• Title/Summary/Keyword: Facilities Security

Search Result 763, Processing Time 0.025 seconds

A study on development strategies for military spiritual education complying with the era of peace and prosperity on the Korean Peninsula (한반도 평화와 번영시대에 부합하는 군 정신전력 교육 발전방안)

  • Kim, Nam-Seok;Park, Hyo-Sun
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.1-30
    • /
    • 2018
  • This study focused on how to supplement and develop military spiritual education in response to promotion of peace and prosperity and Change of Security Environment on the Korean Peninsula. In order to succeed in the peace and prosperity on the Korean Peninsula policy, Strengthening the military spiritual education is necessary. This study was analyzed through the survey and the results are as follows: First, the awareness level of military spiritual education is more than 68%. Second, the satisfaction level of education has been quit motivated, but, the respondents demands various methods of eduction. Third, the current mental power scores showed no significant difference for environmental change. In addition, based on the results of the research, the problem of military spiritual education is as follows. It is not enough to secure the identity that can firmly support the era of peace and prosperity on the Korean peninsula. Poor budget support might hinder improving poor education facilities and outdated equipment. Furthermore, there is a lack of research on future-oriented educational system in support of traditional education methods of repetition-type repeated education and unification. Therefore, we deducted the following development strategies for the military spiritual education in this paper. First, it is necessary to strengthen the military spiritual education to support the era of peace and prosperity on the Korean Peninsula. Second, for enhancing educational environments, the educational facilities and equipments should be improved by understanding the characteristics of the education target. Third, the integrated management of military research institutes specialized in military spiritual education should be pursued as a system development for ensuring the continuous effect of education. In conclusion, continuous attention and research are needed to establish national perspective and national security perspective, raise the military spirit and utilize various education development programs in order to develop efficient military spiritual education in the future.

  • PDF

Study on the Appropriate Use of Weapons by Private Security Guards: Focusing on Public Crowded Places (민간 경비원(보안요원)의 정당한 무기사용 방안 연구: 다중이용시설을 중심으로)

  • Hangil Oh;Kyewon Ahn;Ye ji Na
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.936-949
    • /
    • 2023
  • On August 3, 2023, a brutal incident of unprovoked violence, termed as "Abnormal motivated crime," occurred in a multi-use facility, where retail and transportation facilities converge, near Seohyeon Station. The assailant drove onto the sidewalk, hitting pedestrians, and then entered a department store where a knife rampage ensued, resulting in a total of 14 victims. In the aftermath of this incident, numerous murder threats were posted on social media, causing widespread anxiety among the public. This fear was further exacerbated by the emergence of a "Terrorless.01ab.net" service. Purpose: This research aims to explore necessary institutional improvements for private security personnel who protect customers and employees in multi-use facilities, to enable them to perform their duties more effectively. Method: To assess the risk of Abnormal motivated crime, a time series analysis using the ARIMA model was conducted to analyze the domestic trends of such crimes. Additionally, Result: the study presents suggestions for improvements in the domestic security service law and emergency manuals for multi-use facilities. Conclusion: This is informed by a legal analysis of the indemnity rights for weapon use by private security guards abroad and their operational authority beyond weapon usage.

A Review on the Legal rights and obligation from the legal status of registered security guard (청원경찰의 법적 지위에 따른 권한과 의무)

  • Han, seung;Kim, yong geun
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.251-278
    • /
    • 2015
  • Registered security guards carry out police duties as civilian police who are in charge of security service, and so they have a two-fold status: a civilian in terms of a social standing and a policeman in the way that they execute the authority of security. The problem caused by this legal position is that their legal rights and obligation can be unclear in the task-action and working relationship. This paper attempts to study their functions, rights, and legal duties through the interpretation of the related positive law so as to reveal the problems that may spring from this ambiguous status of registered security guards. This endeavor illuminates their legal status specified in the positive law in and around the Act on the police assigned for special guard, observing their functions and the legal duties in the pursuit of their tasks, and ending up pointing out the problems of the positive law. As a result of research work, the most significant problems, even if multifarious, are the avoidance of the state reparation in the responsibility for the illegal behavior in connection with their operation; the unconstitutionality of the disciplinary punishment regulation originated from the entrust with full powers; the imperfection of the rules about the cooperative ties with the police; the possibility of human rights abuse caused by the ban on the labor dispute; the equality problems from the dual pay system; and the inadequacy of the codes about the recruitment qualification and method. This research is intended to help achieve the purpose of the security of national critical facilities through the smooth execute of duties as well as the protection of the guards' rights. Besides, the key focuses posed in this paper are worthy of being developed more accurately through the following researches.

  • PDF

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

Maritime Cyber Security Status and Establishment of Maritime Cyber Security System (해사 사이버보안 동향 분석 및 해사 사이버보안 시스템 구축)

  • Ahn, Jong-Woo;Lim, Jeoung-Kyu;Park, Kae-Myoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.29-32
    • /
    • 2019
  • The development of Information and Communication Technology facilitates exchange of information and communication between system in ships or between ships and land facilities, thereby improving the efficiency of their work. However, these changes in the working environment of companies and ships increased the likelihood of cyber security incidents occurance like unauthorized access to company and ship systems or infection of malicious code, which results in significant safety, environmental and business damage to company and ships. Therefore, a cyber-risk-based approach was required to identify and respond to an increasing cyber threats. In this paper, the analysis of maritime cyber security status and guidelines for establishment of maritime cyber security system are provided.

  • PDF

Study on security measures for protecting major national facilities using the wind corridor (바람길을 활용한 국가중요지역 안전대책 강구에 관한 연구)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.109-120
    • /
    • 2011
  • How meteorological situations have affected human life for survival have been an important element of living or military strategy throughout history. In modern society, overcrowding of cities has brought about many problems. Moreover, high-rise buildings and land cover have been causing abnormal weather conditions. The wind corridor, especially in urban areas has been flowing differently from the dominant weather condition of the surroundings. Therefore, the wind corridor in urban areas can be a main component in protecting major national facilities in urban areas from damage. Especially the wind corridor is a main factor to derive harm from poisonous substances in air. This paper seeks to find out the wind corridor in urban areas and the efficiency of that. In addition to that, it studies how to use the direction to protect major national facilities and areas from damage. It is considered that this study will be useful to make defence project, not only for preventing CBR(chemical, biological, and radiological) terrorism and violent assembly, but also for evacuation of people in case of big accidents or natural disasters.

A Study on the Method of Vulnerability Analysis of Critical Infrastructure Facilities (공개 데이터를 활용한 제어시스템 취약점 분석 방안 연구)

  • Shin, Mi-joo;Yoon, Seong-su;Euom, Ieck-chae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.243-253
    • /
    • 2022
  • Recently, cyber attacks on national infrastructure facilities have continued to occur. As a result, the vulnerabilities of ICS-CERTs have more than doubled from last year, and the vulnerabilities to industrial control systems such as nuclear facilities are increasing day by day. Most control system operators formulate vulnerability countermeasures based on the vulnerability information sources of industrial control systems provided by ICS-CERT in the United States. However, it is difficult to apply this to the security of domestic control systems because ICS-CERT does not contain all relevant vulnerability information and does not provide vulnerabilities to domestic manufacturer's products. In this research, we will utilize publicly available vulnerability-related information such as CVE, CWE, ICS-CERT, and CPE to discover vulnerabilities that may exist in control system assets and may occur in the future. I proposed a plan that can predict possible vulnerabilities and applied it to information on major domestic control systems.

Drug Prescription Indicators in Outpatient Services in Social Security Organization Facilities in Iran

  • Afsoon Aeenparast;Ali Asghar Haeri Mehrizi;Farzaneh Maftoon;Faranak Farzadi
    • Journal of Preventive Medicine and Public Health
    • /
    • v.57 no.3
    • /
    • pp.298-303
    • /
    • 2024
  • Objectives: The aim of this study was to estimate drug prescription indicators in outpatient services provided at Iran Social Security Organization (SSO) healthcare facilities. Methods: Data on all prescribed drugs for outpatient visits from 2017 to 2018 were extracted from the SSO database. The data were categorized into 4 main subgroups: patient characteristics, provider characteristics, service characteristics, and type of healthcare facility. Logistic regression models were used to detect risk factors for inappropriate drug prescriptions. SPSS and IBM Modeler software were utilized for data analysis. Results: In 2017, approximately 150 981 752 drug items were issued to outpatients referred to SSO healthcare facilities in Iran. The average number of drug items per outpatient prescription was estimated at 3.33. The proportion of prescriptions that included an injection was 17.5%, and the rate of prescriptions that included an antibiotic was 37.5%. Factors such as patient sex and age, provider specialty, type of facility, and time of outpatient visit were associated with the risk of inappropriate prescriptions. Conclusions: In this study, all drug prescription criteria exceeded the recommended limits set by the World Health Organization. To improve the current prescription patterns throughout the country, it would be beneficial to provide providers with monthly and annual reports and to consider implementing some prescription policies for physicians.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

A Study on the Floor Plan Characteristics of Component Schools in Small Schools Complexes -by Analyzing Spatial Structures of School Facilities in Foreign Countries- (집합형 소규모 학교의 단위학교 평면구성 특성에 관한 연구 -외국학교 사례의 공간구성 분석을 통하여-)

  • Kweon, Ji-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.86-95
    • /
    • 2007
  • This study clarifies the theoretical background and the floor plan characteristics of component schools in Small Schools Complexes. The recent researches have proved the enhancement of students' social relationship and school security in the new school environment. The findings fur the characteristics by analyzing the component schools from six school complexes follow: (1) Students can access their classrooms in component schools through main entrances, shared corridors and private corridors. (2) Teachers' area is segregated from students' area, which does not encourage the social relationship between teachers and students. (3) Some of special classrooms, which are generally considered as shared facilities in a Small Schools Complex, are planned within component schools for accommodating specialized educational programs. (4) A component school occupying multiple floors reduces Intelligibility of space and chances of users' visual contact to colleagues. Finally, this study proposed the alternative floor planning directions in order to improve users' social relationship in a component school.