• Title/Summary/Keyword: Security training

Search Result 977, Processing Time 0.029 seconds

The Use of Electronic Educational Resources in Training Future Specialists in Higher Education Institutions

  • Olha Karaman;Olha Duke;Volodymyr Shkavro;Olena Polinok;Nataliia Didenko
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.135-140
    • /
    • 2024
  • The main purpose of the study is to determine the key aspects of the use of electronic educational resources in the training of future specialists in higher education institutions. The importance of using electronic educational resources in the preparation of university students is proven. The relevance of the chosen topic is due to the high rise of globalization in the process of training future specialists in higher education institutions. The theoretical and methodological basis of the article is the fundamental and modern provisions of the theory, the work of scientists and specialists in the management of electronic educational resources in the field of education. Based on the results of the analysis, the main characterizing aspects of the use of electronic educational resources in the training of future specialists in higher education institutions were identified. Further research needs to analyze new, experimental electronic means in the system of student training.

University Students Impact of Martial-Arts Training on Self-Realization among Security Majors (경호전공 대학생의 무도수련이 자아실현에 미치는 영향)

  • Son, Sung-Rak;Jung, Sung-Suk;Wang, Sug-Won;Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.101-118
    • /
    • 2008
  • The subjects in this study were 500 students who were selected from a population that consisted of security majors who took courses in martial arts in four different four-year-course universities. After a survey was conducted, the answer sheets from 451 students were analyzed except 49 incomplete ones. The collected data were analyzed with SPSS Ver. 12.0 program. Frequency analysis, t-test and one-way ANOVA were utilized, and LSD and regression analysis were employed to make a post-hoc comparison. All the hypotheses formulated in this study were verified at the a=.05(Chronbach's alpha) level of significance. The findings of the study were as follows: First, as for relations between demographic characteristics and self- realization, the college students investigated were statistically different according to gender in three subvariables of self-realization that included ability development, ability display and attainment of ideal. Age and academic year made a significant difference to their ability development and attainment of ideal, and they differed statistically significantly in terms of ability development according to black lebel test. Second, concerning connections between the degree of martial-arts training and self-realization, training term, one of the subvariables of the degree of martial-arts training had a positive correlation to their ability development and attainment of ideal at the 5% level of significance, and training time was positively correlated to their ability development at the 5% level of significance. Third, training term, one of the subvariables of the degree of martial- arts training, had an impact on ability development, and that exerted a firsthand influence on attainment of ideal as well.

  • PDF

Secure Object Detection Based on Deep Learning

  • Kim, Keonhyeong;Jung, Im Young
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.571-585
    • /
    • 2021
  • Applications for object detection are expanding as it is automated through artificial intelligence-based processing, such as deep learning, on a large volume of images and videos. High dependence on training data and a non-transparent way to find answers are the common characteristics of deep learning. Attacks on training data and training models have emerged, which are closely related to the nature of deep learning. Privacy, integrity, and robustness for the extracted information are important security issues because deep learning enables object recognition in images and videos. This paper summarizes the security issues that need to be addressed for future applications and analyzes the state-of-the-art security studies related to robustness, privacy, and integrity of object detection for images and videos.

A Study of the Security and Secretary Service's Roles (경호비서의 역할에 관한 연구)

  • Kim, Jung-Suk;Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.65-80
    • /
    • 2006
  • Security and Secretary Service is the man who maintains safe condition of boss', following him during all daily schedule and help the boss display his supreme business abilities, settling various affairs The purpose of this study is to examine the role of Security and Secretary Service. To understand the role of Security and Secretary Service, interviews with Security and Secretary Service's. synthesizing records inquire and interviews with present workers, was analyzed. As results of the study, the open coding of grounded theory was 85 categories, 22 lower categories, and 13 upper categories; 7 roles of Security and Secretary Service types out of 13 upper categories were attained. Based on this, from the axial coding a paradigm model related to categories was produced and selective coding the core category, story line development and type were analyzed. Therefore, Security and Secretary Service plays roles: Office manager, Training manager, Information manager, Customer relations manager, Facilitator, Health manager, and Safety manager. Compared with Office secretary, It is said that Health manager, and Safety manager are distinguishing roles. Through the coding process based on grounded theory. For this, based on the writer's theoretical sensitivity and constant comparative analysis, theses as well as writing in each field, data from serial publications and others, the statements of interview subjects were constantly compared and analyzed. Based on these analyses, this study suggests the following: First, the intimidate sample survey is need. Second, professional educational content during the training process of Security and Secretary Services should be strengthened. Third, to expect a more professional role of Security and Secretary Services. the systematic support will be required.

  • PDF

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.

Study on the application of VR/AR technology to the future ROK Army Synthetic Battlespace Training System (미래 육군합성전장훈련체계에 VR/AR 기술 적용방안 연구)

  • Jong-Hoon Lee;Junwook Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.189-197
    • /
    • 2023
  • The Republic of Korea Army (ROK Army) is currently developing the Army Synthetic Battle Training System (ASBTS) by 2026 and will use it to advance division-level LVC integrated training. This study proposes a way to improve the effectiveness and efficiency of training by applying VR/AR technology to the ASBTS. To this end, we analyzed cases of VR/AR technology use in the defense field in advanced countries and the ROK military. As a result, we confirmed that the effectiveness and efficiency of training can be improved when the training system is converted to an immersive system. Accordingly, we selected and presented defense training subjects to be applied to VR/AR technology, considered the development direction for applying VR/AR technology to the ASBTS, and proposed a way to apply VR/AR technology to the ASBTS.

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

A Study on development of special security service (특수경비업무 발전방안에 관한 연구)

  • Ha, Jung-Hoon
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.35-56
    • /
    • 2016
  • The purpose of this study is to find the development of the special security business plan based on the problem that guards are now aware of special security service. In order to achieve the objectives of this study, we analyzed the data after expert survey and interview conducted by seven experts engaged in special security services more than 10 years. The guard who perform special security service proposed a development plan of special security services as follows. First, the current education system for new employees' training is required to improve the educational program of 60 hours in subjects related to special security duties by reorganization. Second, the special security service training for guards also appropriate to switch to 9-hour training program for three months through an educational organization controlled by country. Third, the special security guards should be proceeding the practical programs required in the field and quality education in the different section by competent and professional instructors. Fourth, the retirement age for special security guard stipulated in the Security Services Industry Act that needs to be readjusted upward by considering the social environment. Sixth, there needs to be organized the Special Security Association for development associated with the special security service and to protect the rights of special security guards.

  • PDF

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.