• Title/Summary/Keyword: Private Security Regulation

Search Result 49, Processing Time 0.028 seconds

An Evaluation of the Private Security Industry Regulations in Queensland : A Critique (호주 민간시큐리티 산업의 비판적 고찰 : 퀸즐랜드주를 중심으로)

  • Kim, Dae-Woon;Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.7-35
    • /
    • 2015
  • The objective of this article is to inform and document the contemporary development of the private security industry in Queensland Australia, a premier holiday destination that provide entertainment for the larger region. The purpose of this review is to examine the comtemporary development of mandated licensing regimes regulating the industry, and the necessary reform agenda. The overall aim is threefold: first, to chart the main outcomes of the two-wave of reforms since the mid-'90s; second, to examine the effectiveness of changes in modes of regulation; and third, to identify the criteria that can be considered a best practice based on Button(2012) and Prenzler and Sarre's(2014) criteria. The survey of the Queensland regulatory regime has demonstrated that, despite the federal-guided reforms, there remain key areas where further initiatives remain pending, markedly case-by-case utilisation of more proactive strategies such as on-site alcohol/drug testing, psychological evaluations, and checks on close associates; lack of binding training arrangement for technical services providers; and targeted auditing of licensed premises and the vicinity of venues by the Office of Fair Trading, a licensing authority. The study has highlighted the need for more determined responses and active engagements in these priority areas. This study of the development of the licensing regimes in Queensland Australia provides useful insights for other jurisdictions including South Korea on how to better manage licensing system, including the measures required to assure an adequate level of professional competence in the industry. It should be noted that implementing a consistency in delivery mode and assessment in training was the strategic imperative for the Australian authority to intervene in the industry as part of stimulating police-private partnerships. Of particular note, competency elements have conventionally been given a low priority in South Korea, as exemplified through the lack of government-sponsored certificate; this is an area South Korean policymakers must assume an active role in implementing accredited scheme, via consulting transnational templates, including Australian qualifications framework.

  • PDF

Review on the Cooperative Policing System in Japan (일본의 민경협력치안제도에 대한 고찰 및 시사점)

  • Kim, Gyoo-Sik;Choi, Eung-Ryul
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.29-55
    • /
    • 2013
  • In modern society, citizen's expectation about policing levels have been rising over time and it limited resources of the police to deal with the security services are insufficient. Until now, the state monopoly of the police activity was changing to subject of a variety in cooperation with public security system. The citizens considers community not the destination to police enforce the law but space for effective policing partners. Japanese police focus on cooperation oriented policing to strengthen the police and local residents with crime prevention for a long time. Also, the community through a variety of problem-solving policing activities to identify problems such as anxiety and anguish of the people. The legal basis for cooperative policing activity is that Nagaoka city crime prevention regulation in 1979. In recent years, Tokyo local government legislated the safe town development regulations(東京都安全 安心まちづくり條例) and set up the hot-spot area to promote the safety of public facilities. Cooperative policing not police intervention for crime prevention but national policy for the city reclamation in Japan. Police as well as the Ministry of Land and Transport, Ministry of Justice, Ministry of Education, Prime Minister and all government departments thread safe city, crime prevention, and has been working to make the safe city. Japan's cooperative policing is a system that receives the most attention and greater implications.

  • PDF

A Study on the Effect of the Security Guard Emotional Disharmony to Job Performance (경비원 감정부조화가 직무성과에 미치는 영향)

  • Kim, Tae-Hyun;Ryu, Seong-Min
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.3
    • /
    • pp.125-142
    • /
    • 2019
  • The study wanted to verify the effect of emotional sub-compression, a negative variable of emotional labor, on job performance, on security personnel working at private security companies, and further to verify how the impact on emotional sub-compression can affect job performance through the first draft of regulation. Empirical analysis through the study model showed that emotional edema was not a significant effect, but a negative effect on job performance, and that it did not affect the control focus itself. This revealed that emotional harmony has been shown to have a negative impact on performance due to the present state and conflicting situations in one's emotions, which means that emotional harmony does not affect negative or positive effects depending on a person's attributes. It also showed that the temperamental control focus on job performance had a positive impact on employees with an improvement focus and had a negative impact on employees with a preventive focus, and that a temperamental control focus between emotional dissonance and job performance had an effect. This indicated that job performance was affected by a temperamental control focus and that employees with an improvement focus had a positive effect and had a positive effect on performance. The implications of the study in this study are that it can have target differentiation in the areas where the study was conducted on guard workers, a social issue related to the study of emotional labor, and it can be meaningful that the study of emotional labor had a control focus and measured both positive and negative tendencies. It is also believed that there will be contributions to the verification of differences in performance resulting from employee propensity and by linking it with a variable called emotional instability. However, the data collected have the limitations of the subject and region, and the emphasis on cross-sectional analysis and the representative of the various emotions to verify the negative effects of emotional labor, and the problem of securing reliability related to the adjustment focus verification are the limitations of the research.

Actual Status of and Measure for False Alarm of Electronic Security in Korea (한국 기계경비업무의 오경보 대응책)

  • Park, Dong-Kyun;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.33-60
    • /
    • 2012
  • False alarm of Electronic security causes various serious side effects such as decrease of electronic security guard's morale caused by unnecessary mobilization, increase of fatigue caused by workload increase, increase of electronic security company owner's management burden and decrease of electronic security service utilization rate caused by customer's distrust. Therefore, the study considered the Korean regulation related with false alarm of electronic security and proposed actual status of false alarm and measure for it. The study proposed systematic resolution assignments and political assignments in relation with the measure for false alarm. Systematic resolution assignments are as follows. First, electronic security company should construct electronic security system accurately from the initial step of security consulting and security planning related with target facility. Second, it is necessary to encourage installation and operation of video monitoring system. Third, sensor wiring should be separated. Fourth, the measures for false alarm depending on main system causes should be prepared. It is necessary to encourage the installation of 'arming disarming alarm sound' generator. In addition, the measures for false arm depending on the characteristics of sensor should be prepared and standardized. Fifth, system maintenance should be reinforced. Political assignments related with the measures for false alarm are as follows. First, it is necessary to reinforce education & training. Individual nurturing & education process should be run by electronic security company or the education focusing on the measure for false alarm should be performed in job training defined in "Security Industry Act". Second, it is necessary to establish and reinforce legal regulation and establish device. If police authority standardizes the documents related with false alarm, provides their forms and requires them for periodical reports or documents, it is expected that good measures for false alarm will be prepared on the basis of actual data in the future. Third, cooperation organization to discuss the measures for false alarm like 'Conference for False Alarm of Electronic Security' should be organized and operated. Fourth, interest and role of electronic security company and electronic security supervisor should be enlarged.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Regulation and Its Tasks of Privately Contracted Armed Security Personnel on Board Ships Against Somali-based Piracy (소말리아 해적행위 대응을 위한 민간무장보안요원 승선의 규제 및 그 과제에 관한 연구)

  • Keum, Jong-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • The increased threat to commercial shipping by Somalia-based pirates has triggered an increased use of PMSC(Private Maritime Security Contractors). The use of PMSC to protect merchant ships against Somali-based piracy threat seems to have been most effective counter-piracy measures. However, there are various legal and practical questions around using PMSC and PCASP(Privately Contracted Armed Security Personnel) on board at sea. This paper aims to study the regulation and its problems of PMSC and PCASP on board to protect merchant ships against Somali-based piracy in the Indian Ocean and Gulf of Aden. In particular, this paper focuses on the legal issues including jurisdictional issues of PCASP on board merchant vessels, use of force by PCASP in self-defense, and authority for using PMSC. Currently, the legal framework relating to use of PMSC and PCASP on board protecting ships from Somali-based piracy is complex, sometimes ambiguous or inconsistent, and currently in a state of flux. Thus, this paper concludes that at this juncture an effort to coordinate this legal framework is necessary, as regards both the interpretation of existing rules related to PCASP on board merchant ships under UNCLOS(United Nations Convention on the Law of the Sea) and the creation of new rules. Also, this paper suggested that there is an urgent need to establish the PMSC-specific laws in Korea.

Investment Incentive for Capacity Supply in a Period of Introduction of competition (경쟁체제 도입기의 수급안정화를 위한 설비투자 인센티브 설정 연구)

  • Kim, Chang-Soo;Rhee, Chang-Ho;Jin, Byung-Mun
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.406-408
    • /
    • 2000
  • Recently, Korea's electric industry is in the midst of a period of profound changes in the structure and function, including the introduction of market competition in the generation sector. Therefore, it is difficult to promote long-term capacity planning and new generating capacity construction which have been driven by KEPCO so far, after the introduction of market competition, so new generating capacity construction and security of reserve margin is needed through self·regulation plan of private generation producers by market mechanism. According to the competition in the generation sector, a new paradigm is necessary to the long-term capacity planning driven by the Government. This paper analyzes the plan and the incentive level able to guide the new generation capacity construction considering the uncertainty risk in a period of introduction of competition. In addition, this paper analyzes the plan able to guide the new capacity construction by market function at the stage which market become established and Government's role to solve the anxiety about the capacity supply and demand.

  • PDF

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF