• Title/Summary/Keyword: Security law

Search Result 893, Processing Time 0.023 seconds

On Study is to Presidential Security Service in Korea and U.S Secret Service (한국과 미국의 국가원수경호조직 비교연구)

  • Min, Jea-Gi;Kim, Kye-Won
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.127-153
    • /
    • 2004
  • On Study is to presidential security service in Korea and U.S Secret Service. U.S Secret Service give emphasis a right of a people. This become the center of attention that Special Agent enforced comprehensive authority with Law enforcement, intelligence, security. Presidential security service in Korea emphasis a threat of North Korea in the past. but recent circumstances changed a threat of terrorism based Islamic Fundamentalism and emphasis a right of a people. You can't overemphasize the value of this point.

  • PDF

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

China's recent establishment of its ADIZ and its implications for regional security (중국의 방공식별구역(ADIZ) 선포와 역내 안보적 함의)

  • SHIN, Chang-Hoon
    • Strategy21
    • /
    • s.33
    • /
    • pp.148-177
    • /
    • 2014
  • The regional security and stability in Northeast Asia has become more complicated because of a sudden establishment of China's Air Defense Identification Zone (ADIZ) on 23 November 2013. One dimensional conflicts on the territorial sovereignty over the islands between the regional States has developed into the two dimensional conflicts like maritime delimitations among the States concerned since they have all ratified the 1982 United Nations Convention on the Law of the Sea which adopts the 200 nautical mile Exclusive Economic Zone regime. Moreover, due to the notion of the outer limit of the continental shelf, the conflicts have developed into three dimensional ones in order to acquire more natural resources even in the seabed. To make matters worse, such three dimensional conflicts have expanded to the airspace as well. The paper will analyze what implications the sudden declaration of China's ADIZ have for the regional security in Northeast Asia from the perspectives of public international law. To this end, the paper 1) starts with the debates on the legal nature of the ADIZ, 2) identifies the Chinese government's political motives for the establishment of the ADIZ over the East China Sea, 3) assesses the responses of the regional States and the USA to the China's establishment of the ADIZ, and then 4) discuss what implications the overlapped ADIZ of the three key States in the region have for the regional security and stability.

Research trend analysis of the introduction at the issue of private investigation institution (민간조사제도 도입시 쟁점에 대한 연구동향 분석)

  • Seo, Jin-Seok
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.11-19
    • /
    • 2015
  • This paper, so far to analyze the research trends in the issue that has been discussed for the introduction of private investigation institutions, by projecting its suggestion, want the investigation purpose of presenting the desirable introduction direction. The analyzed issue was extracted for existing research material on the introduction of private investigation institutions. Investigators pointed out issue is the name, business scope, corporate, qualification system (eligibility criteria and test), education, association establishment, regulatory agencies, has been included in the eight categories such as legislation form. For the name, I think there is a need to unify under the name "detective". For the scope of work, the amendment is difficult law, place an overview of the general business rules, more specific and detailed investigation business content, to discipline through the ordinance it is possible to be rational. Private investigation institutions, I think the need for limited operations of the corporation. For education, the new education and re-education on a regular basis I do for the private investigation workers. You must be one of the National Police Agency to the management authority. Legislative form, not to be defined by its own law, the revision of the security law, but that is to complement the provisions for private sector research system is effective.

Differentiation of Legal Rules and Individualization of Court Decisions in Criminal, Administrative and Civil Cases: Identification and Assessment Methods

  • Egor, Trofimov;Oleg, Metsker;Georgy, Kopanitsa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.125-131
    • /
    • 2022
  • The diversity and complexity of criminal, administrative and civil cases resolved by the courts makes it difficult to develop universal automated tools for the analysis and evaluation of justice. However, big data generated in the scope of justice gives hope that this problem will be resolved as soon as possible. The big data applying makes it possible to identify typical options for resolving cases, form detailed rules for the individualization of a court decision, and correlate these rules with an abstract provisions of law. This approach allows us to somewhat overcome the contradiction between the abstract and the concrete in law, to automate the analysis of justice and to model e-justice for scientific and practical purposes. The article presents the results of using dimension reduction, SHAP value, and p-value to identify, analyze and evaluate the individualization of justice and the differentiation of legal regulation. Processing and analysis of arrays of court decisions by computational methods make it possible to identify the typical views of courts on questions of fact and questions of law. This knowledge, obtained automatically, is promising for the scientific study of justice issues, the improvement of the prescriptions of the law and the probabilistic prediction of a court decision with a known set of facts.

A Study on the Data Basic Law and the Personal Information Security Issue (데이터 기본법과 개인정보보호 이슈에 관한 고찰)

  • Kim, Jong-Won;Park, Jin-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.9-11
    • /
    • 2022
  • In order to sustain and revitalize the fourth industrial revolution and data economy, the world's first 'data basic law' has been enacted and implemented in Korea.,However, the law prioritizes the activation of data industry and the activation of data production, distribution and use that deals with the protection of data assets, so it can be applied and interpreted more than the Personal Information Protection Act or the Copyright Act.,In this paper, the main contents of the data basic law are examined and the personal information issue is considered.

  • PDF

A Study on the Law2Vec Model for Searching Related Law (연관법령 검색을 위한 워드 임베딩 기반 Law2Vec 모형 연구)

  • Kim, Nari;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1419-1425
    • /
    • 2017
  • The ultimate goal of legal knowledge search is to obtain optimal legal information based on laws and precedent. Text mining research is actively being undertaken to meet the needs of efficient retrieval from large scale data. A typical method is to use a word embedding algorithm based on Neural Net. This paper demonstrates how to search relevant information, applying Korean law information to word embedding. First, we extracts reference laws from precedents in order and takes reference laws as input of Law2Vec. The model learns a law by predicting its surrounding context law. The algorithm then moves over each law in the corpus and repeats the training step. After the training finished, we could infer the relationship between the laws via the embedding method. The search performance was evaluated based on precision and the recall rate which are computed from how closely the results are associated to the search terms. The test result proved that what this paper proposes is much more useful compared to existing systems utilizing only keyword search when it comes to extracting related laws.

A Study on the Legal and Institutional Improvement Plan for Cyber Correspondence (사이버 대응태세 구축을 위한 법·제도적 개선방안 연구)

  • Lee, Yong Seok;Lim, Jong In
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.61-66
    • /
    • 2019
  • Cyber space is a place where free activities are guaranteed. However, it is also true that not all individuals and countries strive for peaceful cyberspace, and that there is a growing tendency to gain unfair advantage through this space. Therefore, the state should reform laws and institutions to keep cyberspace safe. By establishing the "Basic Law on Cyberspace" which includes the law of the state law on cyberspace, it is necessary to be able to recognize and respond to the direction of the national legal discipline on cyberspace. The development of digital forensics is an urgent task due to the rapid development of IT. However, if the law is delayed for various reasons, some of the existing laws should be amended to improve the stability of the law in accordance with the circumstances. To this end, it is necessary to revise the "Information and Communication Infrastructure Protection Act", "Information and Communication Network Enhancement and Information Protection Act", "Integrated Defense Law", "Establishment of Defense Information Infrastructure Infrastructure and Defense Information Resource Management Act".

System for Supporting the Decision about the Possibility of Concluding the Civil Law Agreements for Medical, Therapeutic and Dental Services

  • Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Shteinbrekher, Daria;Kysil, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.155-164
    • /
    • 2022
  • The review of known decisions showed that currently there are no systems and technologies for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services. The paper models the decision-making support process on the possibility of concluding the civil law agreements for medical, therapeutic and dental services, which is the theoretical basis for the development of rules, methods and system for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services. The paper also developed the system for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services, which automatically and free determines the possibility or impossibility of concluding the corresponding civil law agreement for the provision of a corresponding medical service. In the case of formation of a conclusion about the possibility of concluding the agreement, further conclusion and signing of the corresponding agreement takes place. In the case of forming a conclusion about the impossibility of concluding the agreement, a request is made for finalizing the relevant agreement for the provision of the relevant medical service, indicating the reasons for the impossibility of concluding the agreement - missing essential conditions in the agreement. After finalization, the agreement can be analyzed again by the developed system for supporting the decision.