• Title/Summary/Keyword: Security Secretary

Search Result 31, Processing Time 0.022 seconds

A Study on the Development of a Virtual Card Number Generation System to Safety EC (안전한 전자상거래를 위한 가상카드번호 생성시스템의 개발에 관한 연구)

  • Choi, Joon-Kee;Lee, Jong-Kwang;Kang, Young-Chang
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.27-32
    • /
    • 2010
  • In this paper, we research a virtual card generation system to secure e-commerce. Network security has increased the need to meet rapidly growing trend. And the amount and quality of e-commerce expansion due to the need for secure commerce transactions has increased even more. Instead of exposing the actual credit card number, we expose a virtual card number on the network. It can prevent the risk of hacking. We proved that through various experiments.

Korean Private Security for the Academic Directivity and Security Industry for the Market Directivity (시큐리티의 학문적 지향성과 시큐리티 산업의 시장 지향성 - 한국 시큐리티의 발전현황을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.15-31
    • /
    • 2008
  • This study aims to analysis and measure on the private security for the academic directivity and security industry for the market directivity in Korea. For this study we compare and analysis the curriculum of 15 universities in Korea and the papers which were published on "Korean Security Science Review" that is a report in a professional private security. In conclusion, 269 subjects are used as instructional materials in 15 universities, thus 103 subjects for the private security and 60 for the leisure sports and first-aid treatment, 46 for the social science, 30 for the martial arts and shooting, 16 for the secretary affairs, 14 for the foreign languages. Regarding scientistic papers, 45.7% of papers for the private security of all and 14.6% for the public security, 14.6% for the criminal, and 11.6% for the terror etc. But there are any papers for the facilities guard or security in spite of the facilities guard is pivotal role in this field. The facilities guard or security, or maybe house detective, holds 80.5% of the private security market and it is important role in this industry in Korea. Besides, considering development of private security, the security market makeup the body-guard field hold 12.2%, prevention security system by censor hold 4.1%. So, this statistics show that the facilities guard lead practically the private security industry in this field, but there are any subjects for the education and any research for the paper. Thus some modification on the universities curriculum is required, also needs activity research in the facilities guard field for the development private security.

  • PDF

A Study on the IUU Governance System of Regional Fishery Management Organization and Major State (국제 지역 수산 관리 기구와 주요 국가의 IUU 통제제도 연구)

  • Park, Min-Gyu
    • The Journal of Fisheries Business Administration
    • /
    • v.41 no.3
    • /
    • pp.103-127
    • /
    • 2010
  • The FAO reports that IUU fishing activities have widespread economic, social, and management consequences, including depriving legitimate fishers of harvest opportunities. It affects all fisheries from small scale to industrial. It also affects the ability of governments to support sustainable livelihoods for fishers and, more broadly, to achieve food security. The complexity of IUU requires various measures to combat IUU fishing such as adoption of IUU vessel lists; stronger port State controls; improved monitoring, control and surveillance (MCS); implementation of market-related measures to help ensure compliance; and capacity-building assistance. Trade and market measures reduce opportunities for IUU fishing activities by precluding or impeding access to markets for IUU product in a manner consistent with international law. ICCAT, CCAMLR, and IATTC, have put in place trade tracking programs or catch documentation schemes, and WCPFC is considering such a program. Vessel lists assist enforcement authorities in determining which vessels are or are not authorized to be fishing or conducting fishing support activities in specified areas. A number of RFMOs maintain records of IUU vessels: CCAMLR, IATTC, ICCAT, NAFO, NASCO, NPAFC, WCPFC. Section 608 of the US MSRA calling on the Secretary of Commerce, in consultation with the Secretary of State, and in cooperation with relevant regional fishery management councils and any relevant advisory committees, to take actions to improve the effectiveness of international fishery management organizations in conserving and managing stocks under their jurisdiction. EU IUU Regulation entered into force on 1 January 2010, was intended to regulate the highly complex multi-channel fisheries supply system of the European Community (EC) in an effort to improve global fisheries sustainability.

Control Policy for the Land Remote Sensing Industry (미국(美國)의 지상원격탐사(地上遠隔探査) 통제제탁(統制制度))

  • Suh, Young-Duk
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.1
    • /
    • pp.87-107
    • /
    • 2005
  • Land Remote Sensing' is defined as the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. Narrowly speaking, this is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information. Remote sensing technology was initially developed with certain purposes in mind ie. military and environmental observation. However, after 1970s, as these high-technologies were taught to private industries, remote sensing began to be more commercialized. Recently, we are witnessing a 0.61-meter high-resolution satellite image on a free market. While privatization of land remote sensing has enabled one to use this information for disaster prevention, map creation, resource exploration and more, it can also create serious threat to a sensed nation's national security, if such high resolution images fall into a hostile group ie. terrorists. The United States, a leading nation for land remote sensing technology, has been preparing and developing legislative control measures against the remote sensing industry, and has successfully created various policies to do so. Through the National Oceanic and Atmospheric Administration's authority under the Land Remote Sensing Policy Act, the US can restrict sensing and recording of resolution of 0.5 meter or better, and prohibit distributing/circulating any images for the first 24 hours. In 1994, Presidential Decision Directive 23 ordered a 'Shutter Control' policy that details heightened level of restriction from sensing to commercializing such sensitive data. The Directive 23 was even more strengthened in 2003 when the Congress passed US Commercial Remote Sensing Policy. These policies allow Secretary of Defense and Secretary of State to set up guidelines in authorizing land remote sensing, and to limit sensing and distributing satellite images in the name of the national security - US government can use the civilian remote sensing systems when needed for the national security purpose. The fact that the world's leading aerospace technology country acknowledged the magnitude of land remote sensing in the context of national security, and it has made and is making much effort to create necessary legislative measures to control the powerful technology gives much suggestions to our divided Korean peninsula. We, too, must continue working on the Korea National Space Development Act and laws to develop the necessary policies to ensure not only the development of space industry, but also to ensure the national security.

  • PDF

A Study on the Stay of Enforcement of ICSID Arbitral Awards (ICSID 중재판정의 '집행정지'에 관한 고찰)

  • KIM, Yong-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.65-87
    • /
    • 2015
  • This article examines the Stay of Enforcement of ICSID Arbitration Award. The effect of the stay is that the award is not subject to enforcement proceedings under Article 54 of the ICSID Convention pending the outcome of the annulment application. The annulment committee must decide the stay, unless the applicant sought the stay with the request for annulment, in which case the ICSID Secretary -General must grant it automatically. This automatic stay -which can only relate to the entire award-remains in force until the committee is constituted and issues a decision on the request for stay. ICSID committees have taken different positions on whether a stay of enforcement is exceptional or not. Some committees have held that because the ICSID Convention explicitly recognizes that the rights of the award creditor could be subject to a stay, stays are not exceptional. ICSID practice shows that most committees have rejected the proposition that the merits and prospects of the application for annulment should influence the committee's decision whether to grant a stay. In addition, ICSID practice regarding the specific circumstances that will justify a stay of enforcement is unclear, and committees have focused on different factors to decide whether to grant a stay such as prospect of prompt compliance with the ward, hardship to one of the parties, risk of non-recovery and irreparable harm to the award debtor. Also, ICSID practice shows that even though the Convention is silent on this issue, committees have generally held that they are empowered to condition the stay of enforcement on the granting of security by the requesting party.

  • PDF

A study for a play of improvement in education curriculum for bodyguard related theory (한국 대학의 경호관련학과 이론분야 교육과정의 학문적 정립)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.157-178
    • /
    • 2002
  • The objectives of this study is to analyze the curriculum based on the hypothesis of bodyguarding related department and to research the differences of the amongthree groups of public bodyguarding, private bodyguarding and bodyguarding professors with its significance in order to establish the development of direction in education curriculum for bodyguarding related departments at university level,For this purpose, this study categorized the sample group into three kind and surveyed them, Those are public bodyguarding members, private bodyguarding member, and the professors and 121 samples were selected in those three with the help of self-admistrated method, which is one of the sampling methods, First, among the current bodyguarding related theoretical disciplines significant differences among groups was presented by the evaluations on bodyguarding science, traffic safety management, fire extinguishing, secretary science, administration, psychology, sports education, sport physiology, jurisprudence and philosophy, which showed differences among groups through the multiple comparison, But there was no significant difference among the means of the groups concerned with the other curriculum, We could know that more curriculum is needed to facilitate the private bodyguarding in disciplines and system of the current theory in this study. For it is predicted the demand for the private bodyguarding will increase continuously in the future. for which we should prepare. Thus it is required to increase the theoretical curriculum of the private bodyguarding. That is. the models of curriculum like introduction to machinary guarding. introduction to communication. computer theory and so on are required to be established. In addition to that. it must be noticed that the current private bodyguarding is not guaranteed by the legitimate institution. But the private bodyguarding is related to the police service. thus the curriculum of jurisprudence and police science should be studied together.

  • PDF

ICT-oriented Training of Future HEI Teachers: a Forecast of Educational Trends 2022-2024

  • Olena, Politova;Dariia, Pustovoichenko;Hrechanyk, Nataliia;Kateryna, Yaroshchuk;Serhii, Nenko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.387-393
    • /
    • 2022
  • The article reflects short-term perspectives on the use of information and communication technologies in the training of teachers for higher education. Education is characterized by conservatism, so aspects of systematic development of the industry are relevant to this cluster of social activity. Therefore, forecasting the introduction of innovative elements of ICT training is in demand for the educational environment. Forecasting educational trends are most relevant exactly in the issues of training future teachers of higher education because these specialists are actually the first to implement the acquired professional skills in pedagogical activities. The article aims to consider the existing potential of ICT-based learning, its implementation in the coming years, and promising innovative educational elements that may become relevant for the educational space in the future. The tasks of scientific exploration are to show the optimal formats of synergy between traditional and innovative models of learning. Based on already existing experience, extrapolation of conditions of educational process organization with modeling realities of using information and communication technologies in various learning dimensions should be carried out. Educational trends for the next 3 years are a rather tentative forecast because, as demonstrated by the events associated with the COVID-19 pandemic, the socio-cultural space is very changeable. Consequently, the dynamism of the educational environment dictates the need for a value-based awareness of the information society and the practical use of technological advances. Thus, information and communication technologies are a manifestation of innovative educational strategies of today and become an important component along with traditional aspects of educational process organization. Future higher education teachers should develop a training strategy taking into account the expediency of the ICT component.

Propensity Analysis of Terrorism and Political Leaders Countermeasures (정치지도자 요인테러 성향 분석과 대응방안)

  • Kang, Kyoung Soo;Song, Sang Wook
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.287-296
    • /
    • 2012
  • This study is analysis of the existing domestic terrorism factors and suggest countermeasures for political leadership that can occur to the precautionary terror occasion of the presidential election approached 100 days in the future. Political terror caused mainly achieved peak of Ideology or social conflict by Politically alienated class. Common cause is most likely to occur when the party or the government want to attack a target or can not stand disadvantaged and lose that I suppert the party or the government. 21st century political terror is occurred with Misfits of complaints expressed or social conflict more frequency than attack used random people, new weqpon and bomb. It is interpreted that issued as a drastic measure from individual complaint because of increased polarization of wealth by separate into group and fallen law and order but also we are not familiar with the political compromises. Personal safety escort mission is essential condition of political activity that Absolute personal protection and to come up with a large number of voters for best result. Thus security guard ought to professional security activity depend on gathered situation, location and regional feature for perfect protection service.

A Study on the Psychological State of the Security Subjects of National Guard (공경호원의 경호대상자 심리상태 인지)

  • Kim, Haw-Su;Kang, Min-Wan;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.73-100
    • /
    • 2012
  • Republic of Korea for the last 2012 nuclear security summit in Seoul in three days from March 26, has held great success. This industry watchers at home and abroad through professional meetings and private organizations to promote global nuclear security was intended to draw, for the preparation of this event the most important one of the things that should be addressed at the meeting was over the top guard. The national guard of heads of state and nationally significant as the important issues should be dealt with. So who is responsible for national security summit national guard for a successful guard against participants should have a higher understanding, these stories ever to be dealt with important security subjects is the psychological state of cognition. This study is currently a source of honor to escort the psychological state of subjects, and whether the search as I looked at cognition. Qualitative research methods to conduct research in-depth interview technique was used for one of the transcribed data analysis program, a non-quantitative data were analyzed using NVivo 8. As a result of this study, analysis of the problem compared with the usual methods 39 (72.2%), fine-grained observation and 15 (27.7%), through the media how cognition 41 (73.2%), marginal help of 15 (26.7%) were. The usual comparison with how honored Issue sources to detect security of those words and actions and facial expressions, etc. Security of subjects over the state of mind cognition that he, detailed observation of the national guard to security subjects the psychological state of cognition which are pre-Thorough Information subjects that can have all the information about security and the state can be obtained by saying that. Media coverage through a cognitive approach national guard of the media coverage to understand the security subjects of the political situation to understand the prerequisite that were marginal for help through the cognitive approach of security subjects surrounding the execution of security workers, Secretary in charge of protocol and security, and be propagated through the selection techniques to be utilized was that.

  • PDF

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF