• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.031 seconds

A study on User Satisfaction of Landscape Component Factors for Outdoor Space of Culture Art Center (문화예술회관 옥외공간 경관구성요소의 이용만족도 연구)

  • Lee, Gyeong-Jin;Gang, Jun-Mo
    • KIEAE Journal
    • /
    • v.9 no.1
    • /
    • pp.31-38
    • /
    • 2009
  • The purpose of this study is to present direction in outdoors space planning and design after direction through user characteristic analysis through spectacle component establishment of culture art center outdoors space through on-the-site analysis and literature investigation to culture art center of Seoul city and capital region 17 places in this research. The data was collected from classification and bisection kind, subdivision kind, and great classification composed to 17 items. User satisfaction side and Variable that is looked below satisfaction than average appeared to bench, pergola, sculpture facilities, pavement facilities, border facilities. And these facilities were analyzed dissatisfaction. When see satisfaction model, when make up culture art center or similar facilities in local government hereafter because parking facilities and rest area cause big effect in satisfaction, is judged that is item to consider most preferentially. In most case, parking lot security from outdoors space, resting place security, security of field performance facilities etc. taking a serious view because tendency that users see performance or use most vehicles except neighborhood walking area for a rest, a walk etc.. is trend. But, is judged that physical side so that can feel satisfaction as space security of quantitative side is important but users utilize substantially and side that is the program are more important in hereafter.

A Study on the Reorganization of the National Critical Facilities Protection Personnel System in Accordance with the Changes in the Government Policy of the Temporary Position into Permanent Position (비정규직의 정규직화 정책기조 변화에 따른국가중요시설 방호인력체계 개편 방안)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.9-26
    • /
    • 2018
  • In order to reflect the Changes in this government's policy of making Temporary Position employees into the Public sector permanent, special security guards from Private Security firms in the National Critical Facilities protection Position are moving forward transformation to Permanent Position. Especially, the organization of the protection personnel of the National Government Buildings designated as the National Critical Facilities is comprised of various types of security personnels, protective officer, special security guards from Private Security firms, Private police guards, police officers and these types of security personnels protect for the Government Buildings. Recently, The Government Security planning division is discussing various types of transformation, Special Security guards are employed directly by the Government in order to convert them into Permanent position, Special Security guards are employed directly through a establishment of Public Security corporation, protective officers are hired by the Government, Self-guards are hired directly by the Government, Private police guards are employed directly by the Government. In order to reflect the Changes the Government policy of making Temporary position employees into the Permanent, the Special Security Guards from Private Security Firms in the National Critical Facility's protection environment, protective personnels operation characteristic under various circumstances. Especially, in the process of making Special Security Guards to Permanent position, it is necessary to take precedence over the various opinions of Special Security Guards and stakeholder.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

ROK's maritime security strategic concept and cooperation direction for the ROK Navy and Coast Guard (한국의 해양안보전략개념과 해군·해경 간 협력의 발전방향)

  • Chung, Samman
    • Strategy21
    • /
    • s.42
    • /
    • pp.258-292
    • /
    • 2017
  • This paper is designed to make a national strategic concept for the ROK's maritime security and to explore cooperation directions for the ROK Navy and Coast Guard in order to implement the newly-made maritime security strategic concept. As strategy is composed of three main categories(goals, ways, means), the goal of the ROK's maritime security strategy is 'Safe and Affluent Sea' and the way to realize the goal is the principle of cooperative leverage, and the means as tasks to implement the strategic concept are maritime safety, maritime security, and maritime stewardship. The concept of national fleet as used in the US is applied to promoting the cooperation between the ROK Navy and Coast Guard. Thus, under the newly-established maritime security strategic concept along with the national fleet model, followings are suggested as policy proposals for facilitating mutual cooperation between the ROK Navy and Coast Guard in dealing with not only traditional threats but also non-traditional treats at sea and from the sea as well. First, the ROK Navy and Coast Guard has been making efforts to enhance interoperability between the two sea services. However, the mutual cooperations have been focused mainly on areas on operational level rather than policy level. Therefore, the two sea services are recommended to enlarge exchanges and cooperation in policy areas. Second, there are still demands for further cooperation areas between the two sea services in command and communications. The interoperability in C2 between the two needs to be upgraded even to the areas of anti-terrorist activities ar sea, ASUW, ASW, maritime interdiction, etc. Third, mutual comparability between the two needs to be reflected in the maritime forces development to ensure the comparability in UNREP and other logistics areas. Fourth, the standardization of logistical materials and equipments is needed as a way of sustaining operational capability and logistical capacity for the ROK Navy and Coast Guard as well. Fifth, the ROK Navy and Coast Guard are recommended to participate more actively in international maritime cooperation activities such as PASSEX. Sixth, Complementary laws and regulations need further to be revised and to be newly made for collectively managing swiftly maritime accidents and natural disasters at sea.

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

The Employee's Information Security Policy Compliance Intention : Theory of Planned Behavior, Goal Setting Theory, and Deterrence Theory Applied (조직구성원의 정보보안 정책 준수의도: 계획된 행동이론, 목표설정이론, 억제이론의 적용)

  • Hwang, In-Ho;Lee, Hye-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.155-166
    • /
    • 2016
  • In accordance with the increase of the importance of information security, organizations are making continuous investments to develop policies and adapt technology for information security. Organization should provide systemized support to enhance employees' security compliance intention in order to increase the degree of organization's internal security. This research suggests security policy goal setting and sanction enforcement as a method to improve employees' security compliance in planning and enforcing organization's security policy, and verifies the influencing relationship of Theory of Planned Behavior which explains employee's security compliance intention. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. We verified the hypotheses based on 346 responses. The result shows that the degree of goal setting and sanction enforcement has positive influence on self-efficacy and coping efficacy which are antecedents that influence employees' compliance intention. As a result, this research suggested directions for strategic approach for enhancing employee's compliance intention on organization's security policy.

A Study on the Realities and Analysis of Crime Related to Security Guard (경호경비 관련 주요범죄에 대한 실태분석)

  • Kim, Chang-Ho;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.65-79
    • /
    • 2008
  • This study started with the need to have a basic understanding of the crimes related to security guard in Korea. For this purpose, it attempted to analyze the crimes related to security guard occurring in Korea for the years, the cause for those crimes to occur, and the basic cause for those crimes such as criminals' educational level, age, occupation and so forth investigate how those crimes occurred. And ultimately it was intended to provide referential materials for perfect security guard from the stage of its planning to the stage of implementation and termination by analyzing how the machinery of law treated those criminals. This study aimed to help security guards to perform their role by investigating the cause and disposition of crimes related to security guard occurring for the years in order to cope with the emergency situation frequently occurring in the job of security guard. To attain the goal of study, this study attempted to do the following tasks: First, to analyze existing crimes and investigate the crimes related to security guard in order to investigate how the criminal act occurred in relation to the crime related to security guard, numerous kinds of crimes. Second, to investigate in what case the criminal act occurred by analyzing the criminal environment, the yearly, monthly and weekly frequency of those crimes and the like in relation to this criminal act. Third, to grope the alternative to cope effectively with all sorts of dangerous situations on the spot of security guard by analyzing the crimes related to security guard and investigating the effective scheme for coping with it.

  • PDF

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

A Study on the Assessment of Rurality Characteristics in Rural Amenity Resources (농촌어메니티자원의 농촌다움 특성 평가에 관한 연구)

  • Lee, Jeung-Won;Jeong, Yoon-Hee;Im, Seung-Bin
    • Journal of Korean Society of Rural Planning
    • /
    • v.12 no.2 s.31
    • /
    • pp.1-9
    • /
    • 2006
  • Current environmental problems of rural area are connected to loss of rural functions which is food security as well as conservation of environment, balanced development of country and succession of traditional culture. To solve these problems, recent projects are focusing on social changes in rural area and conservation of rurality creating values of rural amenity resources. At this point, full implications of rurality which is the various aspects of rurality should be defined to be applied in direct plans to conserve the rurality. In this study, nine attributes of rurality are found as various meanings with adjectives included in image of rurality. For practical use of these adjectives of rurality attributes, we evaluate the list of rural amenity resources and suggested plans for conservation of rural amenity. These attributes can be used as an effective method for village plan which brings one of the attributes into relief.