• Title/Summary/Keyword: Individual Security Awareness

Search Result 42, Processing Time 0.034 seconds

A Study on Developing Core Competency of Outplacement with Delphi: Focusing on Special Security Government Officials (Delphi를 활용한 전직 핵심역량 개발에 관한 연구 - 특정직 경호공무원 중심으로 -)

  • Kim, Beom-Seok
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.95-130
    • /
    • 2014
  • The purpose of this study focuses on developing the outplacement competency of special security government official for which precedent reference research, expert review, and expert Delphi analysis used according to three steps of study process. The final Delphi examination analysis resulted in outplacement competency into four groups of competency and twenty-two subcategories. Thus, it is very worthy to develop outplacement's competencies necessary for outplacement of special security government official through expert's Delphi examination in the first time, which have not being researched until now, and to present them theoretically through clarification and verification process accomplished by experts and staffs related to outplacement. Individual effort is essential to strengthen their capabilities based on accurate self evaluation, for which the awareness and concept need to be redefined to help them face up to the reality by readjusting career goal to a realistic level. Also, active career development plan to improve shortcoming in terms of outplacement competency is required. The result of this study, which ouplacement successors of special security government officials participated studying process, will be used as the basic data to establish an outplacement curriculum and an educational system for strengthening competency necessary for outplacement of special security government official.

  • PDF

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

The Causal Relationship between Supervisor Transformational Leadership and Employee Self-leadership Affected by Organizational Support - with a Focus on the Security Organization at the Korean National Assembly - (국회 경호.경비조직의 지원에 따른 상사의 변혁적 리더십과 셀프리더십의 인과관계)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.37-62
    • /
    • 2013
  • One of the organizational characteristics in the modern society is the emphasis placed upon individual autonomy in an effort to promote and develop each member's morale as well as the efficiency in personnel management. Therefore, it can be understood that the importance of "Self" is recognized in work places and the leadership of supervisors and each member's self-management and control are also emphasized, leading to establishment of the "Self-leadership" concept. In this study, the effect of the Transformational Leadership of the supervisors on the subordinates' Self-leadership was analyzed and the causal factor of organizational support in the relationship between Transformational Leadership and Self-leadership was defined. A survey was conducted with 182 security officials at the National Assembly and the following results were obtained. First, Transformational Leadership had a positive effect on Self-leadership and the Transformational Leadership of the supervisors had a statistically significant impact on the organizational support awareness. Furthermore, organizational support showed a statistically significant mediator effect in the relationship between the Transformational Leadership of the supervisors and the Self-leadership of the subordinates. Finally, future directions in regard to the personnel management system were suggested.

  • PDF

Psychological and Pedagogical Features the Use of Digital Technology in a Blended Learning Environment

  • Volkova Nataliia;Poyasok Tamara;Symonenko Svitlana;Yermak Yuliia;Varina Hanna;Rackovych Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.127-134
    • /
    • 2024
  • The article highlights the problems of the digitalization of the educational process, which affect the pedagogical cluster and are of a psychological nature. The authors investigate the transformational changes in education in general and the individual beliefs of each subject of the educational process, caused by both the change in the format of learning (distance, mixed), and the use of new technologies (digital, communication). The purpose of the article is to identify the strategic trend of the educational process, which is a synergistic combination of pedagogical methodology and psychological practice and avoiding dialectical opposition of these components of the educational space. At the same time, it should be noted that the introduction of digital technologies in the educational process allows for short-term difficulties, which is a usual phenomenon for innovations in the educational sphere. Consequently, there is a need to differentiate the fundamental problems and temporary shortcomings that are inherent in the new format of learning (pedagogical features). Based on the awareness of this classification, it is necessary to develop psychological techniques that will prevent a negative reaction to the new models of learning and contribute to a painless moral and spiritual adaptation to the realities of the present (psychological characteristics). The methods used in the study are divided into two main groups: general-scientific, which investigates the pedagogical component (synergetic, analysis, structural and typological methods), and general-scientific, which are characterized by psychological direction (dialectics, observation, and comparative analysis). With the help of methods disclosed psychological and pedagogical features of the process of digitalization of education in a mixed learning environment. The result of the study is to develop and carry out methodological constants that will contribute to the synergy for the new pedagogical components (digital technology) and the psychological disposition to their proper use (awareness of the effectiveness of new technologies). So, the digitalization of education has demonstrated its relevance and effectiveness in the pedagogical dimension in the organization of blended and distance learning under the constraints of the COVID-19 pandemic. The task of the psychological cluster is to substantiate the positive aspects of the digitalization of the educational process.

Postharvest technologies for fruits and vegetables in South Asian countries: a review

  • Faqeerzada, Mohammad Akbar;Rahman, Anisur;Joshi, Rahul;Park, Eunsoo;Cho, Byoung-Kwan
    • Korean Journal of Agricultural Science
    • /
    • v.45 no.3
    • /
    • pp.325-353
    • /
    • 2018
  • Agricultural systems in South Asian countries are dominated by smallholder farmers. Additionally, these farmers have limited access to pre- and post-harvest technologies due to their high initial cost. The lack of these technologies in postharvest handling is responsible for 20% to 44% of fruit and vegetable losses. These high losses are largely the result of a generally weak basic postharvest infrastructure for the preservation of products, which avoids damage from improper handling, transportation, packaging, and storage. High postharvest losses of products negatively affect food availability, food security, and nutrition, as the producer is able to sell less of the farm yield and the net availability of these food commodities for consumption is reduced. An underlying cause of these postharvest losses is the limited awareness and knowledge bases of stakeholders (researchers, farmers, governments, non-governmental organizations, and merchants) in the traditional supply chains in which these losses occur. The analysis presented in this paper explores the state of postharvest practice in South Asian countries and discusses options for low-cost postharvest technologies in the region that can support small-scale farmers and provide a viable pathway for supply to the market, joining with modern value chains and bringing about individual and regional reduction in postharvest losses of fruits and vegetables. The improvement of basic and simple low-cost technologies through precise research efforts has the potential to prevent such huge losses of products, and help meet the ever-increasing demand for food in South Asian countries.

A Study on the Circular Multi-Family Housing for Designing Local Identity (지역성 구현을 위한 집합주택 원형 주거동의 표현 특성 연구)

  • Moon, Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.4
    • /
    • pp.121-129
    • /
    • 2013
  • This study was aimed at determining the characteristics of circular multi-family housing under the assumption that the shape of a residential building affects local identity. A total of six case studies were included in this study, three case studies on idle historical industrial facilities turned into residential buildings and another three on multi-family housing located in newly developed residential complexes. The study drew its conclusions as follows. First, the design of circular multi-family housing was intended to maximize security and defense from the outside in older times. This was later developed as the terrace house style with geometric urban squares designed under the urban planning of the Baroque period. This evolved high-density housing with a courtyard in the center offering a green open space, with the aim of restoring a sense of humanity. Second, the six case studies on circular multi-family housing were analyzed from the viewpoint of each factor of local identity, including historical and cultural, landscape, and community. Third, the historical and cultural elements of circular multi-family housing are found in some unused historical industrial facilities remodeled into residential buildings. They provide new capabilities and shapes desired by society at a given time, while maintaining familiar styles and elements of history, integrating a legacy of the past into the present. Fourth, circular multi-family housing with unique shapes and structures often become landmarks of a region with their distinctive appearance against a uniform urban environment and the monotonous scenery of residential complexes. They also show a high level of visual awareness with the distinctive shapes made possible when new elements are added to a historical exterior. Finally, circular multi-family housing with courtyards in the center prompt social contact between inhabitants, especially with dormitories and rental houses for the low-income bracket, which provide a small individual units with high use common space. Circular multi-family housing are planned in a manner similar to a small village or a city. They are designed to enhance sense of community, allocating various public amenities and provide cultural and commercial spaces on the ground floor and courtyard areas.

A Study on Visiting Caregiver's Perception of Elder Abuse (방문요양보호사의 노인학대에 대한 인식)

  • Oh, Chung-uk;Kang, Hye-kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.638-645
    • /
    • 2016
  • This study describes visiting caregivers' perceptions and reporting of elder abuse. From January 13 to February 10, 2014, data were collected from 249 visiting caregivers working at homes by using a structured questionnaire. The caregivers' perceptions of abuse were high overall. Physical abuse was the most common type, followed by financial, verbal, negligence, and emotional abuse. Most visitors recognized that it is important to require reporting for the prevention of elder abuse, but most of them had no experience with reporting abuse, and the agencies that they knew were mostly the police. A majority of the visiting caregivers had attended an elder abuse program and recognized the importance of such programs. The caregivers hoped that the programs would have specific examples of how to deal with elder abuse and family counseling methods, and other practical content for their work. Programs should focus on coping with individual cases, proper counseling methods, and awareness of elder abuse.

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.