• Title/Summary/Keyword: Security Constraint

Search Result 86, Processing Time 0.02 seconds

Hierarchical Leisure Constraints on Leisure Motivation and Participation among Security Agent

  • Kim, Kyong-Sik;Park, Young-Man
    • International Journal of Contents
    • /
    • v.6 no.2
    • /
    • pp.59-68
    • /
    • 2010
  • This research looks close the effect of security agent's hierarchical leisure constraint on the leisure motivation and participation based on the Jackson's Model of the hierarchical leisure constraints. This research selected 420 people for sampling, designating security agents who work for security companies located in Seoul in 2009 at present as subjects by utilizing purposive sampling method, but the number of sampling used for ultimate analysis is 356. In this research, reliability analysis's and structural equation modeling's Maximum Likelihood method are used to prove the reliability and validity of questionnaire. By using these research method and procedures, the conclusion of this research is as following. First, intra-personal leisure constraint was affected by interpersonal, structural leisure constraint. Second, leisure motivation was affected negatively by leisure constraint. Third, leisure participation was affected positively by leisure motivation. Synthesizing all things referred above, leisure constraint was affected by inter-personal, structural leisure constraint, and in turn, leisure motivation and leisure participation were affected by its effects. It turned out that leisure motivation has a meaningful effect on leisure participation through leisure participation and adjusting process.

Influence of the Leisure Constraint of a Private Security Guard on His/Her Task Stress and Life Satisfaction (민간경비원의 여가제약이 직무스트레스 및 생활만족에 미치는 영향)

  • Lee, Gun-Chun;Song, Kang-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.359-366
    • /
    • 2010
  • The purpose of this study is to examine the influence of the leisure constraint of a private security guard on his/her task stress and life satisfaction. The subjects of this study were chosen among the private security guards working in Seoul based private security firms in 2009, and by going through judgement sampling, 300 cases were applied in the final analysis. Collected data went through factor analysis, reliability analysis, regression analysis, and path analysis by using SPSSWIN 17.0. In reference with the reliability of the questionnaire, Cronbach's $\alpha$ was over .600. The conclusion of this study is as following. Firstly, the leisure constraint of a private security guard affects his/her task stress. In other words, when peripheral and individual constraint increase, task stress is intensified, while task stress winds down when interpersonal constraint decreases. Secondly, the leisure constraint of a private security guard affects life satisfaction. That is, when individual constraint goes down, life satisfaction is improved. Thirdly, the task stress of a private security guard affects life satisfaction. when compensation and career development increase, life satisfaction rises. On the other hand when task characteristic is weakened, life satisfaction gets lower. Fourthly, the leisure constraint of a private security guard has a causal influence on task stress and life satisfaction. Accordingly, it becomes apparent that the task stress is a significant variable which intermediates the relation between leisure constraint and life satisfaction.

Analysis on the Leisure Constraint and Index Concentrate Here Improvement's Leisure Activities among the Private Security Agents Applying PPA Technique (PPA기법을 적용한 민간경호경비원의 여가제약과 중점개선 여가활동 참가지수 분석)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.317-325
    • /
    • 2010
  • This study aims to deduct the extensive improvement types of leisure activities of private security agents using PPA technique and to examine the influence of leisure constraint on the index of participation. Through this process, this study consequently will draw the priority list of investment on the policy for improving the welfare status of private security agents. In this study, judgement sampling was applied to 6 security agencies located in Seoul, 2010, and 267 cases were used in the final analysis. Collected data went through factor analysis, reliability analysis, paired t test, PPA analysis, and regression analysis by using SPSSWIN 17.0. The conclusions were drawn as follows. In regard to the reliability, Cronbach's $\alpha$ was over .768. First, there was a difference between the preference rate and the participation rate which are the participation index of the private security agents' leisure activities. concentrate here in leisure types turned out to be fitness activities, walking/jogging, tourism, a day-long travel, and keep up the cood work in leisure types are movies, domestic tourist attractions, dating, eating out, personal relationship, watching sports, reading, karaoke, TV video watching, drinking etc. low priority in leisure types are water sports, hiking, biking, soccer, photography, ball games, sky sports, playing go/janggi, inline skates, and cooking. Second, the leisure constraint affects the participation index of leisure activities. As the personal constraint, and surrounding conscious constraint which are the subordinate factors of the leisure constraint get bigger, the participation index of favored leisure activities become lower. In contrast, when the difficulties such as structural constraint, time and economical constraint are overcome, participation index of leisure activities go on the rise.

A Study on Security Model Design of Adaptive Access Control based Context-Aware (상황인식 기반 적응적 접근제어 보안모델 설계에 관한 연구)

  • Kim, Nam-Il;Kim, Chang-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.211-219
    • /
    • 2008
  • This paper is proposed context-aware based access control, model by extending original access control model. In this paper, we survey the recent researches about security model based context-aware such as xoRBAC and CAAC. For exactly policy evaluation, we make an addition Context Broker and Finder in existing CAAC security model. By this security model, Context information and context decision information is able to be collected easily for more correct policy decision. This paper controlled access of possible every resources that is able to access by user's event and constraint from primitive access resources. In this paper proposed security model can be offer dynamically various security level and access authority method alone with specified policy and constraint adjustment at user's role.

  • PDF

Robust Cooperative Relay Beamforming Design for Security

  • Gong, Xiangwu;Dong, Feihong;Li, Hongjun;Shao, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4483-4501
    • /
    • 2015
  • In this paper, we investigate a security transmission scheme at the physical layer for cooperative wireless relay networks in the presence of a passive eavesdropper. While the security scheme has been previously investigated with perfect channel state information(CSI) in the presence of a passive eavesdropper, this paper focuses on researching the robust cooperative relay beamforming mechanism for wireless relay networks which makes use of artificial noise (AN) to confuse the eavesdropper and increase its uncertainty about the source message. The transmit power used for AN is maximized to degrade the signal-to-interference-plus-noise-ratio (SINR) level at the eavesdropper, while satisfying the individual power constraint of each relay node and worst-case SINR constraint at the desired receiver under a bounded spherical region for the norm of the CSI error vector from the relays to the destination. Cooperative beamforming weight vector in the security scheme can be obtained by using S-Procedure and rank relaxation techniques. The benefit of the proposed scheme is showed in simulation results.

Participation Types of Private Security Guards in Leisure Activities and the Effect of Leisure Constraint on Life Quality (민간경호원의 여가활동 참여유형 및 여가제약이 삶의 질에 미치는 영향)

  • Park, Joon-Ho;Choi, Pan-Am;Jo, Sung-Gu
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.161-171
    • /
    • 2011
  • This research puts the purpose in elucidating the effect of participation types of leisure activity and leisure restraints on life quality. To achieve research purpose, questionnaire survey was conducted on 200 subjects who are engaged in private guard companies with ages over 20. Using the collected data, frequency analysis was conducted in order to identify demographic characteristics with SPSS/WIN 17.0V program. In addition, multiple regression analysis was conducted for solving research questions. As a result, sports related participation type had a positive effect on time constraint factor. Meanwhile, hobby related participation type had a positive effect on time and cost constraint, participation type of watching has a positive effect on individual and social constraint. Tour and play related participation type had a positive effect on individual constraint factor. Meanwhile participation type of sociality had a positive effect on individual constraint and hobby factor, but had a negative effect on familial and social constraint. Sports related participation type had a positive effect on social relationship factor. Participation type of watching and play related participation type had a negative effect on family relationship. Finally, time constraint factor had a positive effect on family relationship, and cost constraint factor had a positive effect on entire quality of life. Individual and family constraint factors had a negative effect on leisure relationship factor. Also, social constraint factor had a positive effect on family relationship, but had a negative effect on leisure relationship.

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

Relationship of Leisure Constraint, Boredom and Satisfaction among the Private Security Agents (민간경비원의 여가제약과 여가권태 및 여가만족의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.459-468
    • /
    • 2011
  • This study was to analyze the relationship of leisure constraint, boredom and satisfaction among the private security agents. To attain the goal of this study, the employee of private security organization located in Seoul, 2011 year were sampled 400 peoples by purposive sampling method. The result of reliability check up was here below; over Cronbach's ${\alpha}$=.587. To analyze materials, reliability analysis, factor analysis, T test and F test, multiple regression analysis and path analysis were used as statistic analysis techniques. The conclusion are here below. First, leisure constraints, boredom and satisfaction have a difference in demographic and socio-economic characteristics. Second, leisure constraints influence on the leisure boredom. Third, leisure constraints influence on the leisure satisfaction. Fourth, leisure constraints influence directly, indirectly on leisure boredom and satisfaction. Leisure boredom is very important variable connecting leisure constraints and satisfaction.

Secure and Energy-Efficient MPEG Encoding using Multicore Platforms (멀티코어를 이용한 안전하고 에너지 효율적인 MPEG 인코딩)

  • Lee, Sung-Ju;Lee, Eun-Ji;Hong, Seung-Woo;Choi, Han-Na;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.113-120
    • /
    • 2010
  • Content security and privacy protection are important issues in emerging network-based video surveillance applications. Especially, satisfying both real-time constraint and energy efficiency with embedded system-based video sensors is challenging since the battery-operated sensors need to compress and protect video content in real-time. In this paper, we propose a multicore-based solution to compress and protect video surveillance data, and evaluate the effectiveness of the solution in terms of both real-time constraint and energy efficiency. Based on the experimental results with MPEG2/AES software, we confirm that the multicore-based solution can improve the energy efficiency of a singlecore-based solution by a factor of 30 under the real-time constraint.

An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints (송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구)

  • Chung, Koo-Hyung;Kim, Bal-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.12
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.