• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.022 seconds

A Study on the Resident Recognition of Common Space in Apartment (공동주택 거주자의 공유공간 인식에 대한 조사 연구)

  • Han, Min-Seung;Whang, Hee-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

The Effect of Job Satisfaction of Casino Security Employees on Organizational Commitment and Turnover Intention (카지노 시큐리티 종사원의 직무만족이 조직몰입 및 이직의도에 미치는 영향)

  • Lee, Seok-Man;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.161-184
    • /
    • 2017
  • In general, security employees are more vulnerable to the risk of various incidents and accidents due to the specificity of their work, and they are less exposed to job satisfaction due to irregular working hours such as night shifts and physical labor. There is a concern that conflicts over turnover will be intensified. Therefore, companies should pay attention to job satisfaction, organizational commitment and turnover intention through effective human resource management of security employees who have influence on company's profit creation, so that companies should strive for competitiveness and development. The purpose of this study is to investigate the effect of casino security employee's job satisfaction on organizational commitment and turnover intentions in a questionnaire survey of security employees at Grand Korea Leisure Corporation. Frequency analysis, factor analysis, reliability analysis and multiple regression analysis were performed using SPSS 24.0. As a result of this study, it can be concluded that the higher the job satisfaction of the public enterprise security workers, the higher the organizational commitment and the lower the turnover intention. Therefore, if the company has competitiveness through effective human resource management that affects the wage satisfaction, promotion satisfaction, boss satisfaction and turnover intention affecting the organizational commitment, This study can be applied in the sense that it is possible to give.

  • PDF

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

The Relationships between Social Determinants of Health and Health-related Quality of Life among the Community-dwelling Elderly (일 지역 노인의 사회적 건강결정인자와 건강 관련 삶의 질과의 관계)

  • Kim, Junghee;Lee, Hyeonkyeong;Lee, Chung Yul;Cho, Eunhee
    • Research in Community and Public Health Nursing
    • /
    • v.25 no.4
    • /
    • pp.237-247
    • /
    • 2014
  • Purpose: The purpose of this study was to examine the social determinants of health (SDH) associated with health-related quality of life (HQOL) among the community-dwelling elderly, based on the conceptual framework of the Commission on Social Determinants of Health (CSDH). Methods: A survey was conducted with 199 elders aged 65 years or older sampled through convenient sampling. Data were collected through face to face interviews by trained interviewers using a structured questionnaire, which included scales of the residential area, social support, sense of community, social network, health behaviors, and HQOL. Data were analyzed by ANOVA and stepwise multivariate regression. Results: Major SDH affecting HQOL included the participants' residential area, sense of community, and health behavior. The HQOL of the elderly residing in the B area with a low rate of basic livelihood security recipients was higher than that of those residing in other areas. Conclusion: CSDH framework was useful to determine the factors associated with HQOL among the community-dwelling elderly. In addition to their health behavior, their sense of community was found to be a SDH of HQOL, indicating the need of health promotion programs tailored to the characteristics of residential areas and strategies to enhance involvement in community activities.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

A Study on Requirements of ISPS Code - By Comparative Analysis of ISO 9001 and ISM Code - (ISPS Code의 요건에 관한 연구 - ISO 9001 및 ISM Code와의 비교분석을 통해 -)

  • 조동오;이영선
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.9 no.1
    • /
    • pp.25-31
    • /
    • 2003
  • In 1994, the International Maritime Organization (IMO) adopted the International Safety Management Code (ISM Code) as SOLAS convention to ensure the safe operation of ships and to protect marine environment from pollution In December 2002, the IMO adopted the International Ship and Port Facility Security Code (ISPS Code) in the Chapter XI-1 of SOLAS to ensure the security of ships, crew, cargo and port facility. With 1 July 2004 being the coming into effective date of ISPS Code, there is a sense of urgency among the shipping companies and port authorities to accomodate the ISPS Code. Although both the ISM Code and the ISPS Code are based on the management system concept introduced in the ISO 9001, two Codes pursue different objective. Accordingly, it is meaningful to compare and analyze the requirements of three standards. In this article, the backgrounds, principles and requirements of three standards are analyzed and presented to offer several suggestions on the establishment and implementation of security measures in compliance with the ISPS Code to the shipping industry in time.

  • PDF

Perceptions of Quality Nursing care of Patients and Families (질적 간호에 대한 환자와 가족의 지각)

  • Chi, Sung-Ai;Kwon, Sung-Bok;Park, Eun-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.4 no.1
    • /
    • pp.247-275
    • /
    • 1998
  • The purpose of this study was to offer the results of content analysis and qualitative study that explored the perceptions about quality nursing care of patients and families as consumers and to identify the implications of this study for quality nursing care management and research. The data was collected from 12 adult patients and 9 families who were admmitted at medical and surgical nursing unit of one university hospital in Seoul from October, 1996 to January, 1997. Research participants were asked to response "what do you think quality nursing care?" and similar questions during the interviews was performed. Data were analyzed using open coding and content analysis with frequencies and percents of attributes of quality nursing care. Attributes of quality nursing care and meaning of quality nursing care that patients and families perceived were explored. 1. The attributes of quality nursing care that patient and families perceived were categorized into 56 attributes. The highest response rate among the attributes was 'one's heart at ease' (76.2%), and the next high response rates were ranked in order 'consideration' , 'care about' (each 61.9% 'expert skill' (57.1%), 'deal with problem promptly' , 'information offer' (42.9%), 'intimate feeling' (38.1%), 'smile' 'service spirit' , 'do one's best' (each 33.3%), 'frequent visit' (23.8%), 'observe the time' (23.8%), 'direct nursing care' , 'speaking warmly' , give a hope' , 'address kindly' , 'a sense of duty' , 'good facilities' (each 19.0%), 'inquire after a patient health' , 'patient-centered nursing care' , 'showing an example' , 'professional knowledge' , 'careless moraly patient' , 'give encourage to patients' , 'good answer a question' (each 14.3%), 'do not imprudently' , 'do not disregard' , 'broad knowledge' , 'emergency treatment skill' , 'dependability' ,'consolation' giving a sense of security' , 'a self sacrificing spirit' , 'a sense of responsibility' 'hard - working', 'enough disposition of nursing staff (each 9.5%), 'improve patient's pride' and the rest attributes exhibited 4.7%, respectively. 2. The attributes that were identified in patients' data only were 8 categories, 'service sprit' (58.3 %) 'expert knowledge' , 'good answer a question' (each 25.0%), 'hard working' (16.7%), 'a warm character', 'professional attainments', 'do without reserve', 'satisfaction' (each 8.3%), 3. The attributes were identified to families' data only were 31 categories, 'speaking warmly' , 'direct nursing care', 'adress kindly', 'patientcentered nursing care', 'showing an example' (each 33.3%). 'do not imprudently' , 'do not disregard' , 'consolation', 'giving a sense of security', 'broad knowledge' , 'emergency treatment skill', 'dependability' ,'a self - sacrificing spirit', 'a sense of responsibility' (each 22.2%), 'improve patient's pride' , 'without discrimination' , 'show kindness' , 'individual nursing care', 'being with patient' , 'helping' , 'accuracy' , 'without any mistake' , 'love' , 'self - confidence', 'self possession', 'a self - denying spirit' , 'a sense of duty' , 'tighten discipline' , 'disposed room with similar patient to diagnosis', 'compensatory relationship between me dical team' , 'role of connection' (each 11.1 %). 4. The attributes of quality nursing care were integrated into 11 categories that they were 'patientcentered nursing care' (25.1%), 'expertise' (22.1%), 'caring'(18.1%), 'kindness'(11.1%L 'nurse attainments(10.1%), 'sincerity' (7.5%), 'good environment' (2.0%), 'effective organizational management', 'coordination', 'enough nursing staff' ( each 1.0%), 'satisfaction' (0.5%) were showed in the order of the highest rate. 5. The concept of quality nursing care were defined as 'give a satisfaction to patients by patientcentered care based on professional skill and caring with kindness and sincerity'. The description of the meaning of quality nursing care provided by this research participants, patients and families can provide important information for quality nursing care management, medical marketing, education and researches of this field. On the basis of the above findings the following recommendations are made: to suggest to utilize this results for patient care in practice setting, development of quality assessment tool in nursing care, repeat study by the same subjects and method, and to a comparative study by the same method to nurse.

  • PDF

Scalability Analysis of Cost Essence for a HA entity in Diff-FH NEMO Scheme

  • Hussein, Loay F.;Abass, Islam Abdalla Mohamed;Aissa, Anis Ben
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.236-244
    • /
    • 2022
  • Network Mobility Basic Support (NEMO BS) protocol has been accredited and approved by Internet Engineering Task Force (IETF) working group for mobility of sub-networks. Trains, aircrafts and buses are three examples of typical applications for this protocol. The NEMO BS protocol was designed to offer Internet access for a group of passengers in a roaming vehicle in an adequate fashion. Furthermore, in NEMO BS protocol, specific gateways referred to Mobile Routers (MRs) are responsible for carrying out the mobility management operations. Unfortunately, the main limitations of this basic solution are pinball suboptimal routing, excessive signaling cost, scalability, packet delivery overhead and handoff latency. In order to tackle shortcomings of triangular routing and Quality of Service (QoS) deterioration, the proposed scheme (Diff-FH NEMO) has previously evolved for end-users in moving network. In this sense, the article focuses on an exhaustive analytic evaluation at Home Agent (HA) entity of the proposed solutions. An investigation has been conducted on the signaling costs to assess the performance of the proposed scheme (Diff-FH NEMO) in comparison with the standard NEMO BS protocol and MIPv6 based Route Optimization (MIRON) scheme. The obtained results demonstrate that, the proposed scheme (Diff-FH NEMO) significantly improves the signaling cost at the HA entity in terms of the subnet residence time, number of mobile nodes, the number of DMRs, the number of LFNs and the number of CNs.

Vibration Measurements in the Mining Industry Applying the Software Install Application to the Kosovo Energy Corporation

  • Luzha, Ibush;Baftiu, Naim;Maloku, Betim;Qarkaxhija, Jusuf
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.362-370
    • /
    • 2022
  • The assessment of specific impacts on the environment is a preventive measure for environmental protection which is based on the definition and proposal of measures that can prevent harmful effects, reduce or eliminate them. In the physical sense, vibration is the oscillating motion of an object with the effect of internal or external forces applied to it. People who touch a vibrating surface or object will feel these vibrations. In general, there are two types of vibration exposure. The first are the vibrations of the hands and arms transmitted by the held parts of tools or machinery. The second are whole-body vibrations transmitted from a seat or surface to a motorized car. The risk of injury to workers exposed to vibration varies depending on the size, frequency, type, duration of exposure, and organ affected. The purpose of this paper is to review the measurements of vibrations in the Kosovo Energy Corporation in the mine Sibovc Southwest, where coal with a rotary excavator is exploited and the evaluation of vibrations for working conditions for workers working in that environment and improving working conditions for the measurement of vibrations we have used the device Minimate DS 078, the purpose of such environmental impact assessment is to collect data and predict the harmful impacts on the environment, namely the impact on water, air, soil, life and health of as well as identify and propose measures that could prevent, reduce or eliminate altogether.