• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.023 seconds

A Study on students' consciousness regarding their plans after graduation Education of Guard and Security Major (경호관련학과 대학생의 진로의식에 관한 연구)

  • Kim, Chang-Ho;Jung, Jsug-Suk;Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.21-36
    • /
    • 2006
  • This study aims to grasp the general conditions regarding university students in security related majors in Korea. Followings will be covered here: what motivated them to choose those majors, how much are they satisfied with major curriculum course after matriculation, whether they got jobs through the education, what is their consciousness on their majors, jobs, and courses like, and what effects their job preference. And this study also aims at helping the students with their future plans such as admission to a school of higher grade and choosing their job. For this study, we distributed 340 cpoies to the students in security related majors at 4 four-year colleges and 1 two-year college, and collected 298 copies by means of quota sampling method. For collected questionnaires, we used individual T-test verification and one-way ANOVA analysis to grasp the situation. Significance standard for the test results was set as p<0.05. Following are the test results. First, the analysis on students' satisfaction rate resulted in male students' average of 2.42, compared to female students' average of 2.10, which shows female students have higher satisfaction rate in choosing their majors than male students. Secondly, The results on analysis of satisfaction rate on their curriculums, classes, and majors show that students in security-related majors showed different satisfaction rate and different averages according to their sex and the year of the college. The study indicates that males have higher satisfaction rate on curriculum than females, with male students' average of 2.63 and female students' average 2.88. According to the year of the college, there was a significant difference statistically, Statistics show that students at two-year college have higher satisfaction rate than those at four-year college, with two-year college students' average of 2.48 and four-year college students' of 2.74. students have the average of 3.56. The higher year they were in, the more improvement the curriculum required. When it comes to convenience offer for employment, male students expected more from school than female students, with males' average of 2.74 and females' average of 4.07. Male students marked higher than female students in the extent of job information offer, with males' average of 2.96 and females' average of 2.59. Fourthly, when students in security-related majors were surveyed on their consciousness of their future plans such as getting jibs, two-year college students had more certificates of qualification for employment than four-year college students. What they do preponderantly in preparation for employment was studying foreign languages, which took up 40.4%. And when they were asked on their confidence for employment, positive answers were far more than negative ones with the percentage of 39.6%, while negative took up just 14.0%. Fifthly, when it come to the students in security-related students' job preferences, 49.2% preferred safe job conditions in public security area and 34% preferred private guard or private security organizations. And in the public security area, the highest percentage of 28.6 preferred to work in presidential security service. In the area of private security, 21.2% showed interests in private guard and private security organizations.

  • PDF

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

An Analysis of Research Trends in Information Security Education (정보보호 교육에 대한 연구 동향 분석)

  • Kim, Kunwoo;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.489-499
    • /
    • 2016
  • Nowadays the importance of information security has been increased because there are many benefits and threats like information leakage caused by rapid growth of information technology. It is important to apply technical solution, however enhancing security capability is more important to respond evolving security threats. Information security education is one of typical way to enhance security capability and there are various efforts at the dimension of nation, company and academic community. However it is required to analyze previous research until now and derive future research direction for long-term development plan. In this study, we analyzed a publication status about 177 papers related to information security, training and awareness from 4 foreign journals and 2 Korean journals. Additionally, we analyzed in detail about 70 papers related to information security education. As a result, the most part of study is about curriculum, and in the future, it is required to expand educational area as well as study about effectiveness measurement of information security education by experimental research.

A Plan of Connection between Crime Prevention through Environmental Design(CPTED) and Security System (환경설계를 통한 범죄예방(CPTED)과 시큐리티시스템(Security System) 간 연계방안)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.165-185
    • /
    • 2009
  • This research presented a plan of connection between CPTED and Security System through analyzing relation between crime occurrence and residence environment, CPTED propulsion examples on domestic-oversea, relation between CPTED and Security System. The following was the result of the study. First, we should import CPTED and Security System for city and residential area crime prevention. Second, we should know that CPTED and Security System are not each other but complementary cooperation. Third, we must use Security System components correctly in CPTED's details design plan and consideration regard when we design CPTED. forth, we must develop and keep a plan of connection between CPTED and Security System.

  • PDF

Influence of Mentoring Type and Mentoring Function on the Organizational Commitment among the Security Organization (시큐리티조직의 멘토링유형과 멘토링기능이 조직몰입에 미치는 영향)

  • Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.21-29
    • /
    • 2011
  • This study is to investigate how security organizational mentoring type and mentoring function affects organizatio nal commitment. This study had selected security from 5 different security organizations of 2010 which are located i n capital area. Using judgment sampling method, 198 security were drawn for the final study. The survey used in th is study is composed of 37 questions. To practice frequency analysis, factorial analysis, reliability analysis and regre ssion, a program called SPSSWIN 18.0 was used. The value of Cronbach's ${\alpha}$, which shows the reliability of the stud y, appeared to be over .622. The result is: First, security organizational mentoring type affects mentoring function. T hat is, when a systematic mentoring is activated, friendship protecting function, career managing function and sociopsychological function are promoted. Second, security organizational mentoring type affects organizational commitmen t. That is, when a systematic mentoring is activated, organizational commitment is promoted. Third, security organiz ational mentoring function affects organizational commitment. That is, increased friendship protecting function, career managing function, socio-psychological function and role model function results in increased organizational commitment.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Public Perception and Communication Patterns Pertaining to Nuclear Power in Korea: Focusing on the Transition Period from Pro-nuclear to De-nuclear Policy

  • Eunok Han;Yoonseok Choi
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.4
    • /
    • pp.226-236
    • /
    • 2022
  • Background: An effective communication strategy for reducing conflicts in South Korea has been designed through the analysis of public perception and communication variables on nuclear power under the conditions of rapidly changing nuclear power policies. Materials and Methods: This study conducted both qualitative research through group discussions based on social psychology and quantitative research through surveys. Results and Discussion: Nuclear power plant (NPP) area residents in favor of nuclear power indicated higher levels of communication, safety perception, and contribution than those against it. NPP area residents trusted the civilian expert groups (18.3%) and local government (17.3%) the most, while metropolitan city residents trusted the Nuclear Safety and Security Commission and the Korea Institute of Nuclear Safety (20.7%) the most. In determining nuclear power policy, both the NPP area residents (18.1%) and metropolitan city residents (17.1%) prioritized safety, health, and the environment. While metropolitan city residents thought that energy security and economic growth (16.4%) were important, NPP area residents thought the current issue of spent fuel rods (14.1%) to be important. Conclusion: It is necessary for the nuclear power industry to have and actively implement communication and conflict resolution strategies based on the patterns obtained in the study results.

Efficient Bit-Parallel Multiplier for Binary Field Defind by Equally-Spaced Irreducible Polynomials (Equally Spaced 기약다항식 기반의 효율적인 이진체 비트-병렬 곱셈기)

  • Lee, Ok-Suk;Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.3-10
    • /
    • 2008
  • The choice of basis for representation of element in $GF(2^m)$ affects the efficiency of a multiplier. Among them, a multiplier using redundant representation efficiently supports trade-off between the area complexity and the time complexity since it can quickly carry out modular reduction. So time of a previous multiplier using redundant representation is faster than time of multiplier using others basis. But, the weakness of one has a upper space complexity compared to multiplier using others basis. In this paper, we propose a new efficient multiplier with consideration that polynomial exponentiation operations are frequently used in cryptographic hardwares. The proposed multiplier is suitable fer left-to-right exponentiation environment and provides efficiency between time and area complexity. And so, it has both time delay of $T_A+({\lceil}{\log}_2m{\rceil})T_x$ and area complexity of (2m-1)(m+s). As a result, the proposed multiplier reduces $2(ms+s^2)$ compared to the previous multiplier using equally-spaced polynomials in area complexity. In addition, it reduces $T_A+({\lceil}{\log}_2m+s{\rceil})T_x$ to $T_A+({\lceil}{\log}_2m{\rceil})T_x$ in the time complexity.($T_A$:Time delay of one AND gate, $T_x$:Time delay of one XOR gate, m:Degree of equally spaced irreducible polynomial, s:spacing factor)

A Reflectornet Based on Software Defined Network (소프트웨어 정의 네트워크 기반 리플렉터넷)

  • Park, Taejune;Lee, Seungsoo;Shin, Seoungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.397-405
    • /
    • 2014
  • Software-Defined Networking (SDN), which separates the control plane from the data plane and manages data planes in a centralized way, is now considered as a future networking technology, and many researchers and practitioners have dived into this area to devise new network applications, such new routing methods. Likewise, network security applications could be redesigned with SDN, and some pioneers have proposed several interesting network security applications with SDN. However, most approaches have just reimplemented some well-known network security applications, although SDN provides many interesting features, They didn't effectively use them. To investigate if we can use SDN in realizing sophisticated network security applications, we have designed and implemented an advanced network security application, Reflectornet, which redirects malicious or suspicious network trials to other security monitoring points (e.g., honeypot). In addition, we have tested its performance and practicability in diverse angles. Our findings and some insights will encourage other researchers to design better or intelligent network security applications with SDN.