• Title/Summary/Keyword: Private Security Service

Search Result 339, Processing Time 0.025 seconds

Curriculum Development Direction through Content Analysis of the safety security guard (경호·경비분야 연구의 내용분석에 따른 교육과정 개선을 위한 개발방향 탐색)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.253-272
    • /
    • 2017
  • This study analyzes the contents of 1,279 articles related to administrative, management, marketing, and service for private clients among the scholarly research results in the field of security and security, and categorizes the main topic security, private security, The results of this study are as follows. First, the main academic achievements of the security and security sciences were first identified by finding 32 subordinate or related subjects in each category. The situation of the curriculum and the environment which is insufficient compared to the needs of academia and the age was confirmed. The task of improving security and security science analyzed through this study is the expansion of education and training courses related to management and service, which are suitable for the major course of the major. And the analysis of socio-scientific disciplines and job types in the field of security and security In this study, firstly, it is necessary to develop a management and marketing measurement tool suggesting the specificity of security and security business. Second, it is necessary to reconsider learning units of management skill related to management and marketing. Third, In order to improve the curriculum of security related departments, we proposed the necessary preconditions and improvement directions.

  • PDF

The Design of Military Security Audit based on the M-ISMS Model (M-ISMS 모델 기반의 군(軍) 보안감사 설계에 관한 연구)

  • Kim, Dae Gyu;Cho, Hee Joon;Kim, Chang Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.761-769
    • /
    • 2014
  • We propose an improved M-ISMS(Military-ISMS) model which is based on common ISMS model for regarding military's unique characteristics. Our model focuses on 'Internal Security Audit' and 'Management of external activity' as military circumstances. So, we added the six control new items as internal security audits. Because the confidentiality is more important than availability in military service as compared with private sectors. In addition, we propose some control suggestions for establishing security management standards and keeping level maintenance when it will becomes to lose a value as confidential. The M-ISMS model in this paper has effectiveness which prevents security incidents in advance rapidly throughout a variety of common ISMS's advantages and security incidents of private sectors in consideration of military characteristics.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

Privacy Management Based on Profile for Personalized Services in u-City (u-City환경에서 맞춤형 서비스 제공을 위한 프로파일기반 개인 정보보호 관리)

  • Lee, Jun-Gyu;Kim, Ji-Ho;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.135-144
    • /
    • 2010
  • U-City pursues personalized service by collecting contexts through sensors located over the city and presenting the service automatically depending not on the user's request but on the situations that are needed. To provide the personalized service, however, contexts collected through various sensors are needed, and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade person's various contexts requested in the personalized service environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and service profile. Also, we propose an efficient privacy-protection management scheme to encrypt transmitted private information and to control key distribution.

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

The Legal Structure of Guard & Security Contract and the Prevention & Resolution Method of Security Disputes (경호경비계약의 법적 구조 및 분쟁의 예방과 해결 방안)

  • Ahn, Sung-Cho
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.129-157
    • /
    • 2006
  • With rapid social change, by culminating the social hazards and the safety problems about it are on the increase too. According to the needs for the safety the demand of the private guard & security provided the safety and security service against danger is also increasing. As the need for the safety is increasing, so recently the private guard & security industry is extended. Therefore the purpose of this study is to grasp and carry out researches into the legal structure on the Security contract, is to analyze the formation of contract and find out the ensuing problem in order to prevent or settle the dispute which is apt to occur between the specific client and the security companies. In order to minimize the dispute going with security relationship in particular, it is necessary that one should write down the agreed contents as the document explicitly to make a security contract with the parties. Hereupon in the plan which standardizes the security contract with each parties autonomously, it is suggested that this study should present the model of Dispute Resolution Clause Especially it is the best means that it is amicable consultation or negotiation as the effective way of settlement methods of private dispute arising from the concerned parties. In inevitable case it recommends the method which solves the dispute by means of an arbitration than litigation at administration of justice(in terms of jurisdiction). If the parties wish to settle the disputes by arbitration, they must come to an arbitration agreement in the form of a arbitration clause in the security contract. After the test and evaluation through application utilizing it in actual security field, the security standard contract regulates about it and this terms should widely apply a individual case to whole industry.

  • PDF

Research on Pre-service Inspection on Electrical Installations for Private Use based on Self-reliance (자가용전기설비의 사용전 자율검사제도 도입추진방안)

  • Kim, Han-Young;Ryu, Gi-Hyeon;Hwang, Min-Su
    • Proceedings of the KIEE Conference
    • /
    • 2005.07e
    • /
    • pp.112-114
    • /
    • 2005
  • It is obvious that electrical safety cannot be secured soley by the efforts from public sector including government. With the global trend of deregulation as WTO/TBT agreement comes into effect, foreign countries strive to minimize unnecessary and inefficient regulations in every field by sharing responsibilities with the privae sector to secure international competency in trade. To this same end, in this paper 2 level approach plan is suggested to pave the way to the self-security system in electrical field by introducing self-reliance safety system by stage for pre-service inspection on the electrical installations for private use based on product requirements in terms of performance.

  • PDF

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

Grope for a Scholarly identity by Comparative Analysis in curriculum of Department of the Security and Secretary Studies ("경호학과"와 "경호비서학과"의 교육과정 비교.분석을 통한 경호비서의 정체성 모색)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.1-18
    • /
    • 2009
  • Recently the demand for civil protection and security guards shows rapid growth by the social development and improve the quality of life. However the supply and education system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. However, the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. Therefore, the purpose of this article is to analyse current situation of curriculum on security guard training at the universities related to this department, and to seek an educational model for this area. For that, the following questions will be examined. First, Do the professional training organizations meet social demand for the body and security guards? Second, What kind of training has to be provide for the body and security guards? and what the qualifications of the trainers? Then, what are the differences in training courses between private organizations and universities? Is there differences in the job placement among the trainers of private organizations and universities? etc.. In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. For the scholarly identity to the security and secretary studies is th following on the core curriculum, then the university curriculum is very important for that. It is need to arrange the curriculum that is actually current at College or University for the suggestions on scholarly identity and development of the security and secretary studies.

  • PDF

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.