• Title/Summary/Keyword: Human security

Search Result 1,198, Processing Time 0.026 seconds

A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework (직무별 특성을 고려한 대학 정보보호 학과의 교육분야 선정 및 운영에 관한 연구)

  • Lim, Won Gyu;Shin, Hyuk;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • Because intelligent and organized cyber attack, It is difficult to respond to cyber threats with only a small number of information security experts. Accordingly, information security department compared to 2013 it increased by 17%. But there was a problem that cannot train appropriate students for companies. This research examined the Workforce Framework and Knowledge Units for improving this situation. Based on this, educational department in cyber security major was selected to be learning at the university. And it proposed a plan for a managing course to operate. And the result will be utilized as fundamental research of human resources medium- and long-term demand and supply planning in cyber security department.

An Investigation of the Factors that Influence the Compliance to Information Security Policy: From Risk Compensation Theory (정보보안 정책 준수에 영향을 미치는 요인: 위험보상이론 관점에서)

  • Yim, Myung-Seong;Han, Kun Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.153-168
    • /
    • 2013
  • Information security has been a major concern in organizations. The longstanding question of how to improve employees security behaviors and reduce human errors remains unanswered and requires further exploration in the information security domain. To do this, we propose a risk compensation theory-based model and examine the model. Research results shows that the relationships between information security countermeasures and information security compliance intention of employees are moderated by system vulnerability. However, the finding is contrary to the previously held risk compensation assumption and deserve further study. In addition, system quality does not play a moderator role in the relationship. Conclusions and implications are discussed.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

A Study on the Utilizing Certificate Awareness for Student Certificate Holders of Private Security Guard (신변보호사 자격취득 학생들의 자격활용 인식에 관한 연구)

  • Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.45-54
    • /
    • 2013
  • Korea Security Association suggested from who Professor An, Hwang Kwon advocated the introduction of a private security guard certification system, and the private security guard certification exam has been conducted seven times since 2005, being authorized by the government. Currently, there are a lot of certified private security guards who have passed the exam. In fact, however, no preference is given to them. In terms of employment, they don't receive any preferential treatment nor are given any extra points. Furthermore, they cannot afford to make use of their certificate. The purpose of this study was to examine the state of utilizing the private security guard certificate among student certificate holders and their awareness of the private security guard system. The findings of the study were as follows: First, it's important to present a vision for certified private security guards, and what equally matters is to make it clear how and where they can show what they can do. Second, it's required to improve the image and reliability of private security guards as professional security guards. Third, candidates for the certification exam should boost their own self-esteem, confidence and professionalism as competent human resources who can make a contribution to society.

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

A Study on the Right to Housing in International Human Rights Laws and Instruments (국제인권법 및 인권규범의 주거권 규정에 대한 연구)

  • Kim, Yong Chang
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.3
    • /
    • pp.514-540
    • /
    • 2013
  • Today human rights are the most complex and prominent issue in the system of international law, and the right to housing(housing right) is also recognized as a basic human right in the international human right instruments including the Universal Declaration of Human Rights. This study targets to comprehensive review of the housing rights provisions with 85 international human rights laws and instruments. And the contents and characteristics of housing rights are analyzed with categorization based on housing rights in general, housing rights of workers, socially vulnerable groups, international regional organizations. Housing right takes also the features of universality, indivisibility, interdependence, and right to adequate housing should be interpreted with holistic view including legal security of tenure, accessibility, affordability, location beyond ensuring just a physical housing space. Approaches to the housing right comprehensively reflect the view of the right to development, the perspective of gender equality, the principle of non-discrimination, the participation rights, and orient the housing right should be seen as the right to live somewhere in security(safety), peace and dignity.

  • PDF

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

A Study on Private Security in the 1980s (1980년대의 민간경비연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.43-51
    • /
    • 2016
  • In the 1980s, private security was established in the framework of institutional framework with the Security Industry Act which was enacted in 1976. The agents who brought in the development of the private sector in 1980 enjoyed a boom in the global economy, affected by its high-flying dollar value, low international interest rate, low oil prices, and the blooming economy. In addition, the semiconductor, computers and communications equipment that was promoted in accordance with the e-Literacy plan were raised. Following the economic development of various events such as Seoul International Trade Fair, "86 Asian Games," and "88 Seoul Olympic Games," private security expenses were enhanced by increasing awareness of civilian expenses. Also, in the 1980s, Korean investment in foreign companies, including Japan's Secom, or Korean technology, brought many changes to the private security. Meanwhile, the cost of security, which has been centered around human expenses, has brought about the era of mechanized spending, or machine security expenses. The purpose of this study is to systematically analyze the social environment surrounding the private security in the 1980s and systematically analyze the important factors that contribute to private security.

Depression and Anxiety Related with Married Women's Attachment Security and Self-esteem : Focused on the Mothers of Elementary School Students (기혼여성의 애착안정성과 자아존중감에 따른 우울, 불안 : 초등학생 어머니를 중심으로)

  • Kwahk, So-Hyeon;Kim, Soon-Ok
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.7
    • /
    • pp.35-48
    • /
    • 2007
  • The purpose of this study was to examine the difference between the depression and anxiety related with maternal attachment security and those with self-esteem. The study subjects were 240 children's mothers from seven Community Social Welfare Service Centers in Seoul, Incheon, and Pyeongtaek, including those from 1st graders to 6th graders of 2 elementary schools in Seoul. Consequently, a total of 200 mothers were selected for this study. The data in this study were analyzed with SPSS 12.0 program by frequency analysis, technical statistics analysis, Cronbach's $\alpha$, Pearson's correlations, partial correlation analysis, and two-way ANOVA. The results of this study are as follows: (1) Paternal attachment security and maternal attachment security indicated a moderate level of negative correlation with depression and anxiety. Self-esteem showed a high level of negative correlation with depression and anxiety. For self-esteem, we divided the subjects into two groups of high and low self-esteem. In the former, anxiety was significantly negatively correlated with paternal attachment security and depression was not significantly correlated with maternal attachment security and paternal attachment security. In the low group, neither depression nor anxiety showed meaningful correlation with paternal attachment security and maternal attachment security. (2) Married women's depression and anxiety had a main effect both in paternal attachment security and self-esteem level, and in maternal attachment security and self-esteem level. However they had no interactive effect in paternal attachment security and self-esteem level, and in maternal attachment security and self-esteem level.

An Analysis of the Relative Importance of Security Level Check Items for Autonomous Vehicle Security Threat Response (자율주행차 보안 위협 대응을 위한 보안 수준 점검 항목의 상대적 중요도 분석)

  • Im, Dong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.145-156
    • /
    • 2022
  • To strengthen the security of autonomous vehicles, this study derived checklists through the analysis of the status of autonomous vehicle security. The analyzed statuses include autonomous vehicle characteristics, security threats, and domestic and foreign security standards. The derived checklists are then applied to the AHP(Analytic Hierarchy Process) model to find their relative importance. Relative importance was ranked as one of cyber security management system establishment and implementation, encryption, risk assessment, etc. The significance of this study is to reduce cyber security incidents that cause human casualties as well improve the level of security management of autonomous vehicles in related companies by deriving the autonomous vehicle security level checklists and demonstrating the model. If the inspection is performed considering the relative importance of the checklists, the security level can be identified early.