• Title/Summary/Keyword: Private Security Agents

Search Result 32, Processing Time 0.027 seconds

Relationship between Internal Service Quality and Internal Customer Satisfaction, Management Outcome in Airport Private Security Agents (공항 특수경비조직의 내부서비스품질과 내부고객만족 및 경영성과의 관계)

  • Kim, Chan-Sun;Lee, Ji-Eun;Jo, Byung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.426-437
    • /
    • 2012
  • The purpose of this study is to investigate the relationship between internal service quality, internal customer satisfaction and management outcome of airport security agents. This study had selected special securities from Incheon airport of October, 2011 for population. Using judgment sampling method, 282 samples were drawn and were used for the final analysis. Questionnaire used in study is composed of total 43 questions and using SPSSWIN 18.0, frequency analysis, factor analysis, reliability analysis, multiple regression analysis and path analysis were performed. Cronbach's ${\alpha}$ value which shows the reliability of the survey came out to be over .686. The conclusion is following: First, internal service quality of airport security agents affects internal customer satisfaction. That is, as corporality, responsiveness and empathy increase, internal supply satisfaction and job satisfaction also increase. Second, internal service quality of airport security agent affects job performance. That is, as corporality, reliability and responsiveness increase, non-financial performance and financial performance also increase. However, when empathy is not activated well, financial performance is decreased. Third, airport security agent…s internal customer satisfaction affects job performance. That is, as activation of internal supply satisfaction increases, nonfinancial performance and financial performance are increased. Fourth, airport special security agent…s inside quality of service exerts direction indirect effect in inside customers satisfaction and management result. That is, inside customers satisfaction is an important variable that mediate inside quality of service and management result.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

Analysis on the structural model on the participation rate of the leisure constraint of private security agents in order to deduct priority list of investing related policies: applying IPA technique (정책투자우선순위 도출을 위한 민간경비원의 여가제약 참가지수 구조모형 분석: IPA기법 적용)

  • Jung, Joo-Sub;Kim, Chan-Sun;Park, Young-Man
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.179-181
    • /
    • 2010
  • 이 연구는 IPA 기법을 적용하여 민간경비원들의 여가활동 집중개선 종목을 도출하고, 나아가 여가제약이 참가지수에 미치는 영향을 규명하는데 주된 목적이 있다. 본 연구는 2010년 서울 소재 6개소 민간경비업체를 대상으로 판단표집법을 적용하여 최종분석에 사용된 사례 수는 총 267명이다. 결론은 다음과 같다. 첫째, 민간경비원들의 여가활동 참가 지수인 선호도와 참여도는 차이가 있다. 중점개선 여가활동은 헬스, 산책/조깅, 숙박관광, 당일여행 등이다. 둘째, 민간경비원들의 여가제약은 여가활동 참가지수에 영향을 미친다. 개인내적, 주변의식적, 대인적 제약이 클수록 선호하는 여가활동에 부적 영향을 미치는 반면, 구조적, 시간 경제적 제약을 극복하고 선호하는 여가활동에 정적 영향을 미쳤다. 본 연구결과를 토대로 민간경비원들의 복지적처우개선에 집중적인 투자가 이루어져야 할 것이다.

  • PDF

Relationship of Organizational Culture, Empowerment and Organizational Commitment among the Private Security Agents (민간경비원의 조직문화와 임파워먼트 및 조직애착도의 관계)

  • Kim, chan-sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.233-234
    • /
    • 2013
  • 이 연구의 목적은 민간경비원들의 조직문화와 임파워먼트 및 조직애착도의 관계를 규명하는데 있다. 이 연구는 2012년 수도권소재(서울) 민간경비회사에서 재직하고 있는 민간경비원들을 모집단으로 설정한 후 유의표집법을 이용하여 최종분석에 이용된 사례수는 총 280명이다. 분석방법은 SPSSWIN 18.0을 이용하여 빈도분석, 요인분석, 신뢰도분석, 다중회귀분석, 경로분석 등을 실시하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .690이상으로 나타났다. 결론은 다음과 같다. 첫째, 민간경비원들의 조직문화는 임파워먼트에 영향을 미친다. 둘째, 민간경비원들의 조직문화는 조직애착도에 영향을 미친다. 셋째, 민간경비원들의 임파워먼트는 조직애착도에 영향을 미친다.

  • PDF

A Study on the Revision of Regulations to Reinforce Security for National Assembly (국회보안강화를 위한 법규개정방안에 관한 연구)

  • Kim, Doo-Hyun;Chung, Tae-Hwang;Choi, Byung-Kwon
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.7-28
    • /
    • 2011
  • This study is to propose the improvement of security related regulations to reinforce security activity and actualize constitutionalism in the National Assembly. For the purpose, some improvements could be considered as followings; First, legislating of regulations including some articles on the scope of security activity such as order preservation at assembly hall, facility security, security agents' right and protection of personal is necessary. Second, changing the organization and command system of security management is necessary for the unification of security activity and efficiency of the job. Also clear definition of terminology on the security job is need. For the shake of above object, one officer in charge of situation management and three section such as the personal protection section, facility security section and order preservation section could be substructured under security department. Third, elimination of unnecessary article on the arrest of red handed criminal in the assembly hall and on the physical checkup of audience by security agent is need. Also legislating of regulations on the hoarding of person who could disorder is necessary. Forth, legislating of regulations on the cooperation with government branch, judicial police power, carry and use of weapon and uniform and equipment to reinforce practical efficiency of security activity. For the proper legislating of the regulations, comparition with other public organizations such as presidential security Service, police, private security could be considered.

  • PDF

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

Relation between Leisure Constraints and Participation by Leisure Types of Security Agent (시큐리티요원의 여가유형에 따른 여가제약과 참가의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.826-835
    • /
    • 2009
  • This study is to examine the relation between leisure constraints and participation by leisure type of security agents. By using purposive sampling method, this study collected 387 questionnaires in 14 private security service registered in 2009 at the Seoul National Police Agency. Cronbach's $\alpha$ .673. The conclusion are as follow. First, leisure constraints difference in socio-demographic characteristics such as sex, age, education level, income, position, job pattern. Second, in case of hobby and cultural activities, higher time constraints showed lesser frequency of participation, higher structural constraints showed lesser period of participation, higher personal constraints showed lesser intensity of participation. On the other hand, high time constraitns had high intensity of participation. In case of play and entertainment activities, even with high self-conscious constraints, it showed increased frequency and period of participation and high personal constraints showed increased period of participation but in contrast, higher structural constraints showed decreased frequency of participation and period. In case of viewing and appreciative activities, even with high interpersonal constraints, frequency and period of participation increased and higher time constraints also had increased period of participation. On the other hand, higher structural constraints showed decrease in frequency of participation and period.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

Comparison of Factors Influencing to Mobilization of Police to Crowd Gathering Occasion (다중운집행사 경찰동원에 영향을 미치는 요인 비교)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.643-649
    • /
    • 2017
  • This research is to compare factors which influence to mobilize police force necessary for crowd gathering occasions, and the purpose of this research is to prepare scientific basis for mobilization of police force by understanding order of priority of obstructive factors to mobilize police force for progressing safe crowd gathering occasions. Crowd gathering occasion has a characteristic that minor cause can lead to huge damage because many people concentrically gather at a specific place. In order to control these risks, it is necessary to analyze criteria on order of priority which can arouse risk to mobilize police force. In this research, I classified the factors influencing safety of crowd gathering occasion as internal risk factor, external risk factor and traffic safety threatening and set up the level of private security manpower and participants mobilized to crowd gathering occasion as independent variable and set up mobilized police force from 2013 to 2014 as dependent variable and analyzed it hierarchical analysis. From the result of analysis, the biggest influence to mobilization of police force for crown gathering occasion was the number of participants, and next self order-keeping agents and reason of mobilizing police force. Based on the result of analysis that the biggest factor to mobilize police force to crowd gathering occasion is the number of participants, it can be resulted that the number of participants influence to the risk of crowd gathering occasion.