2021
  • As the Covid-19 outbreak spreads and prolongs around the world, visitor lists are prepared in various ways when entering the facility to prevent infection and identify confirmed people. In this study, we propose an access management system using beacons to solve the problems with the preparation and management of existing visitor lists. The research method searches the laws related to the collection of personal information and compares the current status of personal information collection and trends in the beacons. The proposed system compares and analyzes existing methods and security and efficiency, which confirm accurate and rapid access registration. By using Beacon access management system, it is effective in preventing and responding to the spread of new infectious diseases in the future.