• Title/Summary/Keyword: Security Workers

Search Result 336, Processing Time 0.031 seconds

A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards (「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구)

  • Noh, Jin Keo;Choi, Kyung Cheol;Lee, Young Ho
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.143-167
    • /
    • 2018
  • According to the Security Services Industry Act security guards are not just workers but security-related service workers complementing the lack of police force and specializing in protecting of national important facilities, industrial facilities and apartment houses. Nevertheless, confusing or mixing the security service workers in "Security Services Industry Act" with the guards in the "Act on the Protection etc. of Temporary Agency Workers" lead to a constant debate about the scope of work of security guards. In the case of security service workers in "Security Services Industry Act" there is a strict limitations on security service worker's qualification such as strict reasons for disqualification, a need to pass training for new workers and qualification training, a need to report to the competent chief police officer if the security guard has placed or unplaced by the security service company. It distinguishes security service workers in "Security Services Industry Act" from the guards in the "Act on the Protection etc. of Temporary Agency Workers" and acknowledges the occupation of security service worker as a professional service worker. Therefore, security service workers in "Security Services Industry Act" shouldn't be obliged to do any other work than security work. If it is required to do other work than security work contract by the "Security Services Industry Act" doesn't apply but need to use a security guard according to "Act on the Protection etc. of Temporary Agency Workers" or hire a security guard on the employment contract. In this way, when security service workers in "Security Services Industry Act" are recognized as professional security related workers, the entire security industry can ultimately develop.

Survey of Perception about Security Works (경비업무에 대한 경비요원 인식 조사)

  • Park, Jeong-Hun;Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.143-155
    • /
    • 2008
  • Purpose of this study is to analyze actual perception of security business of security workers centering on employees working within building and to improve accomplishment of works for security workers. For this, first, activities of security workers are discussed. Second, perception of employees of companies for the necessity of security workers, non-necessity of security workers, qualification requirements of security workers for improving business recognition were established as a framework of the study. Changes for recognition of security works in modern life are a little falling behind compared to unstopping economic development and diversifying job classifications. Even at present, expression of security works is still regarded as manager of facilities or apartments in the past. In other words, it is recognized as a simple change of title and names from apartment guard to security workers. Security works in the modern job classification is settling down as a professional field of facility management and as a part of various controls such as protection and security and its field is also expanding. It is a professional job with the purpose to analyze and prevent diverse criminal actions occurring in the society and also to introduce alternative measures with the role to prevent accidents to be occurred in variety in advance instead of simple working format taking a fixed guard post. Area of security works for the purpose of maximizing necessity of security works shall have equipped with deployment of professional security workers, consideration of business satisfaction of security workers, prevention education for rapidly changing safety accidents, and substantiality in the field. We expect to have more sophisticated area of security works with ceaseless efforts and with instillation of recognition of professionalism by security workers themselves.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Effect of Job Characteristics on Trait Anxiety and Task Performance of Private Security Workers (민간경비업 종사자의 직무특성이 특성불안 및 과업수행에 미치는 영향)

  • Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.306-315
    • /
    • 2011
  • The study defines the job characteristics anxiety of the private security workers and the effect of the performance. While the study selected the private guards working at the private security companies registered at the National Police Agency in Seoul 2011 and sampled total 300 people by using the judgment sampling method, the final input case number is 266 people. The study used alpha value of the reliability analysis and the maximum-likelihood classification of the covariation structure analysis in order to verify the validity of the survey and the reliability. With the research method and the process the result of the study is as follows. First, the task importance of the private security workers affects the minus influence to the characteristic anxiety. Second, the feedback of the private security workers affects the minus influence to the characteristic anxiety. Third, the job autonomy of the private security workers affects the minus influence to the characteristic anxiety. Fourth, the feedback of the private security workers affects the plus influence to the task performance. Fifth, the job autonomy of the private security workers affects the plus influence to the task performance. Sixth, the skill variety of the private security workers affects the plus influence to the task performance. Seventh, the characteristic anxiety of the private security workers affects the plus influence to the task performance.

A Security Protection Framework for Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.538-547
    • /
    • 2016
  • Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.

An Analysis of Compliance with Information Security Policy Effects on Information Security Ability and Behavior : Focused on Workers of Shipping and Port Organization (정보보안정책 준수가 정보보안능력 및 행동에 미치는 영향 분석 : 해운항만조직 구성원을 대상으로)

  • Kang, Dayeon;Chang, Myunghee
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.1
    • /
    • pp.97-118
    • /
    • 2014
  • Recent accidents of customer information leakage increase the necessity of information security for organization and the importance of information security team for it. To strengthen information security, organizations make information security policy and ask the members to comply with it. In this regard, maritime organization also needs to structure information security policy and examine its ability and behavior. The purpose of this study is to analyze the effects of compliance with information security policy on the ability and behavior of workers in shipping and port organization. The results of investigation show that information security education and norm affect compliance with information security of the workers. On the contrary, the punishment of information security is insignificant. It is shown that the degree of compliance with information security significantly affects its ability and behavior of the workers in shipping and port organization.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

Study on the Difference of Body Composition, Metabolic Factor, and Blood Components according to Job Form and Stress Level for Security Guard Workers (경호업 종사자의 직무형태와 스트레스 수준에 따른 신체구성, 대사적 변인, 혈액성분의 차이 연구)

  • Kim, Kyong-Tae;Lee, Chang-Han
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.1-14
    • /
    • 2010
  • The purpose of this study was to analyze the difference of body composition, metabolic factor, and blood components according to job forms which are job period and job type and stress level for security guard workers. The conclusion is as follows. 1. There were lower level for the body fat with short term and higher level for the lactate with long term according to the job period. 2. There were lower level for the body fat with the field service and higher level for the lactate and stress with the field service according to the job type. In conclusion, it needs to have a continuous physical activity behavior for the security guard workers to manage for their effective health and to have a rest for the field service workers to decrease their physical and mental stress.

  • PDF

A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers (정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구)

  • Kim, Geunhye;Park, Kyudong;Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.451-463
    • /
    • 2019
  • The purpose of this study is to identify the effects of organizational conflict stages and job withdrawal intention of information security organizations. We applied Pondy's conflict theory and analyzed the case of information security workers in public enterprises. We found that the more information security workers emotionally accept the potential factors of organizational conflict, the higher the intention of job change of information security practitioner. On the other hand, the perception mechanism has a moderating effect of lowering the job change-out probability. The result of this study is expected that the manager of the organization will be able to utilize the conflict in the organizational direction.

Factors Influencing on the Compliance of Information Security Policy of Workers of Shipping and Port Organization (해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.1-23
    • /
    • 2012
  • Advances in information technology has brought many benefits to businesses, but at the same time, businesses are facing serious problems caused by its use such as information leakage. In order to cope with problems, companies have established information security policies, demanding workers of a company to be compliant with the policies. This study proposes a research model that includes information security awareness, information security attitude, self-efficacy, standard belief and social influences as factors that affect the compliance of information security policy among the workers of shipping and port organization. The results of this study showed that there was a positive relationship not only between the information security awareness and the information security attitude, but also between the information security attitude and the information security policy among the workers of shipping and port organization. It was also found that there was a positive relationship between the self-efficacy and the compliance of information security policy, and between the social influence and the compliance of information security policy. However, there was no meaningful relationship between the standard belief and the compliance of information security policy. This study examined to what extent the workers of shipping and port organization that have a high possibility of the information leakage were compliant with the information security policy. The findings will contribute to organizations of shipping and port who attempt to establish strategies related to information security.