• Title/Summary/Keyword: Administrative Security

Search Result 289, Processing Time 0.021 seconds

Future of Maritime Safety and Security Administration in Korea

  • Lee, Sang-Jib
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1997.10a
    • /
    • pp.13-33
    • /
    • 1997
  • The Ministry of Maritime affairs and Fisheries embarked on Oct. 8, 1996, incorporating most of the previously fragmented maritime administrations into one single institution. But the maritime administrative functions related to safety and security missions have not yet been merged into a synergetic whole, with versatile multi-functional systems working so effectively that better services to the public might be excepted. Enhancing administrative capabilities to meet future demands with limited resources requires that these missions be integrated into one institution and an enterprising management system be adopted to overcome bureaupathologies, such as complacency and inertness of administration.

  • PDF

A Study on the Environment and the Theoretical Background of Private Security (민간경비(民間警費)의 환경(環境)과 이론적(理論的) 배경(背景) 고찰(考察))

  • Kang, Gil-Hun
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.5-32
    • /
    • 1999
  • Private security will be of great importance in the coming 21st century. In the future, most of the crimes will be violent and frequent. In order to prevent crimes private security must be dealt with in public service area and private area. For this reason, nowadays studies on private security is going on actively. But in reality, serious studies on theoretical backgrounds of private security has not been made yet. Currently, almost all of the theories propose various grounds, such as administrative, economic, and social grounds. And they are based on five backgrounds, that is, profit-oriented enterprise theory, economic reduction theory, vacuum theory, interest group theory, and private management theory. The article furnishes several grounds in addition to these. They are local self-government, management of local self-government, and task-force of guard enterprise. In this article, I am going to present some perspectives in classifying the theories. They are administrative, economic, and social perspective. They are shown as follows by figure. In conclusion, based on theoretical backgrounds mentioned above, private security will be advanced constantly in the future. But in carrying out studies on private security, approaching method of proposing the developmental model is more important than theoretical approaching method.

  • PDF

Administrative Leaders and Their Role in Bringing About Development and Organizational Change in Universities (Northern Border University Case Study)

  • Abdelrahman, Rashid Abdelbasit Saad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.67-78
    • /
    • 2021
  • The research aims to identify the role of administrative leaders working in universities in the success of organizational development and change, and the extent of the relationship and ability of administrative leaders at all levels of leadership within universities to the effectiveness of the process of development and organizational change at Northern Border University. In addition to presenting some recommendations and suggestions that can contribute to identifying the best leadership styles that contribute to the success of the development process and positive organizational change. Where leadership, whether in the private sector or the public sector, is one of the main functions concerned with the processes of direction, development, and modernization in the performance of the facility and an important element to activate the organizations' ability to perform their role and achieve their goals. The behavior and trends of leaders represent an important indicator in knowing the type of efforts made by them to improve performance and develop organizations and human resources. The research reached many results, perhaps the most important of which is that the dominant leadership style in universities is the democratic style, followed by the bureaucratic leadership style. The results also showed that there is a significant role for administrative leaders in bringing about development and positive change at Northern Border University at the level of individuals, groups, and organizations. And it became clear that there is an availability of leadership capabilities to an acceptable degree in the administrative leaders. The results of the statistical analysis showed a positive relationship between administrative leadership ability and democratic style. In addition to the existence of a negative relationship between the administrative leadership ability and the bureaucratic style and the freestyle. It was also clear that there were no differences in dealing between males and females, as well as age, educational qualification, experience, and job grade, but there were differences in dealing with the job title.

The Vision and It's lesson of the Bureaucracy in China - With Emphasis on the Police Civil Service System (중국 관료제의 특징과 시사점 - 경찰 공무원제도를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.107-125
    • /
    • 2004
  • China is an ancient country that has one of the oldest civilizations on earth. Since the end of 1970s, China has made her administrative and economic reform and opening up to the outside world. Now the administrative and economic reforms has scored great success with a series of important accomplishments. China's peculiar political economy largely explained the changing reform initiatives over times. The problems confronting Chinese officials are markedly different from the West despite the fact the China and the West have engaged their efforts in undertaking administrative reforms in the last two decades or so. The purpose of this study is to analyze the bureaucracy, especially the police civil service system in China. Core features of the institution of China's civil servant system is discussed in this study.

  • PDF

Theories, Frameworks, and Models of Using Artificial Intelligence in Organizations

  • Alotaibi, Sara Jeza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.357-366
    • /
    • 2022
  • Artificial intelligence (AI) is the replication of human intelligence by computer systems and machines using tools like machine learning, deep learning, expert systems, and natural language processing. AI can be applied in administrative settings to automate repetitive processes, analyze and forecast data, foster social communication skills among staff, reduce costs, and boost overall operational effectiveness. In order to understand how AI is being used for administrative duties in various organizations, this paper gives a critical dialogue on the topic and proposed a framework for using artificial intelligence in organizations. Additionally, it offers a list of specifications, attributes, and requirements that organizations planning to use AI should consider.

Studies on the effect of information security investment executive (정보보호의 투자 집행 효과에 관한 연구)

  • Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1271-1284
    • /
    • 2014
  • This paper classifies technical, administrative and physical areas of defects and advices made by an external audit (ISO27001) and internal audit (performed by a security team) in a company which has the management system of information security. With the classified data it finds the correlation between the budget and investment of information security, and analyze the correlation. As a result of the analysis, it has been found that as time goes on there is a consistent correlation between a administrative area and technical area of security. Specially, it has been confirmed that the relation between the scale of the budget which is not executed and the number of the defects and advices made by the audit is in direct proportion. Therefore, in this paper, so as to provide a model that can be used for validating the effectiveness of the protective investment information by statistically calculating the similarity based on the results of correlation analysis. This research is intended to help that a company makes a precise decision when it establishes a policy of information security and systematic methodology of the investment in information security.

A Study on the Investment Level and Administrative Competence of Information Security by Industry (산업별 정보보안의 투자 수준과 관리 역량에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.89-102
    • /
    • 2023
  • The purpose of this study is to examine what are the important variables for information security compliance and whether the information security investment by the industry is different. To comply with the information security policies, the organization must establish measures to prevent or resolve information security incidents. This research process consists of four stages, and the analysis method was conducted with the categorical regression analysis and the correspondence analysis. The first analysis analyzed the independent variables that affect security regulations compliance. The rest of the analysis was conducted by industry in the order of security compliance regulations, manpower investment, and budget investment. As a result of the first analysis, this had positive effects on an organization and personal information protection awareness, joint operation organization of information protection, manpower and budget investment, corporate size, and industry. The correspondence analysis was conducted from the second analysis to the fourth analysis and it analyzed the differences in information security investment by industry. The second analysis showed that the construction industry, science and technology industry, and finance industry have higher compliance with security regulations than other industries. The third analysis showed that the financial industry and the science and technology industry were higher than other industries. The last analysis showed that the financial industry was higher than other industries. The theoretical contribution of this study provided the basis for updating the information security theory. The practical contribution of this study requires government support to reduce information security deviations by industry.

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • Jo, Hyeon-Suk;Lee, Hyeong
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era (디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.

A Study on the Methodologies to Assess Network Vulnerability (네트워크 위험 분석 및 취약점 점검 방법에 관한 연구)

  • Seo Dong-Il;Park Won-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.107-114
    • /
    • 2005
  • This paper proposes to analyze a security level about information property systems. This method uses objective and quantitative risk level assessment. The method analyzes administrative, physical and technical aspects of information property system commonly. This method also uses administrative, physical and technical weights. Individually according to requirements security assessment purpose. And it shows risks weighting mean and importance of information property by graph. The most right and up systems in maps is prior to other systems. Also, Quantitative analysis presents more objective and efficient results for security level assessment of information system.

  • PDF