• Title/Summary/Keyword: Security major

Search Result 1,282, Processing Time 0.032 seconds

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

Situation Analysis and Education Plan of Security Ethics for Training College Students Majoring in Information Security (정보보안전공 대학생을 위한 보안 윤리의식 분석 및 교육 방안)

  • Kim, Tae-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.596-605
    • /
    • 2017
  • Recently, it has been pointed out that the lack of professional ethics of computer and security experts is serious as college students majoring in information security and insiders who are in charge of security work are involved in crimes after being tempted to cyber crimes. In this paper, we investigate and analyze the security ethics awareness and education situation of college students majoring in information security, and examine the security ethics education method for human resource development with personality and qualities. As the information society becomes more widespread, the ethics and occupational consciousness of the university students who are majoring in information security are recognized as lack of awareness and education about security ethics, As a solution to solve these problems, it is expected that it will be possible to nurture security experts who are aware of their vocation through the educational plan to enhance the security ethics of the information security major college students. According to the security ethics education system proposed in the paper, the security ethical consciousness of the group that received education was remarkably improved.

Security Policy Issue in Application Software Development Process of Smart Phone Environment (스마트폰 환경의 응용 소프트웨어 개발과정에서 보안정책 이슈)

  • Hong, Jin-Keun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.319-324
    • /
    • 2012
  • The application software, which is developed on smart phone environment, is applied to according to system development methodology. This paper presents security consideration, that is required to major application program, which is developed in smart phone environment. First it reviews security issues in application program, and the next it considered to security policy for secure application program.

Preventive Control for Transient Security with Generation Rescheduling Based on Rotor Trajectory Index

  • Verma, Kusum;Niazi, K.R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.465-473
    • /
    • 2015
  • The increasing need to improve transient security assessment of existing or forecasted operating conditions of networks by power system operators is major concern of the power system security monitoring problem at the Energy Management Systems. This paper proposes a preventive control of transient stability with generation rescheduling based on rotor trajectory index obtained using time domain simulations. This index may help power engineers in making operational decision and to obtain a generation configuration with better transient security dispatch. The effectiveness of the proposed methodology is demonstrated on IEEE 39-bus New England system for a three phase fault at different loading conditions with single and multiple line outage cases.

Certificate Revocation Scheme using MOT Protocol over T-DMB Infrastructure

  • Kim, Hyun-Gon;Kim, Min-Soo;Jung, Seok-Won;Seo, Jae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1583-1590
    • /
    • 2011
  • A Certificate Revocation List(CRL) should be distributed quickly to all the vehicles for vehicular communications to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a Multimedia Object Transfer(MOT) protocol based on CRL distribution scheme over T-DMB infrastructure. To complete the proposed scheme, a handoff method, CRL encoding rules based on the MOT protocol, and relative comparison are presented. The scheme can broaden breadth of network coverage and can get real-time delivery with enhanced transmission reliability. Even if road side units are sparsely deployed or, even not deployed, vehicles can obtain recent CRLs from T-DMB infrastructure effectively.

Framework Design of Voltage Security Assessment(VSA) using QSS Analysis method (QSS 해석 기법을 이용한 Voltage Security Assessment(VSA) 프로그램 기반설계)

  • Hur, Jin;Lee, Sang-Ho;Kim, Tae-Hyun;Moon, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.12-14
    • /
    • 2005
  • Security problem has been a fundamental issue in the operation and planning of power system. Voltage instability is widely recognized as an important issue of power system blackout. As far as real-time operation is concerned, there is a need for appropriate tools to identify dangerous contingencies, assess security margins and suggest corrective actions. In this paper, we propose the framework design of Voltage Security Assessment(VSA) using QSS(Quasi Steady-State) analysis method in order to implement fast time domain simulation engine as a major part of VSA.

  • PDF

Perception of Family Security and Satisfaction of Family Life : By the type of Self-Support of Newly Married Household (도시신혼기가계의 가정경제안정도인지와 가정생활만족도 -가정경제 자립유형을 중심으로-)

  • 임정빈
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.2
    • /
    • pp.1-18
    • /
    • 1995
  • The purpose of the study was to examine the type of self supporting economically, and the relation with the type of self-supporting, perception of family financial security and satisfaction of family life. The data was collected from newly married housewives and major findings are as follow: 1. The type of self-support was about 50% of subjectives, the housewives of this type relatively older, higher income, and they are lower in intimacy with husband's family, perception of financial security and satisfaction of family life. 2. The type of support was 30% of them, they are relatively older, higher educated, and higher income level. They are medium in intimacy with husband's family, and satisfaction of family life, but they percept financial security very highly 3. The type of dependence was relatively younger, very high educated. they are closed with husband's family, satisfied with family life, but not in perception of financial security.

  • PDF

The Relationship between Mothers' Parenting Behavior and Prcschoolers' Attachmcnt Security and Social Compctence. (어머니의 양육행동과 유아의 애착 및 사회적 능력과의 관계)

  • 박응임
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.3
    • /
    • pp.117-130
    • /
    • 1998
  • The purpose of this study was to investigate the relationship between mothers' parenting behavior and preschoolers' attachment security to their mother and preschoolers' social competence. The sample were 44 mothers and their 49-56 months old preschoolers. The instruments for this study were the modified IPBI(Iowa Parent Behavior Inventory: Mother Form), the Attachment Q-set by Waters and the modified ISCS(Iowa Social Competence Scales: Preschool Form). The data were analyzed by frequency, t-test, Pearson's r, and Multiple Regression Analysis. Major findings were that the responsive maternal parenting behavior was positively related to the preschoolers' attachment security. The guidance of maternal parenting behavior was positively related preschoolers' social activator of social competence. And there were significant correlations between the preschoolers' attachment security and social competence. The attachment security was positively related to the socially activating and cooperative competence.

  • PDF

Trends of Intelligent Public Safety Service Technologies (지능형 치안 서비스 기술 동향)

  • Bang, J.S.;Park, W.J.;Yoon, S.Y.;Sin, J.H.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.111-122
    • /
    • 2019
  • As society develops, the demand for safety and security services increases. Developed nations such as the United States use advanced technology to lower crime rate and promote intelligent security services. First, this article examines intelligent systems that are used for monitoring and detecting crimes and dangerous situations. Recently, we have been studying technologies that enable preemptive responses through prediction of crime and hazardous situations. In this paper, we examine the cases of security services based on a crime/risk prediction model and explain the structure and major technologies of an intelligent security system. In addition, we propose a direction for technological development for achieving future security services.