• Title/Summary/Keyword: Private security enterprise

Search Result 40, Processing Time 0.028 seconds

Policy direction of private security industry in Korea : Through analysis of the courseto amend private security law (우리나라 시큐리티산업의 정책 방향 : 경비업법 개정 과정 분석을 통하여)

  • Seo, Jin-Seok
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.41-51
    • /
    • 2011
  • The objective of this study is to generally check the present situation of private security industry by analyzing the current situation of private security industry in Korea so as to find which policy base is reflected to amend law by analyzing the amendment process of private security law in order to suggest policy direction of private security industry in Korea. Viewing through amendment process of private security law, enhancing publicity and enterprise are not judged to form any definite policy base. They are merely interpreted to partially reflect enterprise under the strong base of publicity. Such policy base may cause overall stagnation of private security industry. For sound development of private security industry, it is required to get out of the existing policy direction so as to change policy base to the direction of enhancing enterprise of private security industry. The power of police for instruction and supervision should be largely transferred to Korea Security Association so as to cultivate autonomous purifying function of private security industry. Police should strive to develop policy in the level of joint production of security service.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Study on the Environment and the Theoretical Background of Private Security (민간경비(民間警費)의 환경(環境)과 이론적(理論的) 배경(背景) 고찰(考察))

  • Kang, Gil-Hun
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.5-32
    • /
    • 1999
  • Private security will be of great importance in the coming 21st century. In the future, most of the crimes will be violent and frequent. In order to prevent crimes private security must be dealt with in public service area and private area. For this reason, nowadays studies on private security is going on actively. But in reality, serious studies on theoretical backgrounds of private security has not been made yet. Currently, almost all of the theories propose various grounds, such as administrative, economic, and social grounds. And they are based on five backgrounds, that is, profit-oriented enterprise theory, economic reduction theory, vacuum theory, interest group theory, and private management theory. The article furnishes several grounds in addition to these. They are local self-government, management of local self-government, and task-force of guard enterprise. In this article, I am going to present some perspectives in classifying the theories. They are administrative, economic, and social perspective. They are shown as follows by figure. In conclusion, based on theoretical backgrounds mentioned above, private security will be advanced constantly in the future. But in carrying out studies on private security, approaching method of proposing the developmental model is more important than theoretical approaching method.

  • PDF

A Study on Correlations between Private Security Enterprise's Relationship Characteristics and Purchasing Behaviors (민간경비업체의 관계적 특성과 구매행동의 관계)

  • Kim, In-Jae;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.35-57
    • /
    • 2011
  • While demands on private securities have been increase, expectations on the service quality as compensation for the investment expensive is also rising. However, private security services are in situations of not satisfying various customer's needs owing to insufficient special manpower, capital, and skills in spite of expected high-quality services toward customers. Therefore, this study aims to find out the causality between private security enterprises and relationship characteristics, purchasing behaviors of customers, and then searching for a marketing strategy that can provide best services to the enterprises that are confronting to limitless competitive systems by grasping customer's needs and necessities. For achieving this goal, the study objected to shop employees using private security enterprises after diving Cheonan City of South Chungcheong Province into South, East and East, West, and then collected 236 persons by using the convenience sampling. Regarding to research tools, this study used questionnaire having been recomposed based on previous researches home and abroad, and frequency analysis, reliability analysis, factor analysis, correlation analysis, and regression analysis were carried out data was treated by treatments by using SPSS version 18.0 statistic package for treating the data. Through above research methods and procedures, results could be gotten same as followings. First, correlations between private security enterprise's relationship characteristics and purchasing behaviors showed positive (+) relations, and the latter was increased as much as relationship characteristics were high. Second, as the result of analyzing correlations between private security enterprise's relationship characteristics and purchasing behaviors, reputation, physical features, and communication affected influences to word of mouth activities. Third, reputation and communication affected to repeated purchasing behaviors as the result of analyzing private security's relationship characteristics and repeat purchasing behaviors.

  • PDF

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

An Study of Information Security Observance Priority for Smartwork Activation using AHP(Analytic Hierarch Process) (계층적 분석기법(AHP)을 이용한 스마트워크 활성화를 위한 정보보호 준수사항 우선순위에 관한 연구)

  • Im, Jung-Kil;Kim, Sang-Chul;Lee, Hyeon-Uk
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.291-300
    • /
    • 2013
  • In this study, divide by a private enterprise and army, 2 organizations about observed priority item among administrator, service provider, user viewpoint about the information security item for smartwork activation and in 3 steps hierarchic according to AHP technique analyzed and decided priority for information security observance item. As a result, importance difference could confirm identified by administrator, service provider, user viewpoint period of about information security observance item recognizing in a private enterprise and army.

Designing of The Enterprise Insider-Threats Management System Based on Tasks and Activity Patterns (사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계)

  • Hong, Byoung Jin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.3-10
    • /
    • 2015
  • Recent massive data breaches or major security incidents show that threats posed by insiders have greatly increased over time. Especially, authorized insiders can cause more serious problems than external hackers can. Therefore there is a growing need to introduce a system that can monitor the insider threats in real time and prevent data breaches or security incidents in early-stage. In this paper, we propose a EITMS(Enterprise Insider-Threats Management System). EITMS detects the abnormal behaviors of authorized insiders based on the normal patterns made from their roles, duties and private activities. And, in order to prevent breaches and incidents in early-stage, a scoring system that can visualize the insider threats is also included.

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

A Study on the Implementation of the Privacy Impact Assessment Management System for Enterprise (기업을 위한 개인정보영향평가 관리 시스템의 구현에 관한 연구)

  • Sun, Jae Hoon;Kim, Yong Ho
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.57-63
    • /
    • 2015
  • Development of IT technology, the rapid computerization of society has accelerated the digitization of the world's information. Then, the activation of the e-commerce is the collection of a number of sensitive information, storage, operational increased rapidly. Currently, the public sector, financial sector, the private sector has utilized a number of privacy. Accidents caused by leakage of information is a tendency to increase day by day. For a review of the problems of security and protection for such sensitive information, the need for easier support system it is required. This thesis suggests E-PIAMS(Enterprise-Privacy Impact Assessment Management System) applicable effectively in private sectors.

A Research on Extension Device of Korea Private Security Market (한국 민간경비 시장의 과제와 활성화 도입방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.173-198
    • /
    • 2008
  • As we took a look at above, this researcher suggest following device to extend Korea's private security industry's area. First, it is necessary to extend private investigation law's area grafting private security together. Second, it is necessary it is necessary to think of private security's role related key figure law, corresponding terror law, Presidential Security Service Guard law. Third, as a draft of a proposed law related prevention flowing out of industry techniques among industry security related law, passed, it is necessary private security's diversity, subdivision, composition through an enterprise security, and private security industry area's grafting together. Fourth, a research about private security company's investment and professional area's bringing up as well as business's extension device should be groped for the security consulting though total system management service. Fifth, there are no big difference education course and purpose, duty about a security police man law and security law's unification, so it is necessary to drive forward actively unification through government organization's cooperation. Sixth, a paradigm shift should be occured about private security service among policeman, citizen, and private security guards. Seventh, it is considered the role of security association is important. Lastly about a matter communication between the National Police Agency, and Security Association, not only look at from an authority's angle, collecting information, corresponding ability but now it is considered to grope each other cooperation device together among organizations not only the National Police Agency but also, National Organization, National Intelligence Service, the prosecution, Presidential Security Service Guard, Army etc.

  • PDF