• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.024 seconds

An Analysis of the Differences in the Steps of the Demographic Characteristics in Security Company (인구통계학적 특성에 따른 시큐리티업 종사자의 차이 분석 : 서비스지향성과 서비스품질 및 경영성과를 중심으로)

  • Min, Jae-Ki;Han, Sang-Cheul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.141-177
    • /
    • 2009
  • The purpose of this study is to identify the effects of service orientation perceived by employees of security companies on service quality and management performance based on service orientation theory. To test this, 345 participants were sampled from the security companies located in Seoul and Gyeonggi area using stratified cluster random sampling, and then frequency analysis, exploratory factor analysis, t-test, one-way ANOVA analysis and path analysis of the resulting data were conducted using SPSS 15.0 program. Conclusions derived from the aforementioned analytical methods are as follows: there were difference in service orientation according to demographic characteristics. And results from analyses showed that service leadership, which is sub factor of service orientation, was highly evaluated by the male group, and the customer service, by the participants of having college education and more, and the service system, by the group of the income bracket between 1.51 and 2 Million Won.

  • PDF

The Research on the Influence of the Mobbing by Forming on Alienation in Job Attitude of the Private Security Guards and Control of Self-esteem : focused on Seoul-Kyunggi area (직장 내 소외감형성의 따돌림이 민간경호원의 직무태도에 대한 영향 및 자아 존중감의 조절효과에 관한 연구 : 서울·경기지역을 중심으로)

  • Kim, Yonghak;Park, Seungbyeol;Kim, Taebock;Kim, Hyunmi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.365-375
    • /
    • 2015
  • This study is significant in the sense that it minimize the negative effect of workplace bullying, ultimately it maximize organizational performance and keep private security guards physical and mental health. We tested the hypothesis that workplace bullying negatively impacts private security guard's office attitude, but there will be significant difference in influence with their level of self-esteem scale. First of all, as the result of the correlation analysis of each of variables, a positive correlation was found between self-esteem and job satisfaction but negative correlation between self-esteem they have, the more job satisfaction they get, the lower turnover intention they have. Second, we tried to find out how self-esteem affect them on their job satisfaction. Using regression analysis, we can see that job satisfaction is affected by age, workplace bullying, relational aggression and self-esteem. For example, job satisfaction is increased as they get old and self-esteem is improved, on the other hand, workplace bullying and relational aggression is decreased. Third, to find out how self-esteem affects their turnover intention, we did regression analysis. The result shows that turnover intention is affected by age, working period, workplace bulling, relational aggression and self-esteem. For example, turnover intention if higher as working period, workplace bullying, relational aggression is increased while age and self-esteem is decreased.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

Location Optimization in Heterogeneous Sensor Network Configuration for Security Monitoring (보안 모니터링을 위한 이종 센서 네트워크 구성에서 입지 최적화 접근)

  • Kim, Kam-Young
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.2
    • /
    • pp.220-234
    • /
    • 2008
  • In many security monitoring contexts, the performance or efficiency of surveillance sensors/networks based on a single sensor type may be limited by environmental conditions, like illumination change. It is well known that different modes of sensors can be complementary, compensating for failures or limitations of individual sensor types. From a location analysis and modeling perspective, a challenge is how to locate different modes of sensors to support security monitoring. A coverage-based optimization model is proposed as a way to simultaneously site k different sensor types. This model considers common coverage among different sensor types as well as overlapping coverage for individual sensor types. The developed model is used to site sensors in an urban area. Computational results show that common and overlapping coverage can be modeled simultaneously, and a rich set of solutions exists reflecting the tradeoff between common and overlapping coverage.

Study on promoting the educational role of security sector to prevent child missing (아동실종 예방을 위한 시큐리티 분야의 교육적 역할증진)

  • Park, SangKyun;Kim, JinHwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.215-222
    • /
    • 2013
  • This study aims to provide future direction recognizing the educational importance and to present the way ahead that practices correctly for improving an educational role on security sector to prevent child missing. Therefore, it was conducted with questionnaire that is "Research on participation grade of education to prevent child missing and the actual condition" made by researcher of this study which is on 363of parents of pre-chirdren of 6,7 and 8years old in a kindergarten and an elementary school where is located in metropolitan area. It operated to take processing enterprise statistics using SPSS/WIN 12.0 for getting data, and analyzed frequency and t-verification.It investigated correct selection of an education specialist on preventive education and participation grade of education to prevent missing on home, how often, how it is conducted, then what requirement for educationto prevent child missing and participation grade is, whether difference is in accordance with gender of parentsand gender of child.

On the Effect of Perceived Security, Perceived Privacy, Perceived Enjoyment, Perceived Interactivity on Continual Usage Intention through Perceived Usefulness in Mobile Instant Messenger for business (업무용도로 이용되는 모바일 인스턴트 메신저에서 인지된 보안성, 인지된 프라이버시, 인지된 즐거움, 인지된 상호작용성이 지속이용의도에 미치는 영향에 관한 연구)

  • Lee, Jieun;Hwang, Changyu;Kwon, Dosoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.159-177
    • /
    • 2015
  • As smart phones become more common nowadays, mobile instant messengers such as kakao talk and line are used as essential communication tools exchanging information between individuals. Also, the mobile instant messengers extend their use to business area beyond communication between individuals. This study is on how factors of mobile instant messenger such as perceived security, perceived privacy, perceived enjoyment and perceived interactivity affect business continual usage intention through perceived usefulness. The proposed model is based on Expectation-Confirmation Theory of Oliver and Technology Acceptance Mode of Bhattacherjee. For an analysis, 159 survey responses were collected from the office workers in Seoul and nearby cities, having experiences of mobile instant messengers. To validate the proposed research model, PLS analysis is performed with the valid 154 questionnaires. The path analysis results are as follows. First, perceived security has a positive effect on expectation-confirmation. Second, perceived enjoyment has a positive effect on perceived usefulness. Third, perceived interactivity has a positive effect on both perceived usefulness and expectation-confirmation. Fourth, perceived usefulness has a positive usefulness on satisfaction and continual usage intention of mobile instant messenger. Last, expectation-confirmation has a positive effect on perceived usefulness, and satisfaction has a positive effect on continual usage intention of mobile instant messenger. Since the mobile instant messenger may bring a pressure of work and a violation of privacy, it is necessary that the company provide a guideline for use of the mobile instant messenger and establish the in-house mobile instant messenger system.

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System (고성능 침입탐지 및 대응 시스템의 구현 및 성능 평가)

  • Kim, Hyeong-Ju;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.157-162
    • /
    • 2004
  • Recently, the growth of information infrastructure is getting fatter and faster. At the same time, the security accidents are increasing together. We have problem that do not handle traffic because we have the Intrusion Detection Systems in low speed environment. In order to overcome this, we need effective security analysis techniques that ran Processed data of high-capacity because high speed network environment. In this paper we proposed the Gigabit Intrusion Detection System for coordinated security function such as intrusion detection, response on the high speed network. We suggested the detection mechanism in high speed network environment that have pattern matching function based packet header and based packet data that is proceeded in system kernel area, we are shown that this mechanism was excellent until maximum 20 times than existing system in traffic processing performance.

The Effect of Career Choice Motives of the Private Security Guards on Job evaluation and Job Attitude (민간경비원의 직업선택동기가 직업선택평가 및 직무태도에 미치는 영향)

  • Kim, Sang-Jin
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.73-82
    • /
    • 2016
  • This study is to investigate the Effect of Career Choice Motives of the Private Security Guards on Job choice evaluation and Job Attitude. For this study visiting the 8 companies around the capital area and surveyed from May 1st to October 10th 2015 using the stratified random sampling method. A total of 240 questionnaires were distributed and among them, 220 copies were used except for analysis. I used SPSSWIN 21.0 and AMOS 21.0 to reliability analysis, factor analysis, analysis of structural equation model, path analysis. The level of statistical significance was set to .05. The following are conclusions. Job choice motivation has a positive effect on Job choice evaluation and Job attitude but Job choice evaluation doesn't play intermediary role on relationship between Job choice motivation and Job attitude.

An implementation of stable transmission and security management system of massive acoustic data in unsecurity and low speed network area (비보호 저속망 환경에서의 고용량 음향데이터의 최적화 전송 및 보호 시스템 구현)

  • Sun, Doo-Young;Kim, Duk-Young;Kim, Yong-Deuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1323-1330
    • /
    • 2010
  • The amount of acoustic data gathered from the acoustic data gathering system is increased dramatically as the acoustic data gathering system become various and highly effective. It is needed to transmit this acoustic data to analysis environment for precise analysis. In this gathering/analysis system, it is also needed the stable transmitting as well as highly perfect security. But the existing system using the conveying method needs a lot of time. In case of using networks, the low speed networking vulnerable in the stable transmitting and the information security is impossible to materialize. In this paper, I would like to propose a transmitting and management system sending a massive gathering acoustic data in the unsecurity and low speed networking environment. The implemented system is to transmit the acoustic data safely in low speed networking environment and secure the acoustic data from various threats.