• Title/Summary/Keyword: Human security

Search Result 1,193, Processing Time 0.031 seconds

A Study on the Privatization of the Function Security to Improve Efficiency in Function of the Police (경찰기능의 효율성 제고를 위한 경비기능의 민영화 방안)

  • Han, Heung-Tai
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.306-335
    • /
    • 2000
  • The desires for safety of body and life can be said to be fundamental and natural in human beings. But the rapid industrialization and urbanization phenomena in our modern society is accelerating the treand for increasing diverse social pathology. Rise of serious crimes such as robbery and rape has already become an especially serious social problem and is at the point of threatening our welfare and social order. But the police, which is primarily responsible for the maintenance of welfare and social order of the public, is unable to respond actively to the increasing demand for policing due to the lack of available manpower and overwork. Thus, the purpose of this thesis is to look for a plan to actively respond to the daily increasing outcry for law and order so that the public may maintain safe and happy lifestyles without the threat of crime. One concrete and practical strategy is to resolutely separate and transfer some of the many functions of the police that can be handled by citizen organizations to those groups so that the police can be relied upon to become functionally efficient. This will decrease the work of the police, thereby allowing the police to concentrate on its inherent responsibilities. As its primary example, 'transferring the function of security' of the police to the private security industry is suggested in this thesis.

  • PDF

Cost Risk Analysis for Preparing Budgets of Information Security using Fuzzy AHP (정보보안 예산 수립에서 퍼지 AHP의 적용을 통한 위험 비용 분석)

  • Ryu, Si-Wook;Her, Duk-Gyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.119-126
    • /
    • 2012
  • Recently, the breakdown of online banking servers and the leakage of customer information give rise to much concern about the security of information systems in financial and banking companies in Korea. The enforcement of security for information system becomes much more important issue than earlier. However, the security reinforcement of information system is restricted by a budget. In addition, the activities' cost to secure information system from threatening are under uncertain circumstances and should be established by a human decision maker who is basically uncertain and vague. Thus, making the budget for information system is exposed to any extent of the risk for these reasons. First, we introduce brief fuzzy set theory and fuzzy AHP (Analytic Hierarchy Process) methodology. Then, the cost elements that comprise yearly budget are presented and the priorities among the cost elements are calculated by fuzzy AHP. The cost elements that are exposed to risk are evaluated from the both perspectives of the risk impact and risk occurrence possibility which are expressed as linguistic terms. To get information on the risk profiles-pessimistic, most likely, and optimistic-for each cost element, the evaluation is accomplished and the result is presented. At last, the budget ranges-minimum, mode, maximum-for each cost element are estimated with the consideration of the risk profiles.

Analysis of the GOP Border security systems of the ROK Army by Using ABMS and NOLH design (ABMS와 NOLH을 이용한 한국군 GOP 경계시스템에 관한 분석)

  • Oh, Kyungtack
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • In this study, the border security problem of the ROK Army is examined by applying the agent-based modeling and simulation (ABMS) concept as well as its platform, MANA. Based on the approximately optimized behavior of the infiltrator obtained using genetic algorithm (GA), we evaluate the GOP border security system which consists of human resources, surveillance, as well as command and control (C2) systems. We use four measures of effectiveness (MOEs) to evaluate its performance, and we apply a near optimal latin hypercube (NOLH) design to deal with the large number of factors of interest in our model. By using a NOLH design, our simulation runs are implemented efficiently. We hope the results of this study provide valuable data for deciding the configuration of the border security system structure and the number of soldiers assigned in the platoon.

A Study on Improving Management of Substances Requiring Preparation for Accidents Facilities (사고대비물질 취급시설 관리방안 연구)

  • Kim, S.B.;Park, C.H.;Cho, M.S.;Lee, J.S.;Kim, J.M.;Noh, H.R.;Seok, G.S.
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.3
    • /
    • pp.77-82
    • /
    • 2012
  • The leakage of toxic chemicals impact seriously on human being and environment, therefore during their treatment process, a proper management system is necessary to control their toxic effect. This study was designed to suggest the management regulation that supports business managers and facilities management. There are no extra regulation to control emergency accidents and terrors in chemical facilities. Developed countries like USA operate the management standards to control the toxic chemical and facilities according to their toxicity and processes. In order to solve this problem, we have analysed the advanced nations standard methods of security in chemical plants to study the new security management regulation which helps to prevent the chemical accidents. Especially, in USA, CCPS (Center for Chemical Process Safety), SVA (Security Vulnerability Assessment) and RBPSs (Risk-Based Performance Standards) of DHS (Department of Homeland Security) were invest I gated. On the basis of the results, we have suggested the application methods of the security and safety regulation in Korea.

Exploring Image Processing and Image Restoration Techniques

  • Omarov, Batyrkhan Sultanovich;Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.172-179
    • /
    • 2015
  • Because of the development of computers and high-technology applications, all devices that we use have become more intelligent. In recent years, security and surveillance systems have become more complicated as well. Before new technologies included video surveillance systems, security cameras were used only for recording events as they occurred, and a human had to analyze the recorded data. Nowadays, computers are used for video analytics, and video surveillance systems have become more autonomous and automated. The types of security cameras have also changed, and the market offers different kinds of cameras with integrated software. Even though there is a variety of hardware, their capabilities leave a lot to be desired. Therefore, this drawback is trying to compensate by dint of computer program solutions. Image processing is a very important part of video surveillance and security systems. Capturing an image exactly as it appears in the real world is difficult if not impossible. There is always noise to deal with. This is caused by the graininess of the emulsion, low resolution of the camera sensors, motion blur caused by movements and drag, focus problems, depth-of-field issues, or the imperfect nature of the camera lens. This paper reviews image processing, pattern recognition, and image digitization techniques, which will be useful in security services, to analyze bio-images, for image restoration, and for object classification.

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

A Study on the Security Enhancement of the Industrial Control System through the Application of IEC 62443 Standards (IEC 62443 표준 적용을 통한 산업제어시스템 보안성 강화 연구)

  • Jin, Jungha;Kim, Juntae;Park, SangSeon;Han, Keunhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.280-283
    • /
    • 2021
  • SME(small and medium sized enterprise) 환경의 스마트공장 환경에서는 실제 제조라인에서 동작하는 센서(Sensor) 및 액추에이터(Actuator)와 이를 관리하는 PLC(Programmable Logic Controller), 더불어 그러한 PLC를 제어 및 관리하는 HMI(Human-Machine Interface), 그리고 다시 PLC와 HMI를 관리하는 OT(Operational Technology)서버로 구성되어 있으며, 제어자동화를 담당하는 PLC 및 HMI는 공장운영을 위한 응용시스템인 OT서버 및 현장 자동화를 위한 로봇, 생산설비와의 직접적인 연결을 수행하고 있어서 스마트공장 환경에서 보안 기술의 개발이 중점적으로 필요한 영역이다. 이러한 SME 환경의 스마트공장 보안 내재화를 이루기 위해서는, 스마트공장 SW 및 HW 개발 단계에서 IEC 62443-4-1 Secure Product Development Lifecycle에 따른 프로세스 정립 및 IEC 62443-4-2 Component 보안 요구사항과 IEC 62443-3-3 System 보안 요구사항에 적합한 개발 방법론의 도입이 필요하다.

A Role of Religionists and Religious Newspapers for the Harmonious Society of Korea (종교인과 종교언론의 사회 통합적 역할 -종교신문을 중심으로)

  • Park, Gwang-Su
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.19
    • /
    • pp.193-211
    • /
    • 2005
  • Korean religionist have actively participated in the movements of national security and peace, human rights and dignity, freedom and equal rights, and other social issues. Recently, either progressive or conservative religionists have strongly shown their different approaches in solving social issues, i.e., national security and peace in connection of 'national security law.' A few religious leaders' public views have been misused by some politicians. It is important for both the religionists and journalists in religious newspapers how to bring a harmonious resolution among the people who are either in conservatism or in progressivism. Social participation of religionists is both to respond to the timely situation of civil society and to realize freedom, equality, and peace to the society. Although the principle of the separation of religion and state was established to secure both the right of politics and the freedom of beliefs, political groups have either utilized or suppressed religions. Some politicians have also wrongly applied separation of religion and state by excluding religious aspects in public schools. Religionists and journalists of the religious newspapers should not provide one-sided prejudice but to provide objective information and its righteous analysis to guide people in the right direction to solve social problems. Also, religious newspapers should open a field of discussion how to resolve some issues between the 'national security law' and freedom.

  • PDF

Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment

  • A. Syed Ismail;D. Pradeep;J. Ashok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2822-2843
    • /
    • 2023
  • All aspects of human life have become increasingly dependent on data in the last few decades. The development of several applications causes an enormous issue on data volume in current years. This information must be safeguarded and kept in safe locations. Massive volumes of data have been safely stored with cloud computing. This technology is developing rapidly because of its immense potentials. As a result, protecting data and the procedures to be handled from attackers has become a top priority in order to maintain its integrity, confidentiality, protection, and privacy. Therefore, it is important to implement the appropriate security measures in order to prevent security breaches and vulnerabilities. An improved version of Modular Encryption Standard (IMES) based on layered modelling of safety mechanisms is the major focus of this paper's research work. Key generation in IMES is done using a logistic map, which estimates the values of the input data. The performance analysis demonstrates that proposed work performs better than commonly used algorithms against cloud security in terms of higher performance and additional qualitative security features. The results prove that the proposed IMES has 0.015s of processing time, where existing models have 0.017s to 0.022s of processing time for a file size of 256KB.

Early Career Turnover Model and Career Path for Self-realization: Findings in Korea's Information Security Industry

  • Song-Ha Lee;Hyo-Jung Jun;Tae-Sung Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1135-1155
    • /
    • 2023
  • Management of the workforce in the early career stage who enter information security work after graduating from college or university so that they can continue to develop their information security careers without leaving the organization can be a solution to the problem of absolute shortage of staffing and lack of skills. This is because the workforce can improve their job skills, and organizations can build a stable, cost-effective human resource management system. This paper constructed and verified a turnover intention research model focusing on the factors that affect the turnover intention of early-stage workforce who took their first steps in society as an information security workforce after graduating from university or college; it confirmed that self-realization is a crucial factor. Furthermore, with in-depth interviews, the career path information of skilled workers, which is essential information necessary for self-realization, was analyzed, and the direction of HRM for self-realization of the workforce in the early career stage was presented.