• Title/Summary/Keyword: 필요경비

Search Result 559, Processing Time 0.037 seconds

Action Plan of Security Service against a Fire case in a Tall Building Event (경호행사시 초고층건물 화재 대응방안)

  • Son, Kyung-Hwan
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.37-61
    • /
    • 2014
  • Nowadays the world is threatened because of terrors that take aim at Soft-Targets available and easy to access to the people rather than more secured Hard-Targets. The inspection department of the Presidential Security Service develops and acts a perfect safety plan wherever the President stays so that it is possible to get immediate actions for various contingencies. Some events, in which the President take part, could be held in a lower or higher store in a tall building. Additional to the routine work at this case it is to emphasize on a plan of fire precaution to check the spot and respond to a real fire situation, so that the damage could be minimized. First, the agents of the President Security Service should possess basic knowledge concerning to the fire accidents and be trained on their manuals, even in a busy events plan. An organization, whatever it is, could be improved in that it tries to develop not only the personal abilities, but also education programs of the organization continually. And enhanced abilities of the members lead to the driving force for the advance. The knowledge of fire accident should be able to adapt to the real situation. Second, related to the event, it should be cooperated with the relevant departments, so that it is possible to conduct and control the system. It is urgently required to know that the security event could not be done perfectly with only one part or department. Third, from the time of recognizing of the event it is necessary for the fire department to get an action plan with fire fighting measures, evacuation measures based of the instructions given by the Security Service. Fourth, on the knowledge of the action plan of the fire department the Security Service should inspect the safety activities of the spot and establish the practical operation plan through the fire fighting and evacuation plan. Fifth, the Security Service should share final informations and plan of fire fighting in a high-rise building with the other relevant departments. If not, it could cause a great confusion that could lead to a great damage.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Direction of Policing for Effective Disaster Prevention and Management (효과적인 재난 예방 및 관리를 위한 경찰활동 방향)

  • Lee, Ju-Lak;Shin, So-Young
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.317-334
    • /
    • 2017
  • The burden of addressing the damage and financial losses caused by disaster events falls primarily on local governments. Given this reality, preparing for disasters and assessing the effects of disaster management would be more effective if both were carried out at the local level. However, disaster management in South Korea is realized at the national level, revolving around the central government. The Ministry of Public Safety and Security, which was newly established after the sinking of MV Sewol, was criticized for failing to carrying out its role as a "disaster control tower" in dealing with the earthquakes near the city of Gyeongju in 2016. The criticism, as well as deep anxiety concerning the ministry's ability to effectively respond to disasters, means that there is a need for a practical alternative plan to the current method of dealing with disasters. As such, there is an increasing call to re-examine the role of the police force, which played an integral part in past disaster response efforts, in future disaster events. Among the various activities the police force performs, this study focused on one particular role and function of the police, namely community policing. Specifically, this study examined community policing within the context of local governments. The primary purpose of community policing is crime prevention. But the police must respond to citizens' expectations and desires that the police expand the scope of its role. Thus, to maximize public safety and order, the police must be actively engaged in conducting disaster response activities. Hence, this study concentrated on the measures, including community policing, that need to be taken to enable the police to respond rapidly and effectively to disaster events, thereby minimizing losses, and to contribute meaningfully to disaster recovery efforts. Because community policing requires public cooperation, community-oriented disaster response and disaster management are closely examined. This study basically seeks to expand the scope of community policing to strengthen disaster safety. Furthermore, this study aims to assert that disaster safety can be promoted by establishing a cooperation system between the police and private security; changing how the role of community policing in disaster response activities is perceived; increasing professional manpower and establishing a comprehensive and independent department dedicated to disaster-related matters; and merging consultative organizations into one organization. Additionally, this study states that an integrated CCTV platform and police cars on disaster prevention patrol duties would enhance the capability of the police to respond to disasters and perform their community policing activities.

  • PDF

Effects of Servant Leadership of Security Martial Arts Instructors on the Exercise Commitment and Training Satisfaction (경호무도 지도자의 서번트 리더십이 운동몰입 및 수련만족에 미치는 영향)

  • Choi, Woo-Chang;Jeon, Yong-Tae;Kang, Hyeon
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.197-226
    • /
    • 2019
  • The objective of this study is to examine the effects of servant leadership of security martial arts instructors on the exercise commitment and training satisfaction of trainees. To achieve the objective of this study, the data was collected from 300 trainees of security martial arts gyms located in Seoul, Incheon, and Gyeonggi-do regions by using the convenience sampling method. Total 281 questionnaires were used for the analysis after excluding 19 questionnaires. Using the SPSS 23.0 for data-process, this study conducted the frequency analysis, exploratory factor analysis, reliability analysis, correlation analysis, and multiple regression analysis. First, all the variables showed positive(+) correlations. Second, the presentation of vision of instructors' servant leadership had positive(+) effects on the behavioral commitment while the devoted attitude of instructors' servant leadership had positive(+) effects on the cognitive commitment. Third, the presentation of vision, formation of community, and support for growth of instructors' servant leadership had positive(+) effects on the psychological elements while the presentation of vision and support for growth had positive(+) effects on the environmental elements. The presentation of vision and formation of community had positive(+) effects on the physical elements while the presentation of vision and formation of community had positive(+) effects on the educational elements. The presentation of vision, formation of community, and support for growth had positive(+) effects on the social elements. Fourth, both cognitive commitment and behavioral commitment out of trainees' exercise commitment had positive(+) effects on the psychological elements, environmental elements, physical elements, and educational elements of training satisfaction while only the cognitive commitment had positive(+) effects on the social elements. In summary, the security martial arts instructors should show the leadership like presentation of vision and devotion, and also try hard to satisfy the expectation in many areas to raise the exercise commitment.

Clinical Report of 46 Intracranial Tumors with LINAC Based Stereotactic Radiosurgery (선형가속기를 이용한 뇌종양 46예의 뇌정위다방향방사선치료 성적)

  • Yoon Sei C;Suh Tge S;Kim Sung W;Kang Ki M;Kim Yun S;Choi Byung O;Jang Hong S;Choi Kyo H;Kim Moon C;Shinn Kyung S
    • Radiation Oncology Journal
    • /
    • v.11 no.2
    • /
    • pp.241-247
    • /
    • 1993
  • Between July 1988 and December 1992, we treated 45 patients who had deep seated inoperable or residual and/or recurrent intracranial tumors using LINAC based stereotactic radiosurgery at the Department of Therapeutic Radiology, Kangnam St. Mary's Hospital, Catholic University Medical College. Treated intracranial tumors included pituitary tumors (n=15), acoustic neurinomas (n=8), meningiomas (n=7), gliomas (n=6), craniopharyngiomas (n=4), pinealomas (n=3), hemangioblastomas (n=2), and solitary metastatic tumor from lung cancer (n=1). The dimension of treatment field varied from 0.23 to 42.88 $cm^3\;(mean;\;7.26\;cm^3)$. The maximum tumor doses ranging from 5 to 35.5 Gy (mean; 29.9 Gy) were given, and depended on patients' age, target volume, location of lesion and previous history of irradiation. There were 22 male and 23 female patients. The age was varied from 5 to 74 years of age (a median age; 43 years). The mean duration of follow-up was 35 months (2~55 months). To date, 18 $(39.1\%)$ of 46 intracranial tumors treated with SRS showed absent or decrease of the tumor by serial follow-up CT and/or MRI and 16 $(34.8\%)$ were stationary, e.g. growth arrest. From the view point of the clinical aspects, 34 $(73.9\%)$ of 46 tumors were considered improved status, that is, alive with no evidence of active tumor and 8 $(17.4\%)$ of them were stable, alive with disease but no deterioration as compared with before SRS. Although there showed slight increase of the tumor in size according to follow-up imagings of 4 cases (pituitary tumor 1, acoustic neurinomas 2, pinealoma 1), they still represented clinically stable status. Clinically, two $(4.4\%)$ Patients who were anaplastic astrocytoma (n=1) and metastatic brain tumor (n=1) were worsened following SRS treatment. So far, no serious complications were found after treatment. The minor degree headache which could be relieved by steroid or analgesics and transient focal hair loss were observed in a few cases. There should be meticulous long term follow-up inall cases.

  • PDF

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

Studies on the Tissue Culture of Some useful woody species (유용수종(有用樹種)의 조직배양(組織培養)에 관(關)한 연구(硏究))

  • Kim, Jai Saing;Lee, Sam Sup
    • Journal of Korean Society of Forest Science
    • /
    • v.43 no.1
    • /
    • pp.6-13
    • /
    • 1979
  • In order to substract the time and cost of propagation for inducing the haploid plants per each species. 500 anthers of late uninucleate microspore on early binucleate microspore stage of Robinia pseudoacacia (Fuel tree) Punius granatum (Ornamental tree). Aleurites fordii (Faty tree) and Styrax japonica (Silvicultural tree) were cultured on the modified Murashige and Skoog's medium supplemented with Kinetin, 2.4-D and NAA as growth regulators. And I observed the samples of cultured anthers under the microscope which were made by Microtoming method and Paraffin method. The results were summarized as follows: 1) Among 500 cultured anthers per each species, anther numbers inducing the diploid callus were as follow: Styrax japonica 20 (4% for the species total); Aleurites fordii 10 (2% for the species, total) and Punica granatum 45 (9% for the species total) were showed. 2) 2n Callus were induced from anther wall. but haploid callus were induced from anther locule. 3) Haploid callus were induced only in 25 anthers (5% for the species total) of Robinia pseudoacacia. 4) These haploid callus were not originated from body cell of anther wall tissue, but from reduced microspores, 5) Since already reported many herbaceous haploid plants were induced from the callus which were originated from reduced microspores, I conclude that the anther of woody plant which induced the haploid callus also will be cultured haploid plant.

  • PDF

Study on Legal Position of Aviation Security Subject in Aviation Safety and Security (공항보안요원의 법적 지위에 관한 연구)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.157-179
    • /
    • 2006
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. So Republic of Korea Government enact the Law, Aviation Safety and Security. The Purpose of this Act is to prevent any unlawful act in airport facilities with international conventions, including the ICAO to provide for standards, procedures and mandatory matters needed to ensure the safety and security of civil aviation. But the Act has some error. So is this paper to review the revision of aviation security regulation and the changes of aviation security responsibilities and task assignment. There is the term "aviation security personnel", who are charged with the task of preventing any act of disrupting the order and safety in airport. But there is no term "security screening personnel" who performs to detect or search for dangerous object, such as weapons or explosives, which may be used for the unlawful obstruction.

  • PDF

A Study on Commemorative Landscape in Holocaust Concentration Camp Memorials of Germany and Poland (홀로코스트 강제수용소 메모리얼에 나타난 기념적 경관)

  • Lee, Sang-Seok
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.6
    • /
    • pp.98-114
    • /
    • 2017
  • This study analyzed the commemorative landscapes of eight Holocaust concentration camp memorials(HCCM) of Germany and Poland from a landscape architecture point of view including historical landscape, places and remains, and monuments. A site survey was conducted at Dahau concentration camp memorial(CCM) and Bergen-Belsen CCM of Germany in September of 2015 and the Auschwitz-Birkenau extermination camp memorial(ECM), Majdanek ECM, Belzec ECM, Sobibor ECM, Treblinka ECM, Chelmno ECM of Poland in April of 2016. The results are as follows. First, the landscape of the concentration camp at Dahau CCM, Auschwitz ECM, and Majdanek ECM liberated by the Allied Forces was well conserved with the maintenance of camp facilities and the spatial structure of camps while monuments and memorials seized by sociopolitical argument were built with restriction. But Belzec ECM, Sobibor ECM, Treblinka ECM, and Chelmno ECM devastated and planted artificially to forest were overwhelmingly surrounded with natural landscape, and also, excavated relics and remains were preserved and the monuments were built at the place of memory. Second, gas chambers, crematoriums, guard posts, electric wire fences, railroads and ramps, barracks, and drainage ditches were considered to be typical facilities present in the camp structure and the gas chambers, crematoriums, human ashes, and mass graves demonstrated the horrible history of these camps and the railroad and ramp where Jewish prisoners arrived also had the strong sense of place. These remains were regarded as symbolic elements to create a memory of the tragedy and place. Third, commemoration of victims was applied as the basic concept and recalling the memory of the Holocaust was also considered very important content. Religious reconciliation and peace was represented at Dahau CCM and the Jewish identity was strongly expressed at Treblinka ECM and Belzec ECM representing the Jewish community and Judaism. Fourth, the monuments with semi-abstract styles and abstract sculptures represented the Holocaust symbolically and narratively and came into the conflict caused by the abstractness to the memorial landscape at Auschwitz-Birkenau ECM and Bergen-Belsen CCM. Fifth, remains for recalling the memory of tragedy and place and symbolic monuments to stand for public memory were juxtaposed at the same place and preserving on the authenticity of camp site had been conflicted with monumentalizing intentionally. Further study will required a concrete investigation of the monuments in the HCCM and an attempt to comparatively study the commemoration characteristics of memorials in Korea.

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.