• Title/Summary/Keyword: 보안 위험관리

Search Result 338, Processing Time 0.024 seconds

Effects of Intensive Course Program on the Sexual Violence for the Re-crime Risky Group in the Sex Offender: Focused on Impulsivity, Anger Expression, Rape Myth, and Self Esteem (재범위험 성폭력사범 집중교육 프로그램의 효과: 충동성, 분노표현, 강간통념, 자기존중감을 중심으로)

  • Gang, Chun-Hee;Kwon, Jae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.707-719
    • /
    • 2021
  • The purpose of this study was to find out how effect does the second-stage which is the intensive course program for sexual offenders of three-stage(basic, intensive and advanced remedial) on impulsivity, anger expression, rape myth and self-esteem of sexual offenders. To this end, 10 people waiting for the second-stage intensive education among sexual violence offenders serving at M prison located in J province were selected as subjects for the study. To verify the effectiveness of the program, repeated measurement design(pre, post and one month post test) was conducted, and a total of 200 hours of 'Intensive Course Program on the Sexual Violence' was conducted to the subjects. The results of this study are as follows. It was confirmed that the intensive course program on the sexual violence for the re-crime risky group in the sex offender is effective in reducing impulsivity and anger expression, which are risk factors of sexual crime, bringing positive changes to rape myths, which are distorted sexual perceptions of sexual violence criminals, and improving self-esteem. Finally, it suggested the necessity of continuous development and improvement of sexual violence preventive programs targeting sexual offenders, and construction of systematic supervision and related system to ensure the effectiveness of remedial after release of sexual offenders.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

Investigation of Infection Prevention by Dental Hygienist's Personal Protection (치과위생사의 개인방호에 관한 감염방지 실태조사)

  • Kim, Chang-Hee;Jang, Hee-Kyung
    • Journal of dental hygiene science
    • /
    • v.5 no.2
    • /
    • pp.63-70
    • /
    • 2005
  • The relation among the variables of dental hygienists' both personal protection and infection prevention education was investigated in order to identify the necessity of realization of personal protection and utilize in the development of educational programs. The study tools included structured questionnaire and in-home interview. Data analysis included frequency and t-test, and the relations among the variables were as below: (1) Dental hygienist's maskwearing was most well observed in Kyonggi-do (90.0%) by locations, and in the dental hospitals (84.8%) by working places, which was statistically significant. (2) Glove-wearing was most well observed in the university and the higher graduates population (59.1%) by academic background, and in the dental hospital (73.9%) by working place, which was statistically significant. (3) Protection glasses-wearing was most well observed in Guns, Ups, and Myons (82.4%) by locations, which was statistically significant. (4) Uniforms were hand-laundered at home in the 40.9% of the university and the higher graduates, which was statistically significant. (5) About infection management, 67.0% of 2-year college graduates and 71.7% of the respondents from dental hospitals had been educated during their college days, which was statistically significant. (6) About the necessity of infection education, 77.3% of the university graduates responded it is very necessary, which was statistically significant.

  • PDF

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A Study on Improvement Plans for Local Safety Assessment in Korea (국내 지역안전도 평가의 개선방안 연구)

  • Kim, Yong-Moon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.69-80
    • /
    • 2021
  • This study tried to suggest improvement measures by discovering problems or matters requiring improvement among the annual regional safety evaluation systems. Briefly introducing the structure and contents of the study, which is the introduction, describes the regional safety evaluation method newly applied by the Ministry of Public Administration and Security in 2020. Utilization plans were also introduced according to the local safety level that was finally evaluated by the local government. In this paper, various views of previous researchers related to regional safety are summarized and described. In addition, problems were drawn in the composition of the index of local safety, the method of calculating the index, and the application of the current index. Next, the problems of specific regional safety evaluation indicators were analyzed and solutions were presented. First, "Number of semi-basement households" is replaced with "Number of households receiving basic livelihood" of 「Social Vulnerability Index」 in the field of disaster risk factors is replaced with "the number of households receiving basic livelihood". In addition, the "Vinyl House Area" is evaluated by replacing "the number of households living in a Vinyl House, the number of container households, and the number of households in Jjok-bang villages" with data. Second, in the management and evaluation of habitual drought disaster areas, local governments with a water supply rate of 95% or higher in Counties, Cities, and Districts are treated as "missing". This is because drought disasters rarely occur in the metropolitan area and local governments that have undergone urbanization. Third, the activities of safety sheriffs, safety monitor volunteers, and disaster safety silver monitoring groups along with the local autonomous prevention foundation are added to the evaluation of the evaluation index of 「Regional Autonomous Prevention Foundation Activation」 in the field of response to disaster prevention measures. However, since the name of the local autonomous disaster prevention organization may be different for each local government, if it is an autonomous disaster prevention organization organized and active for disaster prevention, it would be appropriate to evaluate the results by summing up all of its activities. Fourth, among the Scorecard evaluation items, which is a safe city evaluation tool used by the United Nations Office for Disaster Risk Reduction(UNDRR), the item "preservation of natural buffers to strengthen the protection functions provided by natural ecosystems" is borrowed, which is closely related to natural disasters. The Scorecard evaluation is an assessment index that focuses on improving the disaster resilience of local governments while carrying out the campaign "Creating cities resilient to climate crises and disasters" emphasized by UNDRR. Finally, the names of "regional safety level" and "local safety index" are similar, so the term of local safety level is changed to "natural disaster safety level" or "natural calamity safety level". This is because only the general public can distinguish the local safety level from the local safety index.

Recidivism Follow-Up Study on Sex offenders under Electronic Monitoring (성범죄 전자감독대상자들에 대한 재범추적 연구)

  • Lee, SeungWon;Lee, SueJung;Seo, HyeRan
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.1
    • /
    • pp.15-33
    • /
    • 2021
  • In this study, we analyzed the difference in survival rates of those subject to electronic supervision of sex crimes based on the tracking of the period of recidivism and whether they were recidivism, and wanted to confirm the ability of the criminal record to predict recidivism. The criteria for recidivism were defined as cases where a conviction was confirmed due to a criminal case that occurred during the execution of electronic monitoring, and the date of recidivism was the date of occurrence of a case that was confirmed guilty. A total of 122 re-offenders were used in the analysis, and all of them were charged with electronic supervision for committing sex crimes. Studies have confirmed that the subjects commit the most recidivism within three years. In addition, in this study, the difference in survival rate between groups was analyzed after classifying mixed and sex recidivism cases. The number of members was 88 for the mixed recidivism group and 34 for the sex recidivism group. The analysis confirmed that both groups had the most recidivism within three years. There was a slight difference between the survival rate of the mixed recidivism group and the survival rate of the sex recidivism group. So the Log Rank Test and the Generalized Wilcoxon Test were conducted, but no statistically significant differences were identified(Wilcoxon statistic = 2.326, df = 1, p = .13, Log Rank = 1.345, df = 1, p = .25). Next, a Cox Regression analysis was performed to confirm the ability of the criminal record to predict recidivism. As a result, the number of criminal records(sex offense, violent crime) have been confirmed to be a good predictor of recidivism(X2=27.33, df=1, p< .001). As a result, the recidivism rate is gradually decreasing due to the implementation of the electronic monitoring. However, the duration of recidivism required by sex offenders in high-risk groups was found to be rather short. Currently, security measures against felons are being strengthened, so it is necessary to select high-risk groups. Therefore, based on the related studies, the characteristics of high-risk groups and the results of recidivism studies will be used as a basis for disposal within the criminal justice system, which will play a major role in granting objectivity.

  • PDF