• Title/Summary/Keyword: Human Rights Education

Search Result 184, Processing Time 0.025 seconds

The assessment and political subject of Revised Security Industry Law (개정 경비업법의 평가와 정책과제)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.349-386
    • /
    • 2013
  • This research analyzes and evaluates The Korean Security Industry Law(TKSIL) putting the regulation of the present government about the private security industry. It nowadays becomes the important axis of the police services offered in the aspect of 'the national life safety' in connection with 'the materialization of society which is safe from the crime'. TKSIL is one of the national administration strategies which Park Gun-hye government aims on supervision policy. After seeking out the core values of the private security industrial policy which sets up in order to approach the national life safety which Park Gun-hye government aims, we make some assessments of this revised security industry law systematically. Particularly all keynote of policy about the private security of the police tried to be confirmed and the desirable direction of policy tries to be presented as to the security industry law application and real operation. In the site of organized civil complaint, the revised security industry law was revised as the direction which intensifies the administrative regulation as to the partial regulation such as it established the reason of the introduction of the arrangement license system. And grounds for disqualification of security instructor and guard, and rules of punishment is intensified order to intercept previously illegal and violent act of the security company etc. However it has the feature that it accomplishes 'the law principle(principle of statute)' the substantial portion through the effort of them changing a lot the content for the form of the law when being the clauses of the fundamental human rights limit, although it has been prescribed in "the security industry law enforcement ordinance" or "the security industry law enforced regulation". The security industry law revised this time brought from the change of the sharp policy through the revision of 17 clauses or new establishment. It can divide into 4 categorizes. (1) strictness of punishment in the site of organized civil complaint (2) Intensification of throwing out for the violation person in the private security business market time-limitedly (3) Intensification of the legal guide supervision power of police (4) upstream of the capital, name tag attachment under compulsion and the limit about other equipment use etc. Essentially "the security industry law" cannot help regulating the national interference of the private security and regulation with this content. However as to this interference and regulation, the limit has to be possible within reasonable range. As the history proved, excessive regulation by the country is not only due to bring the distortion of the security system of nation but also provoke national social cost. It can't be disregards ever that it premises the harmony which appropriate as well as reasonable in the socio-economic dimension for drawing the best combination that all things which get the compulsory education, it limits the person providing the private security service to the corporation, or it limits to the certificate of qualification holder are the ultimate for 'the safety of the national life'.

  • PDF

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Systematic Review of Community Elder Abuse Studies in South Korea (한국 지역사회 거주 노인학대 연구의 체계적 고찰)

  • Kim, Dong Ha;Kang, Serin;Lee, Yoon Kyoung;Cha, Ye Won;Yoo, Seunghyun;Kim, Hongsoo
    • 한국노년학
    • /
    • v.36 no.4
    • /
    • pp.1003-1024
    • /
    • 2016
  • The human rights of older people have gotten more attention recently in South Korea, a country that is in transition to a super-aged society. This study aimed to systematically review studies on elder abuse and related factors among community-dwelling older adults in South Korea over twenty years (1994-2016). We searched major databases (Riss, DBpia, KISS, KMbase, and PubMed) and identified published studies relevant to the topic. Based on inclusion and exclusion criteria related to study quality, a total of 31 studies were selected for this review. We examined types, measurements, and risk factors of elder abuse as well as study designs in the selected studies, guided by Johannesen's theoretical framework on elder abuse. All of the reviewed studies on elder abuse in Korea were cross-sectional studies, most of which focused on older people living in urban areas, using a non-random sampling method. All of the studies focused on certain types of elder abuse only. Some adopted elder-abuse instruments that were not validated, and others used self-developed instruments without psychometric tests. As for the risk factors of elder abuse in South Korea, the physical and mental health of the victims and aggressors impacted the risk of elder abuse, but general sociodemographic factors such as age, sex, and education were less likely to be related to the risk. In addition, decreasing caregiver burden and building elder-friendly communities are important for the prevention of elder abuse. Needed are further empirical studies on elder abuse with a theoretical framework that gives consideration to the unique sociocultural contexts of Korea. It is also recommended to develop instruments to measure elder abuse reflecting the sociocultural contexts of Korea, and to examine the multi-dimensional risk factors of elder abuse.