• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.026 seconds

A Survey on Uniforms and Development of New Design (유니폼 실태조사 및 디자인 개선을 위한 연구(II))

  • 김경인
    • Journal of the Korean Society of Costume
    • /
    • v.33
    • /
    • pp.229-253
    • /
    • 1997
  • Uniform is getting increased importance as one of the symbols which represent the characteristics of company as well as gives good impression to the customers. Uniform shows the kinds of companies and forms of jobs and it makes the people who is putting on the uniform feel the sense of unity a security of one's position and the companion-ship and also it gives him a sense of responsi-bility and elevates the efficiency of tasks. It is required to be designed for a uniformity and it can contribute in the increase of work ef-ficiency and help the company get the good results of the management by inspiring the workers with conceit and belongingnesses. The purpose of this study is as the followings 1) Through the practical survey we analyze workers' staffs' and consumers' preference of uniform design 2) We analyze the fashion trend for 97/98 A./W 3) We present each uniform design for seven different types of company on the basis of 1) (design preference) and 2)(fashion trends).

  • PDF

Study of Hospitality Security (Hospitality Security의 학문적 고찰)

  • Kim, Hyeong-Seok;Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.37-56
    • /
    • 2018
  • Safety is considered as a very important factor when tourists select tourist spots, which means that the desire for safety in the tourism industry is very high. Therefore, a specialized field for the safety of the tourism industry is necessary. Already, there are staff members who are responsible for safety in various tourism sectors, but they have been led through knowledge based on work experience without professional education. In order to train specialists who are responsible for the safety of the tourism industry, research in related fields is indispensable, and universities in charge of research and education systematically construct surveys of related fields, and through experts I have to train. In the field meaning tourism security, there is Hospitality Security. Hospitality means 'to hospitality', 'to be entertaining', Hospitality Industry is used to cover the tourism industry in its exhaustive sense. Security is a term that refers to safety and security. Therefore, Hospitality Security which the two meanings together, that is, korean word hospitality security, tourism security can be said. Already in the US experts in the field of Hospitality Security explained the importance through related books. Currently in Korea, well-known tourism related universities operate subjects in the Hospitality field, and the security field also manages subjects at several universities. So, We collected the subjects managed at each university, analyzed them, and selected subjects of Hospitality Security. If the results of research through continuous research accumulate, the value as academic will be further increased, and it will be possible to have a role responsible for the safety of the tourism industry by producing experts accordingly.

Secure Oblivious Transfer Protocol-based Digital Fingerprinting Against Conspiracy Attack (공모 공격에 안전한 불확정 전송 프로토콜 기반의 디지털 핑거프린팅 기법)

  • 최재귀;박지환;김태석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.145-153
    • /
    • 2004
  • Digital fingerprinting schemes are cryptographic methods that a seller can identify a traitor who illegally redistributed digital contents by embedding it into buyer's information. Recently, Josep Domingo-Ferrer suggested an anonymous digital fingerprinting scheme based on committed oblivious transfer protocol. It is significant in the sense that it is completely specified from a computation point of view and is thus readily implementable. But this scheme has the serious problem that it cannot provide the security of buyers. In this paper, we first show how to break the existing committed oblivious transfer-based fingerprinting schemes and then suggest secure fingerprinting scheme by introducing oblivious transfer protocol with two-lock cryptosystem based on discrete logarithm. All computations are performed efficiently and the security degree is strengthened in our proposal.

Pilot Case for Container Security Device (CSD) Based on Active RFID

  • Lee, Eun-Kyu;Moon, Young-Sik;Shin, Joong-Jo;Shon, Jung-Rock;Choi, Sung-Pill;Kim, Chae-Soo;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.238-243
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/ humidity/ shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the frequency used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Nyang, Dae-Hun;Chang, Beom-Hwan;Lee, Dong-Hoon;Lim, Jong-In
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.235-244
    • /
    • 2012
  • An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

Effect of Passion to Motivation on Major Students for Security Martial Arts (경호무도 전공생의 동기가 열정에 미치는 영향)

  • Kim, Dong-Hyun;Im, Tae-Hee
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.37-58
    • /
    • 2015
  • The purpose of this study was to verify the effect of passion on major students for security martial arts. Participants were selected 393 undergraduate students who study security martial arts. Sampling was used by purposive sample method. Measurements were used with multi-dimensional passion and motivation scales. Statistic was executed descriptive statistics, exploratory factor analysis, Pearson's correlation and multiple linear regression. The results of this study were as follows: First, motivation of student for security martial arts has influencing relationship with harmonious passion. Second, motivation has influencing relationship with obsessive passion. Third, motivation has influencing relationship with sense of unity. Forth, motivation has influencing relationship with preference of passion. Fifth, motivation has influencing relationship with value of passion. Sixth, motivation has influencing relationship with investment of passion. That is, internal motivation such as giving value and inner satisfaction gives positive effect to passion above mentioned factors but a motivation gives negative effect to passion.

  • PDF

Relation of Social Security Network Building, Civil Culture and Community Unity (사회안전망구축과 시민문화 및 지역사회결속의 관계)

  • shin, Sang-Tae;Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.59-70
    • /
    • 2015
  • This study aims at exploring relation of social security network building, civil culture and community unity. To achieve the purpose, this study selected the general citizens in Seoul Region (Gangdong, Gangseo, Gangnam and Gangbuk) from Jul. 15 to Sept. 15, 2014 as population and sampled 400 people using cluster random sampling. Excluding unhonest data, the number of cases used for the final analysis is 337 people. The collected data were analyzed for the study purpose using SPSSWIN 18.0, as statistical techniques, factor analysis, reliability analysis, correlation analysis, t-test, one-way ANOVA, multiple regression analysis, path analysis etc. were used. First, social security network building has an effect on civil culture. That is, the more activated voluntary crime prevention activity, the higher order law-abiding spirit. The more activated local government security education, police public order service, the higher awareness of participation becomes. First, social security network building has an effect on civil culture. That is, the more activated voluntary crime prevention activity, the higher order law-abiding spirit. The more activated local government security education, police public order service, the higher awareness of participation becomes. The more activated voluntary crime prevention activity, street CCTV facilities, police public order service, the higher tolerance spirit becomes. On the contrary, street CCTV facilities reduce citizens' autonomy. Second, social security network building has an effect on community unity. The more activated street CCTV facilities, police public order service, crime prevention design, the higher a sense of stability becomes. The more activated local government security education, police public order service, crime prevention design, the higher awareness of community becomes. The more activated voluntary crime prevention activity, government security education, police public order service, crime prevention design, the higher community institution becomes. Third, civil culture has an effect on community unity. That is, the more activated awareness of community, tolerance spirit, the higher a sense of stability, awareness of community and community system become. Fourth, social security network building has an effect on civil culture and community unity. That is, social security network building has a low effect community institution directly, but if civil culture is enhanced through social security network building, then it has a high effect on community unity.

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

Application Of Information Technologies In Network Mass Communication Media

  • Ulianova, Kateryna;Kovalova, Tetiana;Mostipan, Tetiana;Lysyniuk, Maryna;Parfeniuk, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.344-348
    • /
    • 2021
  • The article examines one of the most important means of visualization of mass information on the Internet - information graphics in the broadest sense of the term as a visual technology for presenting mass information. The main objectives of the article are to determine the genre-typological features of infographics and basic technological principles; identification of features of creation and use of information graphics in modern network. Certain benefits of online infographic editors include savings in resources and time. They allow the user, who has basic PC skills, to create standardized infographics based on their own data. In addition, the use of online services develops visual thinking, allows you to get an idea of quality criteria and current trends in infographics, as well as to gain initial experience in the visual presentation of data.