• Title/Summary/Keyword: Human Security

Search Result 1,178, Processing Time 0.025 seconds

A Novel and Efficient Feature Extraction Method for Iris Recognition

  • Ko, Jong-Gook;Gil, Youn-Hee;Yoo, Jang-Hee;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.399-401
    • /
    • 2007
  • With a growing emphasis on human identification, iris recognition has recently received increasing attention. Iris recognition includes eye imaging, iris segmentation, verification, and so on. In this letter, we propose a novel and efficient iris recognition method which employs a cumulative-sum-based grey change analysis. Experimental results demonstrate that the proposed method can be used for human identification in efficient manner.

  • PDF

Effects of Electronic Security Service Quality Satisfaction and Customer Satisfaction on Switching Barrier and Customer Loyalty (기계경비 서비스품질만족과 고객만족이 전환장벽 및 고객충성도에 미치는 영향)

  • Kim, Chang-Ho;Yoon, Jong-Dae;Jung, Chul-Kyu;Lee, Bong-Keun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.111-137
    • /
    • 2013
  • The purpose of this study is to examine the effects of electronic security service quality satisfaction and customer satisfaction on switching barrier and customer loyalty. Survey questionnaires were distributed to business owners in Seoul that are using electronic security system and the total of 500 copies were used as research data except 60 copies with insufficient responses. The results are as follow. First, as for the effects of electronic security service quality satisfaction on electronic security customer satisfaction, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on electronic security customer satisfaction. Second, as for the effects of electronic security service quality satisfaction on switching cost, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security service quality satisfaction on human relations, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on human relations. It indicates that the effects of electronic security service quality satisfaction on alternative attraction was not meaningful. Third, as for the effects of electronic security customer satisfaction on switching cost, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security customer satisfaction on human relations, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on human relations. But, it indicates that the effects of electronic security customer satisfaction on alternative attraction was not meaningful. Fourth, As for the effects of electronic security service quality satisfaction and electronic security customer satisfaction on customer loyalty, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on customer loyalty. As for the effects of switching cost on customer loyalty, it indicates that the higher switching cost achieves, the more it has positive effects on customer loyalty. As for the effects of alternative attraction on customer loyalty, it indicates that there is no meaningful relation between alternative attraction and customer loyalty. But, effects of human relations on customer loyalty, it indicates that there is no meaningful relation between human relations and customer loyalty. Based on the above results, it is noticeable that in the effects of electronic security service quality satisfaction and electronic security customer satisfaction on switching barrier, all of them had meaningful effects except for alternative attractiveness. This signifies that switching barrier factor can increase when the service quality of electronic security and customer satisfaction increase. In other words, it can be said that increased awareness of electronic security service quality satisfaction and electronic security customer satisfaction by electronic security users can lead to high customer loyalty by establishing switching barrier through such increased awareness.

  • PDF

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

Development of Human Resources at universities for training of specialist in security industries - based on Departments related Security services - (경호·경비분야 전문인력양성을 위한 대학 인적자원개발 - 경호관련학과를 중심으로 -)

  • Kwon, Tae-Il
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.19-38
    • /
    • 2006
  • With rapid social change, security industries were diversified and universities related total security service were founded for training of specialist with a theory and practical affairs. Today, universities must provide an education which fits to job characteristics in rapidly changing society. Also students through this education must find their job properly. The purposes of this study, therefore, are to search a career selection of students majoring in total security service related departments and to study a role of universities for development of specialist related security industries. Revitalization plan of human resources for departments related security services are as follows ; roles of universities: a specialization of curriculum and a diversification of training method. 'academic-industrial cooperation', role of government: 'a legal and institutional policy on academic-industrial cooperation';. Universities, cooperations, government must cooperate mutually for development of specialist related security service field.

  • PDF

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

Assessing the Importance of Information Security Factors Using AHP: Case of Defense Agency's Outsourcing Development of Information Systems (AHP를 이용한 정보보안 요소의 중요도 평가: 국방기관 정보시스템 외주개발 사례)

  • Park, Dongsoo;Yoon, Hanseong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.55-68
    • /
    • 2018
  • In this paper, we identify and evaluate the information security factors considered in outsourcing development of information systems for defense agency with analytic hierarchy process(AHP). To assess the information security elements, we prepared three groups including the experts of a defense agency, subcontractor managers and subcontractor practitioners who are involved in developing information systems. And the relative importance of security factors were analyzed using questionnaires and responses. As a result of analysis of 27 security factors, factors corresponding to human and physical security as a whole were evaluated as having higher importance. Although there are some differences in the ranking of some importance according to human roles, they can be positive for the implementation of complementary information security. And administrative security and technical security can be relatively insignificant considering that they can be considered as infrastructure of the overall information environment. The result of this paper will be helpful to recognize the difference of perception of information security factors among the persons in the organization where collaboration is activated and to prepare countermeasures against them.

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism (게이미피케이션 메커니즘을 이용한 초등 네트워크 정보보안 학습교재 및 교구 개발)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.787-797
    • /
    • 2016
  • This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

Health Publicness beyond the Healthcare Systems: Focusing on the Concept of Health Security and the Process of Social Dialogue (보건의료 공공성을 넘어 건강공공성으로: 건강안보와 사회적 대화를 중심으로)

  • Moon, Daseul;Chung, Haejoo
    • Health Policy and Management
    • /
    • v.28 no.4
    • /
    • pp.329-338
    • /
    • 2018
  • The study seeks to widen the discussion from healthcare oriented 'health publicness' to human security oriented 'health publicness'. The shortcomings of previous literatures on health publicness are as follows: (1) the studies have confined the range of discussions to healthcare system, (2) lacked arguments from political perspectives, and (3) failed to provide actionable pathways to achieve the goal. Thereby, we suggest 'health publicness' based on the concept of human security to solve multidimensional healthcare problems. The health publicness based on human security, which aims to secure everybody's freedom from want and fear, enables not only to expand the scope of health problems that can be discussed but also to propose the procedures to achieve health publicness. More specifically, it consists of substantive and procedural health publicness. The former is about 'health security'-protecting, maintaining, and promoting individual's health-whereas, the latter is about 'social dialogue' guaranteeing participation of citizens, government, employers, and worker representatives. In conclusion, this study proposes the 'Regional Healthcare Quadripartite' as the incarnation of health publicness involving a variety of actors within and across the healthcare system.