• 제목/요약/키워드: Association study

Search Result 85,208, Processing Time 0.099 seconds

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

A Study on the Establishment of desirable Model for Licensed Private Investigation Service System (공인탐정제도의 올바른 모델설정에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.249-270
    • /
    • 2009
  • There have been great demands for various private searches and collecting information activities. but in korea it is still banned to supply private investigation service and to use the term 'private investigation'. So establishment of desirable model for private investigation service system is essential factor in strategic approaching for privatization of policing. In most developed countries private investigation service system is generally permitted and various methods to solve the side effects of that are considered. It is necessary to revise more the Security Business Law to introduce private investigation service system so that the dispute on determining how to do and what to do. It looks like that police agrees with the introduction of the private investigation service system because this could be an option when it comes to the job that its members can take after retirement and because this system helpful their own work. Actually Korea government have tried to prepare the law enactment of the private investigation service system since 1999 but have been failed. This study focuses on implementing the suitable system for private investigation service in Korea, which includes the consideration of the logical validity of the introduction by comparing with other foreign private investigation service system. We should make research and effort to cope with such as a partial amendment about the problem and the side effect that can be happened in a beginning stage of system trial.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Affecting Factors on the Safety on School -Focusing on U.S Public School Security Guard Patterns- (학교 내 안전에 영향을 미치는 요인: 미국 공립학교의 경비활동 유형을 중심으로)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.137-163
    • /
    • 2013
  • This research will incorporate cases from U.S public schools to analyze the factors which influences the security within the school and efficient security patterns to suggest an adequate suggestion to elevate domestic school security system. This study is divided into two following models: a serious criminal offense model, which considers crimes occurred on campus as subordinate variables, and a school violence model, which considers as subordinate variables after limiting an act of delinquency and an a group action that can harm the safety of students, although they are not included in the categories of crimes. First, from analyzing the factors which influences security within school, the explanation power of serious crime offense safety model and school violence safety model is measured 12% and 11.3%. In serious crime offense safety model, the safety education for students, among the safety programs provided by schools(t=2.548, p=0.011), parent participation to school management(t=10.694, p=0.000), Security activities on campus(t=3.643, p=0.000), and CPTED activity(t=6.467, p=0.000) are statistically significant, as affecting factors on the safety from serious crimes. Similarly in school violence model, the safety education for students, among the safety programs provided by schools(t=3.228, p=0.001), parent participation to school management(t=12.034, p=0.000), security activities on campus(t=2.663, p=0.000), and CPTED activity(t=3.928, p=0.000) are statistically significant, as affecting factors on the safety from school violence. Second, according to the analytic results on figuring out the optimal pattern to heighten the security activities, the serious offence model's explanatory power was 4.4% and school violence safety model rated 3.9%. With the serious offense safety model, the activity factors which showed statistically significant in influencing safety from serious offenses were cooperation with local police force (t=2112, p=0.035), school policy management (t=3.309, p=0.001), security patrolling activity (t=2.548, p=0.011). In the school violence model, security activities initiated by the school which showed statistically significant from serious offenses were cooperation with local police force (t=2.364, p=0.018) and policy management (t=4.142, p=0.000). In accordance with the result of this study, education for students rather than education for teachers is more positive in terms of the safety on campus, and parent participation, like education, is consistently needed for the safety on campus. In case of CPTED activity, reinforcing plans should be prepared by intactly accepting examples in the USA. In case of security activity, plans that can increase visibility and reinforce cooperation with local police in a smooth way will provide a positive effect to the safety on campus.

  • PDF

Classification Analysis on Private Security (민간경비에 대한 분류 분석)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.103-124
    • /
    • 2017
  • The purpose of this study is to analyze regional clusters and discrimination on size and sector of private security in national 16 areas in 2015. The results of the study using hierarchical cluster analysis and discriminant analysis are as follows. First, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the size of private security. The discriminant functions D for each cluster is as follows: (1) Large Area(1) = -383.981 + (.108 ${\times}$ number of security companies) + (.016 ${\times}$ number of guards), (2) Medium Area(2) = -35.570 + (.029 ${\times}$ number of security companies) + (.005 ${\times}$ number of guards), and (3) Small Area(3) = -5.381 + (.012 ${\times}$ number of security companies) + (.002 ${\times}$ number of guards). Second, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the sector of private security. The discriminant function D for each cluster is as follows: (1) Large Area(1) = -2224.402 + (-.562 ${\times}$ facilities security) + (1.245 ${\times}$ protection security) + (171.142 ${\times}$ convoy security) + (-2.722 ${\times}$ electronic security) + (2.020 ${\times}$ special security), (2) Medium Area(2) = -4.762 + (.052 ${\times}$ facilities security) + (.063 ${\times}$ protection security) + (-3.819 ${\times}$ convoy security) + (.110 ${\times}$ electronic security) + (-.165 ${\times}$ special security), and (3) Small Area(3) = -125.742 + (-.009 ${\times}$ facilities security) + (.432 ${\times}$ protection security) + (5.748 ${\times}$ convoy security) + (5.530 ${\times}$ electronic security) + (-.901 ${\times}$ special security).

  • PDF

Internal Mammary Lymph Node Irradiation after Breast Conservation Surgery: Radiation Pneumonitis versus Dose-Volume Histogram Parameters (유방보존술 후 내유림프절 방사선 조사: 방사선 폐렴과 체적-선량 히스토그램 변수들)

  • Kim, Joo-Young;Lee, Ik-Jae;Keum, Ki-Chang;Kim, Yong-Bae;Shim, Su-Jung;Jeong, Kyoung-Keun;Kim, Jong-Dae;Suh, Chang-Ok
    • Radiation Oncology Journal
    • /
    • v.25 no.4
    • /
    • pp.261-267
    • /
    • 2007
  • Purpose: To evaluate the association between radiation pneumonitis and dose-volume histogram parameters and to provide practical guidelines to prevent radiation pneumonitis following radiotherapy administered for breast cancer including internal mammary lymph nodes. Materials and Methods: Twenty patients with early breast cancer who underwent a partial mastectomy were involved in this study. The entire breast, supraclavicular lymph nodes, and internal mammary lymph nodes were irradiated with a dose of 50.4 Gy in 28 fractions. Radiation pneumonitis was assessed by both radiological pulmonary change (RPC) and by evaluation of symptomatic radiation pneumonitis. Dose-volume histogram parameters were compared between patients with grade <2 RPC and those with grade ${\geq}$2 RPC. The parameters were the mean lung dose, V10 (percent lung volume receiving equal to and more than 10 Gy), V20, V30, V40, and normal tissue complication probability (NTCP). Results: Of the 20 patients, 9 (45%) developed grade 2 RPC and 11 (55%) did not develop RPC (grade 0). Only one patient developed grade 1 symptomatic radiation pneumonitis. Univariate analysis showed that among the dose-volume histogram parameters, NTCP was significantly different between the two RPC grade groups (p<0.05). Fisher's exact test indicated that an NTCP value of 45% was appropriate as an RPC threshold level. Conclusion: This study shows that NTCP can be used as a predictor of RPC after radiotherapy of the internal mammary lymph nodes in breast cancer. Clinically, it indicates that an RPC is likely to develop when the NTCP is greater than 45%.

The Role of Immunohistochemical Biomarkers as Prognostic Factors by the Use of a Tissue Microarray in Breast Cancer Patients Under 45-years-old (45세 이하의 유방암환자에서 조직미세배열법을 이용한 면역조직화학적 생체표지자의 역할)

  • Kim, Eun-Seog;Choi, Doo-Ho;Jin, So-Young;Lee, Dong-Wha;Park, Hee-Sook;Lee, Min-Hyuk;Won, Jong-Ho;Kim, Yong-Ho;Lee, Kyu-Taek;Kim, Sung-Yong
    • Radiation Oncology Journal
    • /
    • v.26 no.1
    • /
    • pp.45-55
    • /
    • 2008
  • Purpose: This study evaluates the association of estrogen receptor(ER), progesterone receptor(PR), Her-2, COX-2, and survivin with the clinicopathological features and outcomes in young Korean women with breast cancer using recently developed tissue microarray(TMA) technology. Materials and Methods: A cohort of 212 young patients with breast cancer diagnosed at the age of 45 years or younger from March 1994 to August 2005, were enrolled in this study. The age range of patients was $23{\sim}45$ years(median age, 39 years). The minimum and median follow-up periods were 24 months and 60 months, respectively. Serial sections of primary tumors were processed by the use of a TMA for immunohistochemical staining for five biomarkers. The correlation of these five biomarkers and the clinicopathological features and outcomes were analyzed by statistical methods. Results: The majority of the patients were stage T1(90 patients) or T2(101 patients), and 105 patients(49.5%) had an axillary node metastasis. The 5-year overall and relapse free survival rates for all of the patients were 90.4% and 82.3%, respectively, and 36 patients had a locoregional or distant metastasis as a first event. Positive expression of ER, PR, Her-2, COX-2, and survivin was determined in 38.2%, 45.3%, 25.9%, 41.5%, and 43.4%, of the tumor samples, respectively. Tumor stage, nodal status, age, as well as expression of ER, PR, and HER-2 status were significantly associated with the disease free survival rate. Tumor stage, nodal status, as well as expression of ER, PR, and HER-2 were significantly related with the overall survival rate. Expression of COX-2 and survivin were not single independent prognostic factors for the disease free and overall survival rate although co-expression of HER-2 and COX-2 had a tendency as a poor prognostic factor. By multivariate analysis, only T stage and lymph node status were significant prognostic factors, and ER status was a marginally significant prognostic factor(p=0.075). Conclusion: Expression of ER, PR and HER-2 were significant prognostic factors for the relapse free and overall survival rate. Expression of COX-2 and survivin were not prognostic factors for young women with breast cancer.

The Clinical Significance of Cathepsin D and p53 Expression in Locally Advanced Rectal Cancer (국소진행된 직장암에서 Cathepsin D와 p53 발현의 임상적 의의)

  • Kim, Jun-Sang;Lee, Sheng-Jin;Kim, Jin-Man;Cho, Moon-June
    • Radiation Oncology Journal
    • /
    • v.26 no.1
    • /
    • pp.56-64
    • /
    • 2008
  • Purpose: Cathepsin D(CD) is a lysosomal acid proteinase that is related to malignant progression, invasion, and a poor prognosis in several tumors. The aim of this study was to evaluate the prognostic clinical significance of CD and p53 expression in pretreatment biopsy specimens from patients with locally advanced rectal cancer who were treated with preoperative chemoradiation. Materials and Methods: Eighty-nine patients with locally advanced rectal cancer(cT3/T4 or N+) were included in this study. Preoperative chemoradiation consisted of a dose of 50.4 Gy of pelvic radiation and two concurrent cycles of administration of 5-fluorouracil and leucovorin. Surgery was performed six weeks after chemoradiation. CD and p53 expression in pretreatment formalin-fixed paraffin-embedded tumor biopsy specimens were assessed by immunohistochemical staining using a CD and p53 monoclonal antibodies. The threshold value for a positive stain in tumor tissue and stromal cells was 1+ intensity in 10% of the tumors or stromal cells, respectively. Results: Positive CD expression was found in 57(64%) of the tumors and 32(35%) of the stromal cell specimens. There was no association with CD expression of the tumor or stromal cells and patient characteristics. There was a correlation between tumor CD expression with stromal cell CD expression(p=0.01). Overexpression of p53 was not a significant prognostic factor. The 5-year overall survival(OS) and disease-free survival(DFS) rates were not different between tumor CD-negative and positive patient biopsy samples(69% vs. 65%, 60% vs. 61%, respectively). The 5-year OS rates in the tumor-negative/stromal cell-negative, tumor-negative/stromal cell-positive, tumor-positive/stromal cell-negative and tumor-positive/stromal cell-positive biopsy samples were 75%, 28%, 62%, and 73%, respectively. Stromal cell staining only without positive tumor staining demonstrated the worst overall survival prognosis for patients(p=0.013). Conclusion: Overexpression of p53 in rectal biopy tissue was not associated with prognostic significance. In the pretreatment biopsy specimens, an exclusive increase in CD expression in stromal cells without tumor expression was related to poor overall survival in patients with locally advanced rectal cancer treated with preoperative chemoradiation.

The Study on the Perceptions of Radiological Technologist in Medical Imaging Equipment Used by the Oriental Doctor (한의사의 의료영상장비 사용에 대한 방사선사의 인식도)

  • Choi, Jae-Ho;Kang, Gi-Bong;Kim, Sang-Hyun;Kim, Tae-Hee;Kim, Gyoo-Hyung;Lee, Mi-Hwa;Ahn, Jung-Seong;Hong, Seong-Wan;Lee, Jae-Seok;Kwon, Ick-Su;Park, Jae-Yoon
    • Journal of radiological science and technology
    • /
    • v.40 no.1
    • /
    • pp.109-120
    • /
    • 2017
  • In order to examine how Radiological Technologists perceive the oriental doctor's use of Medical Imaging Equipment, surveys were conducted for the members of the Korean Radiological Technologists Association. The total number of respondents were 515 and 481, with 34 insincere responses removed caused of nonvalidated answer. The results of the analysis are as follows. Although there were no statistical significance in the difference in perception by location of residence, work place, and educational background, respondents with higher education showed a tendency to agree on the use of comprehensive medical imaging equipment, but tended to oppose the use of special medical imaging equipment. Differences in perception by gender showed a greater negative perception toward the oriental doctor's use of medical imaging equipment by women than men. In particular, women showed more negative tendency for oriental doctor's use of special medical imaging equipment such as MRI, CT, and ultrasound equipment compared to men, and this was statistically significant. The difference in perception by age showed that the oriental doctor's use of medical imaging equipment was negative in the 20~30s, neutral in the 40~50s, and positive in the 60s, which were statistically significant. The difference in perception by work experience showed that the longer the work experience was, the more positive it was toward oriental doctor's use of medical imaging equipment. Specifically, the most favorable tendency was found with work experience of more than 30 years, which was statistically significant. The results of this study revealed the Radiological Technologists' perceptions on the oriental doctor's use of Medical Imaging Equipment and this can contribute to the direction of public health promotion in the future.

Effects of Probiotics as an Alternative for Antibiotics on Growth Performance, Nutrient Digestibility, Noxious Gas Emission and Fecal Microbial Population in Growing Piglets (항생제 대체 생균제가 자돈의 생산성,영양소 이용률, 유해가스 발생량 및 분내 미생물 수에 미치는 영향)

  • Kim, Jong-Duk;Chung, Heung-Woo;Shim, Kum-Seob;Park, Seung-Young;Ju, Jong-Cheol;Song, Jae-Jun;Lee, Kyung-Ho;Park, Joong-Kook;Park, Do-Yun;Kim, Chang-Hyun
    • Korean Journal of Organic Agriculture
    • /
    • v.18 no.4
    • /
    • pp.527-539
    • /
    • 2010
  • This study was conducted to determine the effect of probiotics as an alternative for antibiotics on growth performance, nutrient digestibility, noxious gas emission and fecal microbial population in growing piglets. A total of 96 piglets ($22.5{\pm}1.3$kg average body weight) were allotted to 3 different treatment groups and replicated 4 times with 8 piglets per replicate in randomized complete block design. Treatments were T1) (Control, basal diet+0.2% antibiotics), T2) 0.2% probiotics complex and T3) 0.3% Bacillus probiotics. During the whole experiment period, there were no differences (p>0.05) in average daily gain (ADG), average daily feed intake (ADFI) and feed efficiency. However, digestibility of dry matter, crude protein, ether extract, nitrogen free extract and crude ash were showed higher in probiotics groups (T2 and T3) than those of control. In noxious gas emission, ammonia, amine, hydrogen sulfide and mercaptan were significantly (p<0.05) reduced in T2 and T3 treatments compared to those in control. Moisture content of feces was not significantly different among treatments. The colony forming units (CFU) of total bacteria, E. coli and thermoduric bacteria in feces were significantly different among treatments. The CFU of total bacteria, E. coli and thermoduric bacteria in T3 treatment were reduced by feeding probiotics B. From this study, we suggest that probiotics A and B are likely able to improve the growth performance and nutrients digestibility, reduce noxious gas emission and change the fecal microbial composition in growing piglets.