• Title/Summary/Keyword: Private Security Service

Search Result 339, Processing Time 0.025 seconds

The Influence of Shoppers' Security Need Sufficiency and Customer Satisfaction on the Quality of Security Services in Large Shopping Centres (대형쇼핑몰 보안서비스품질이 고객안전욕구충족 및 고객이용만족에 미치는 영향)

  • Lee, Jong-Hwan;Kang, Kyoung-Soo
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.41-63
    • /
    • 2010
  • This study aimed to asses the relationship between shoppers' security need sufficiency and customer satisfaction on the quality of security services in Shopping Mall. This study gathered data from 485 citizen in five shopping centres at KyungKi areas. Collected data was analysed by factor analysis, reliability analysis, path analysis and multiple regression analysis with SPSS WIN 16.0. The results of the study yielded the following four perspectives. First, secure equipment and the service quality of security officers in the shopping malls have a decisive effect on customers psychological stability and crime prevention. Second, they are a strong influence upon customer satisfaction and operational security. Especially, the professionalism of the staff has a marked effect. Third, the service quality of security officers and secure equipment in the malls have an effect on operational security services and efficiency of secure services. Finally, this dissertation showed that the quality of secure equipment services and officers' mild In summary, the conclusion of this study is that secure equipment service, officers' mild manner and professionalism of the security officers affect the customer satisfaction measurement directly. They also affect customer satisfaction through psychological stability and the prevention of crime indirectly. In other words, the good quality of security in the shopping centres affects the using of facilities definitely.

  • PDF

A Study on students' consciousness regarding their plans after graduation Education of Guard and Security Major (경호관련학과 대학생의 진로의식에 관한 연구)

  • Kim, Chang-Ho;Jung, Jsug-Suk;Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.21-36
    • /
    • 2006
  • This study aims to grasp the general conditions regarding university students in security related majors in Korea. Followings will be covered here: what motivated them to choose those majors, how much are they satisfied with major curriculum course after matriculation, whether they got jobs through the education, what is their consciousness on their majors, jobs, and courses like, and what effects their job preference. And this study also aims at helping the students with their future plans such as admission to a school of higher grade and choosing their job. For this study, we distributed 340 cpoies to the students in security related majors at 4 four-year colleges and 1 two-year college, and collected 298 copies by means of quota sampling method. For collected questionnaires, we used individual T-test verification and one-way ANOVA analysis to grasp the situation. Significance standard for the test results was set as p<0.05. Following are the test results. First, the analysis on students' satisfaction rate resulted in male students' average of 2.42, compared to female students' average of 2.10, which shows female students have higher satisfaction rate in choosing their majors than male students. Secondly, The results on analysis of satisfaction rate on their curriculums, classes, and majors show that students in security-related majors showed different satisfaction rate and different averages according to their sex and the year of the college. The study indicates that males have higher satisfaction rate on curriculum than females, with male students' average of 2.63 and female students' average 2.88. According to the year of the college, there was a significant difference statistically, Statistics show that students at two-year college have higher satisfaction rate than those at four-year college, with two-year college students' average of 2.48 and four-year college students' of 2.74. students have the average of 3.56. The higher year they were in, the more improvement the curriculum required. When it comes to convenience offer for employment, male students expected more from school than female students, with males' average of 2.74 and females' average of 4.07. Male students marked higher than female students in the extent of job information offer, with males' average of 2.96 and females' average of 2.59. Fourthly, when students in security-related majors were surveyed on their consciousness of their future plans such as getting jibs, two-year college students had more certificates of qualification for employment than four-year college students. What they do preponderantly in preparation for employment was studying foreign languages, which took up 40.4%. And when they were asked on their confidence for employment, positive answers were far more than negative ones with the percentage of 39.6%, while negative took up just 14.0%. Fifthly, when it come to the students in security-related students' job preferences, 49.2% preferred safe job conditions in public security area and 34% preferred private guard or private security organizations. And in the public security area, the highest percentage of 28.6 preferred to work in presidential security service. In the area of private security, 21.2% showed interests in private guard and private security organizations.

  • PDF

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

Relationship between Internal Service Quality and Internal Customer Satisfaction, Management Outcome in Airport Private Security Agents (공항 특수경비조직의 내부서비스품질과 내부고객만족 및 경영성과의 관계)

  • Kim, Chan-Sun;Lee, Ji-Eun;Jo, Byung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.426-437
    • /
    • 2012
  • The purpose of this study is to investigate the relationship between internal service quality, internal customer satisfaction and management outcome of airport security agents. This study had selected special securities from Incheon airport of October, 2011 for population. Using judgment sampling method, 282 samples were drawn and were used for the final analysis. Questionnaire used in study is composed of total 43 questions and using SPSSWIN 18.0, frequency analysis, factor analysis, reliability analysis, multiple regression analysis and path analysis were performed. Cronbach's ${\alpha}$ value which shows the reliability of the survey came out to be over .686. The conclusion is following: First, internal service quality of airport security agents affects internal customer satisfaction. That is, as corporality, responsiveness and empathy increase, internal supply satisfaction and job satisfaction also increase. Second, internal service quality of airport security agent affects job performance. That is, as corporality, reliability and responsiveness increase, non-financial performance and financial performance also increase. However, when empathy is not activated well, financial performance is decreased. Third, airport security agent…s internal customer satisfaction affects job performance. That is, as activation of internal supply satisfaction increases, nonfinancial performance and financial performance are increased. Fourth, airport special security agent…s inside quality of service exerts direction indirect effect in inside customers satisfaction and management result. That is, inside customers satisfaction is an important variable that mediate inside quality of service and management result.

A Study on the Basic Requirements and Operation Plan of E-trade Platform (전자무역 플랫폼의 기본요건과 운영방안에 관한 연구)

  • Lee, Sang-Jin
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.107-127
    • /
    • 2004
  • The rapid development of internet information technology has increased interest in e-Trade these days, but it is not activated greatly up to now. In order to promote e-Trade, it is essential to construct cooperative process such as connecting systems among trade related parties. Building e-Trade platform which is based on the infrastructure of the past trade automatic system is key point of promoting e-Trade. To do this, a study on the basic concept and specific components of e-Trade platform is needed absolutely. At this point of view, after this paper has examined domestic and foreign studies on the fundamental technologies about electronic commerce, it drew several key technologies that could be applied to e-Trade considering the current IT trend. Then it evaluates these technologies according to Technology Reference Model(TRM) of the National Computerization Agency. This will help us to show the operation strategy as well as the concept of future e-Trade platform and its composition. On the basis of the theoretical background, this paper classified NCA's technology model into 6 fields, which are application. data, platform, communication, security and management. Considering the key technologies, e-Trade platform has to be mutually connected and accept international standards such as XML. In the aspect of business side, trade relative agencies' business process as well as trading company's process has to be considered. Therefore, e-Trade platform can be classified into 3 parts which are service, infrastructure and connection. Infrastructure part is compared of circulating and managing system of electronic document, interface and service framework. Connecting service (application service) and additional service (application service) consist of service part. Connecting part is a linking mutual parts and can be divided into B2B service and B20 service. The organization operating this e-trade platform must have few responsibilities and requirements. It needs to positively accept existing infrastructure of trade automatic system and improving the system to complete e-trade platform. It also have to continuously develop new services and possess ability to operate the system for providing proper services to demanders. As a result, private sector that can play a role as TTP(Third Trust Party) is adequate for operating the system. In this case, revising law is necessary to support the responsibility and requirement of private sector.

  • PDF

A Study on the Improvement Measures of Drowning Accident in South Korea (물놀이 안전사고 개선방안에 관한 연구)

  • Kim, Jung-Gon;Lim, Hojung;Kim, Tae-Hwan;Lee, Dae-Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.153-164
    • /
    • 2019
  • Purpose: This paper aims to derive improvement measures, in terms of legal and technical aspects, which can reduce effectively the casualties caused by drowing accidents. Method: Firstly, we checked the status of drowing accident management and carried out the interview of field private safety guards. field private safety guards. In addition, surveys were conducted on safety personnel and managers. Based on survey results, we are lastly analyzed the specific problems and reviews the improvement measures from technical and legal aspects. Result: As an analytical result, it was considered that supplementary supporting tools such as CCTV, monitoring devices using IoT and artificial intelligence technologies were necessary to prevent drowning accident, and qualification with limited authority should be added to the private safety guard because of the lack of regulation. Conclusion: In order to manage water safety effectively, a comprehensive water safety management system should be established that integrates people and equipment through systemic education of security personnel, authorization of enforcement, and introduction of surveillance equipment.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Privacy Weakness Analysis of Delegation-Based Authentication Protocol (위임기반 인증 프로토콜의 프라이버시 취약성 분석)

  • Youn, Taek-Young;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.53-57
    • /
    • 2010
  • Recently, Lee et al. proposed a delegation-based authentication protocol for secure and private roaming service in global mobility networks. In this paper, we show that the protocol cannot protect the privacy of an user even though the protocol provides the user anonymity. To prove the weakness, we show that the protocol cannot provide the unlinkability and also examine the weakness of the protocol caused by the lack of the unlinkability.

The Legal Issues of Private Investigation Service in WTO/FTA System : Study of South Korea (WTO/ FTA 체제에서 민간조사업의 법적문제)

  • Ko, Ji-Hoon;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.161-195
    • /
    • 2011
  • As crimes have increased to an extent that the police cannot cope with, there have been continuous discussions for the introduction of Private Investigation (hereafter PI) in Korea. However, attempts to legislate for the introduction of PI have failed every time PI bills for the introduction of PI were proposed. This was fundamentally because arguments both for and against the introduction of PI were sharply divided depending on the priorities. However, regardless of those clash of views, an apparent need for the legislation of PI service has arisen. As Korea opens its service market to other countries through GATS and FTAs, currently existing domestic PI law has been found to be inconsistent with international agreements such as GATS and KOREA-US(KORUS) FTA. This paper found that the Act on Usage and Protection of Credit Information which regulates PI service is inconsistent with the Article 12.4(a)(i) and (iii) of KORUS FTA and the Article 7.11 and the Article 7.13 of KOREA-EU FTA. If Korea does not modify the existing laws and establish new laws in relation to PI, such inconsistencies could lead to international trade disputes which could amount to billions of dollars. In this regard, the passage of the PI bill is necessary.

  • PDF