• Title/Summary/Keyword: Security Conditions

Search Result 891, Processing Time 0.026 seconds

Problems of Employment of the Population and Directions of Their Regulation in the Conditions of War

  • Zakharchyn, Galyna;Antonov, Andriі;Voityk, Oleksandra;Plotka, Lyubov;Mirko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.303-307
    • /
    • 2022
  • The purpose of the study is to determine the key aspects of the problems of employment of the population and the directions of their state regulation in war conditions. Employment policy involves a system of measures to create conditions for a more complete use of the potential of labor and business activity of the able-bodied population, linking this activity through taking into account the specifics of group interests with the tasks and guidelines for socio-economic development. But in the conditions of war, this problem acquires a new relevance. For the study, a number of theoretical methods of analysis were used. Based on the results of the study, the key aspects of the problems of employment of the population and the directions of their state regulation in war conditions were identified.

Employment Instability and Security Funds in U.S. Households

  • Baek, Eun-Woung
    • International Journal of Human Ecology
    • /
    • v.4 no.2
    • /
    • pp.55-75
    • /
    • 2003
  • The purpose of this study was to investigate the effect of employment related factors on household savings for precautionary purposes when controlling for financial security and to compare the results between the two different economic periods. A conceptual framework was developed based on the precautionary saving theory, the family stress theory, and previous empirical studies. As a self-insurance, a measure of security funds were developed and used as the dependent variable. Using data on working households in the 1992 and the 1998 Survey of Consumer Finances (SCF), a MLE estimation was conducted on the pooled data. The 1992 and 1998 data were used to reflect periods of economic recession and expansion, respectively. The results suggested that factors representing resources played the most significant role in determining the amount of security funds. Some of the employment related factors, preferences, financial security, and race were also significantly affected the amount of security funds. The results suggested that stable employment conditions were important for households to accumulate security funds. Households with more human resources and financial resources had a larger amount of security funds than those that had less human and financial resources. From the findings, implications for research, policies, and financial educators had been suggested.

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF

Formation of a Competitive Paradigm of Ensuring Economic Security of Industrial Enterprises in the Conditions of Formation of Circular Economy

  • Pohrebniak, Anna;Tkachenko, Tetiana;Arefieva, Olena;Oksana, Karpenko;Chub, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.118-124
    • /
    • 2021
  • The article examines the formation of a competitive paradigm of economic security of industrial enterprises in the formation of a circular economy. The basic laws of industrial enterprises are formed, which determined the characteristics of competitive positions and threats. The basic competitive concepts and their application at maintenance of economic safety of the industrial enterprises in the conditions of formation of circular economy are described. Thus, the technological approach to the formation of a competitive paradigm is based on production technologies, opportunities for technological modernization and development of infrastructure and intellectual competencies. The institutional concept reveals the regulatory mechanisms for ensuring competitiveness through the protectionism of national industrial enterprises, standardization and regulation of market imbalances. The innovation-investment approach within the competitive paradigm is also manifested in the creation of competitive advantages due to the presence of active innovative developments and their commercialization, knowledge and competencies of staff, capitalization of intelligence and communications, constant updating of infrastructure and technologies. Collectively, innovation and investment effects on the level of economic security allow industrial enterprises to ensure resilience to increasing competition, the emergence of new market challenges in the formation of a circular economy. A strategic approach to the application of a competitive paradigm to ensure the economic security of industrial enterprises allows you to justify the prospects for development and design behavioral models to predict and assess potential threats. The concept of system management is based on the complexity of threat analysis, the integrity of the economic security system, system-forming functions and patterns of implementation of industrial development tasks in the formation of a circular economy. The application of the described concepts is formalized by the authors through the definition of the basic patterns, directions and characteristics of their impact on the elements of the security system of industrial enterprises in the formation of a circular economy.

Study about development of education & training program for Private Security guard in Korea (한국 민간경비원 교육훈련 프로그램 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tea-Min
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.281-308
    • /
    • 2004
  • With regard to problems related to qualification of Private Security, this study is qualitatively to develop education & training program from the viewpoint of education for the purpose of checking professionalism of Security guard. Offering the solutions for improvement by analyzing problems of articles related to training for Private Security guard prescribed in existing 'Law of Guarding', I made studies of development of practical affairs-centered education & training program for Private Security guard on the basis of Private Security guard' duties. Education & training program for Private Security guard must be made up of practical affairs-centered one related to concrete duties. Also because it needs to be made on the basis of a model planned for the program with combined method, this study gave example of model and contests of education & training program based on duties of Facilities Security. Main duties of cPrivate Security guard can be divided into four duties; duties on their own posts, patrolling, control of going in and out, dealing with accidents and so on. Private Security guard are given main duties by each post, and after adjusting conditions according to personnel organization, they perform their own duties. As education & training program based on Private Security guard' duties, common education & training program for the new-appointed, practical affairs-centered education & training program, education & training program for superintendents, service education & training program and so on are provided.

  • PDF

The Unit Commitment Using the Sensitivity Factor of Security Constrained Optimal Power Flow (SC-OPF의 민감도 계수를 이용한 발전기 기동.정지계획)

  • Kim, Kwang-Mo;Chung, Koo-Hyung;Han, Seok-Man;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.416-417
    • /
    • 2006
  • The recent movement to deregulated and competitive electricity market requires new concepts against existing central dispatch in the system operation and planning. As power systems tend to be operated more closely to their ultimate ratings, the role of SCOPF(Security Constrained Optimal Power Flow) is changed. This paper deals with the proper Unit Commitment condition changed according to the conditions or configuration of power system. This goal of is paper is to obtain proper security and Optimal UC condition through the efficient usage of the sensitivity Factor against critical contingencies. The proposed mechanism has been tested on a sample system and results show more secure conditions against critical contingencies.

  • PDF

An Implementation of On-Line SCOPF Algorithm (On-Line SCOPF 알고리즘의 적용에 관한 연구)

  • Shin, Young-Kyun;Kim, Bal-Ho H.
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.10-12
    • /
    • 2000
  • As power systems tend to be operated more closely to their ultimate ratings. the role of SCOPF is changed and the importance for real-time security inhancement will be more increased in the new and competitive electricity market. This paper deals with the application of the SCOPF which make possible the On-Line application. The security margin of power system truly is changed according to the conditions or configuration of power system, therefore, the sensitivity factor related to the security is recalculated and the application should be updated in accordance with the state of power system. The proposed mechnism has been tested on modified Woolenberg 18-bus system and the results show more secure conditions against critical contingencies.

  • PDF

A Study on the Procedure Model to Carry on Works of the Private Security Company (민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

A study on security oversight framework for Korean Nuclear Facility regulations

  • So Eun Shin;Heung Gyu Park;Ha Neul Na;Young Suk Bang;Yong Suk Lee
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.426-436
    • /
    • 2024
  • Nuclear security has been emphasized to ensure the safety of the environment and humans, as well as to protect nuclear materials and facilities from malicious attacks. With increasing utilization of nuclear energy and emerging potential threats, there has been a renewed focus on nuclear security. Korea has made efforts to enhance the regulatory oversight processes, both for general and specific legislative systems. While Korea has demonstrated effective nuclear security activities, continuous efforts are necessary to maintain a high level of security and to improve regulatory efficiency in alignment with international standards. In this study, the comprehensive regulatory oversight framework for the security of Korean nuclear facilities has been investigated. For reference, the U.S. regulatory oversight frameworks for nuclear facilities, with a focus on nuclear security, and the motivations of changes in regulatory oversight framework have been identified. By comparing these regulatory programs and frameworks, insights and considerations for enhancing nuclear security regulations have been identified. A comprehensive security inspection program tailored for the Korean regulatory oversight framework has been proposed, and has been preliminarily applied to hypothetical conditions for further discussion.