• Title/Summary/Keyword: Private Security Service

Search Result 341, Processing Time 0.027 seconds

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

A Study on Act on Certified Detective and Certified Detective Business (공인탐정 관련 법률(안)의 문제점과 개선방안에 관한 연구)

  • Kim, Bong-Soo;Choo, Bong-Jo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.285-305
    • /
    • 2019
  • In the bill of [Act on Certified Detective and Certified Detective Business] (hereinafter referred to as the Certified Detective Act) proposed and represented by the member of National Assembly, Lee Wan-Yong in 2017, the legislative point of view showed that various incidents and accidents, including new crimes, are frequently increasing as society develops and becomes more complex, however, it is not possible to solve all the incidents and accidents with the investigation force of the state alone due to manpower and budget, and therefore, a certified detective or private investigator are required. According to the decision of the Constitutional Court in June 2018, Article 40 (4) of the Act on the Use and Protection of Credit Information is concerned with 'finding the location and contact information of a specific person or investigating privacy other than commerce relations such as financial transactions' are prohibited. It is for the purpose of preventing illegal acts in the process of investigation such as the location, contact information, and the privacy of a specific person and protecting the privacy and tranquility of personal privacy from misuse and abuse of the personal information etc. Such 'privacy investigation business' currently operates in the form of self-employment business, which becomes a social issue as some companies illegally collect and provide such privacy information by using illegal cameras or vehicle location trackers and also comes to be the objects of clampdown of the investigative agency. Considering this reality, because it is difficult to find a resolution to materialize the legislative purpose of the Act on the use and protection of credit information other than prohibiting 'investigation business including privacy etc' and it is possible to run a similar type of business as a detective business in the scope that the laws of credit research business, security service business, the position of the Constitutional Court is that 'the ban on the investigations of privacy etc' does not infringe the claimant's freedom to choose a job. In addition to this decision, the precedent positions of the Constitutional Court have been that, in principle, the legislative regulation of a particular occupation was a matter of legislative policy determined by the legislator's political, economic and social considerations, unless otherwise there were any special circumstances, and. the Constitutional Court also widely recognized the legislative formation rights of legislators in the qualifications system related to the freedom of a job. In this regard, this study examines the problems and improvement plans of the certified detective system, focusing on the certified detective bill recently under discussion, and tries to establish a legal basis for the certified detective and certified detective business, in order to cultivate and institutionalize the certified detective business, and to suggest methodologies to seek for the development of the businesses and protect the rights of the people.

Optimal Clustering of Energy Storage System for Frequency Regulation Service Considering Life Degradation (수명감소를 고려한 주파수 조정용 에너지저장장치의 최적 클러스터링)

  • Kim, Wook-Won;Kim, Jin-O
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.4
    • /
    • pp.555-560
    • /
    • 2016
  • Recently, many countries have placed great attention on energy security and climate changes. Governments are promoting the construction of renewable energy projects with regulatory support in Korea. Despite an increasing penetration of renewable resources, however, the photovoltaic and wind power are underutilized due to the endemic problems such as difficulties of output control and intermittent output. The Energy Storage System (ESS) is proposed as a good solution for solving the problems and has been studied in both the private business and the government. However, because of inefficient aspects, the research has been carried out for improving high costs and a small capacity. In addition, the ESS is currently installed for using only one purpose which is frequency regulation or transmission congestion relief such that has an economic limitation. Therefore, methods which are becoming economically justifiable to increase the penetration of the ESS is required. Thus, this paper presents in terms of operation efficiency to improve economic feasibility of the ESS currently used. mainly, there are two aspects for the operation efficiency. Firstly, it is intended to improve the utilization rate through a process that can utilize the ESS for various purposes. It is necessary to be able to use for other purposes by classifying and clustering for increasing the efficiency of availability. The clustering method is proposed to conduct the grouping the ESS. Especially, it is proposed to utilize ESS for frequency regulation service which is the one of ancillary services in the power system. Through case studies, it is confirmed to secure the necessary resources by clustering small size ESS.

Relation between Leisure Constraints and Participation by Leisure Types of Security Agent (시큐리티요원의 여가유형에 따른 여가제약과 참가의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.826-835
    • /
    • 2009
  • This study is to examine the relation between leisure constraints and participation by leisure type of security agents. By using purposive sampling method, this study collected 387 questionnaires in 14 private security service registered in 2009 at the Seoul National Police Agency. Cronbach's $\alpha$ .673. The conclusion are as follow. First, leisure constraints difference in socio-demographic characteristics such as sex, age, education level, income, position, job pattern. Second, in case of hobby and cultural activities, higher time constraints showed lesser frequency of participation, higher structural constraints showed lesser period of participation, higher personal constraints showed lesser intensity of participation. On the other hand, high time constraitns had high intensity of participation. In case of play and entertainment activities, even with high self-conscious constraints, it showed increased frequency and period of participation and high personal constraints showed increased period of participation but in contrast, higher structural constraints showed decreased frequency of participation and period. In case of viewing and appreciative activities, even with high interpersonal constraints, frequency and period of participation increased and higher time constraints also had increased period of participation. On the other hand, higher structural constraints showed decrease in frequency of participation and period.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Study on Factors Affecting Life Satisfaction of the Disabled Seniors (장애노인의 삶의 만족도 영향요인 연구)

  • Kim, Seong Hee
    • 재활복지
    • /
    • v.20 no.3
    • /
    • pp.17-43
    • /
    • 2016
  • This study is on understanding the reality of disabled seniors and investigation of factors that affect overall life satisfaction, making a proposal to improve their life quality. Situation data for the disabled, gathered by Korea Institute for Health and Social Affairs (KIHASA) in 2014, was used to perform the study, and the target group is 3,181 people with disability, above the age of 65. Descriptive statistics was presented for data analysis and logistic regression analysis was performed to investigate factors that affect life satisfaction. It was concluded from the analysis that gender, age, presence of spouse (demographic factors), house income, possession of house, presence of pensioner, registration to public pension plan, social discrimination (social-economical factors), level of disability, subjective health status, level of help needed for daily living, presence of care-giver, sufficiency of help, ability to go out by oneself, difficulty of using public transportations, and presence of medical checkups (disability and health factors.) make meaningful effects to life satisfaction of disabled seniors. Based on the derived results, this study suggests intensive interests and care-giving service for disabled seniors that live alone, institutional complementations to guarantee income security, including public or private pensions, improvements to social recognition and environments for discrimination of the disabled, organization of health and medical treatment service and health care system, comprehensive service provision to social welfare for both the disabled and seniors, and comprehensive service provision to both health care and social welfare.

A Review of Improvements for Providing Safe and Secure Environments for Medical Treatment (안전한 진료환경 구축을 위한 정책 개선과제)

  • Choe, A Reum;Kim, Sung Eun;Baek, Kyoung Hee
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.105-111
    • /
    • 2019
  • On December 31, 2018, an incident occurred where a doctor was attacked and killed by a patient carrying a lethal weapon in the outpatients' clinic of the psychiatric department of a tertiary general hospital. The suspect was diagnosed with bipolar affective disorder (manic depressive disorder) and has been hospitalized and cared for in the psychiatric ward of this hospital. This incident illustrates the necessity of more active cures and therapeutic intervention for mental patients with intellectual developmental disorders who require treatment considering the fact that a radical outcome has been caused by such a patient. However, on the other hand, there is also a need for an approach and analysis from the perspective of crime prevention for all medical departments. The reason for this is that even a tertiary general hospital equipped with the largest human resources, medical devices, facilities, and so forth, is susceptible to violence. As for illegal actions perpetrated against health and medical service personnel in medical institutions, such as verbal abuse, assault, injury, etc. there have neither been understanding shown for the current extent of damage in detail, nor discussions of active institutional improvement related to the seriousness of the act. It can be said that violence in the field of medical treatment is a realm requiring serious discussion and appropriate remedial actions. This is because when such incidents take place, if a patient who is supposed to get treatment from the damaged health care provider is in an urgent situation or on the waiting list of serious cases, he or she could suffer serious damage caused by deprivation of treatment opportunity, or secondary damage might be caused to the patient and/or a guardian who can hardly have an opportunity to take action. Accordingly, in this review, we would like to help create the necessary conditions for both health and medical service personnel and patients/guardians, respectively, to provide and receive medical treatment in a more secure environment. Therefore, objective assessment of the institution and issues relating to this aforementioned incident and general cases of violence occurring in medical institutions, and by suggesting legal and institutional improvements and solutions.

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.