• Title/Summary/Keyword: Aviation Security

Search Result 195, Processing Time 0.021 seconds

A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents (고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로)

  • Park, Sung-Sik;Cho, Sung-Hwan;Kim, Kwang-Ok;Jung, Ju-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

Abolition of restrictions and research on precondition for nominating drone photographing free area (규제혁파, 드론 촬영 자유구역 지정을 위한 선결조건 연구)

  • Seok, Geum-Chan;Park, Gye-Soo;Nam, Soung-Ho;Kim, Young-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.209-217
    • /
    • 2020
  • The background of the research is the following. With the prosperity of drone industry, the government has been actively promoting measures to nominate 'drone photographing free areas'. However, existing laws, and procedures are rather unclear with related environmental factors in discordance with one another. Hence, voices in need for establishing a clear precondition for nominating drone photography free area have been rising. The purpose of the research is to provide measures for the preconditions to establish photography free areas for convenient drone photographing. The research utilizes literary methods, conducting focus group interviews to coordinate with specialists who can participate and discuss so that they can provide improvement measures. The research renders improvement measures in different sectors including 2x items in aviation security law, 8x items in free area nomination and procedure, 4x items in infrastructure establishment and information management area. The expected effects are the following: by attaching drone photography with aviation security law, nominating photography free area can be linked up with the Ministry of Land Infrastructure and Technology. Secondly, by enlarging photography restricted area to upper mid-air, a three dimensional drone security will be possible. Thirdly, by providing a 'Yongin area standard model', free area nomination will become more easy. Future research will focus on enhancing aviation security law regarding drone photographing. In addition, the promotion to nominate free areas for 33x responsible areas in accordance with the National Intelligence service will be required.

Improving Imaging Quality Assessment of Cabinet X-Ray Security Systems (캐비닛 엑스선 검색장비 이미지품질평가 고도화 방안 연구)

  • Yoon, Yeon Ah;Jung, Jin Hyeong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.47-60
    • /
    • 2021
  • Purpose: This study proposes methods and procedures for evaluating imaging security systems quality of cabinet x-ray screening system to enhance performance certification technology. Also, conducted a comparative analysis of the literature of test-kit for imaging security quality evaluation. Methods: Comparative analysis of the test-kits and related documents for image quality assessment of cabinet x-ray screening equipment. This allows assessment items were selected and the methods for each assessment item were proposed. In addition, the configuration method of the assessment team was established by applying the technology readiness assessment(TRA). Results: Four of the assessment items were selected when estimate image quality by a comparative analysis of literature. For each assessment item, the evaluation method and minimum level of availability were determined. Finally, this paper proposes an imaging quality assessment of cabinet X-ray imaging security systems. Conclusion: Development of imaging security systems evaluation procedures for cabinet X-ray screening systems can be help improve performance certification of aviation security equipment.

Design of an IOT System based on Face Recognition Technology using ESP32-CAM

  • Mahmoud, Ines;Saidi, Imen;bouzazi, Chadi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.1-6
    • /
    • 2022
  • In this paper, we will present the realization of a facial recognition system using the ESP32-CAM board controlled by an Arduino board. The goal is to monitor a remote location in real time via a camera that is integrated into the ESP32 IOT board. The acquired images will be recorded on a memory card and at the same time transmitted to a pc (a web server). The development of this remote monitoring system is to create an alternative between security, reception, and transmission of information to act accordingly. The simulation results of our proposed application of the facial recognition domain are very efficient and satisfying in real time.

Reparation for Victims of the International Civil Aviation Arising from Armed Conflict Zones

  • Huaping, QIN
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.245-271
    • /
    • 2015
  • The downing of the MH17 reminds the world that the international civil aviation is not as safety and security as people expected. Such tragedy is partly due to the risk and danger of the armed conflict zones, but is more attributed to the ignorance to the international law by the responsible parties concerned. International laws applicable to the armed conflict zones shall be strictly followed, and the reparation shall be provided to the victims, otherwise such disaster could not be avoided in the future.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

Measures to Use Logistics Policy to Activate the Known Shipper System in Korea (우리나라 상용화주제 활성화를 위한 물류정책 활용 방안)

  • Kwak, Bong-Hwan;Kang, Dong-Yoon
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.139-145
    • /
    • 2013
  • This study examines the logistics policy and system to activate the air freight known shipper system in Korea in order to suggest how to use the system necessary to convert and expand common shippers into known shippers. Even though "The Act on Aviation Safety and Security" and "Air Freight Security Criteria for Known Shippers" were revised in 2012 and 2011 each, the purpose was to regulate procedures to control aviation safety and security and air also freight security, so it does not include any measures to activate the known shipper system. Therefore, to activate the known shipper system, this study suggests measures to use the logistics security support system of "The Fundamental Law on Logistics Policy" revised in 2012, the logistics cooperation system, and consulting support as well.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

Private security development plan through security guard crime statistics analysis

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.283-288
    • /
    • 2021
  • The purpose of this paper is to provide basic data for related studies by comparing and analyzing crimes committed by security guards through criminal statistical analysis, and to contribute to the sound development of the private security industry by strengthening the professional ethics of security guards and reducing guard crimes. The purpose. As a results of a comparative analysis of the number of crimes by security guards and the crime rate are as follows. Although the total number of crimes committed in Korea and the number of crimes committed by security guards decreased every year, the crime rate of security guards was higher than the average crime rate. felonious crimes, violent crimes, customs crimes, and special economic crimes were consistently high. As a countermeasure against the results, first, interest in security guard crimes as perpetrators rather than as victims, second, reinforcement of professional ethics education through new training and job training, third, academic development and systematic It appeared as a specification of the definition and current status of security guards for the study.