• Title/Summary/Keyword: THREAT

Search Result 2,855, Processing Time 0.03 seconds

Study on the Security Officials in the Study of the Working Environment and Education (경호공무원의 근무환경과 교육에 관한 연구)

  • Jo, Sung-Gu;Kim, Dong-Je;Choi, Jong-Gwang;Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.247-268
    • /
    • 2013
  • Country is security agencies with the launch of the Park Chung Hee government president security service act was enacted since installed successfully now undergoing a large-scale international events reborn professional Security agencies, including the North and the Northeast, but the conflict continues because of the national reduce the threat to the security without a destination. However countermeasures against these threats is emphasized, but in an effort to raise the country is security officials security agencies working environment and training for these studies have not performed in this study was started. In order to achieve this purpose, president security service and the seoul police agency personnel working in the field for 45 people who were interviewed, recently developed by utilizing Nvivo 8 program to improve working conditions in the analysis of organizational culture 51(78.46%), Image 7(10.93%), physical and mental 6(9.37%) were categorized, educational institutions in the direction of a police constable 56(76.71%), educational psychology 12(16.43%), theory of education 5(6.84%) were categorized as high. We look at the research results suggest that the authority of the president security service president security service officials in tissue culture officials were struggling to belong to an organization, you need to induce a change in culture has been raised, the current president of the Security Service, as well as specialized police constable training within the organization establish the necessary institutions respectively.

  • PDF

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

Counter-Terrorism Policy of Mongolia: Raising Awareness on Terrorism (몽골의 대테러 정책: 테러인식 제고)

  • Urangoo, Khash-Erdene;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.155-173
    • /
    • 2019
  • This study touches upon the challenges of globalization, in which terrorism is one of the most brutal forms of criminal violence targeting innocent people. No country is immune from terrorist attacks, and no person is immune from becoming a victim. Interest in this topic is increasing as terrorism, in all its forms and manifestations, in its scale and intensity, and in its inhumanity and cruelty, is now becoming one of the most acute and pressing problems of global importance. Legal regulations passed in Mongolia in 2004 have established a structure to prevent and detect terrorist threats. However, the country's anti-terrorism policy should be improved with respect to its global counter-terrorism strategy. Because Mongolia is a comparatively safe country in the region, the people do not consider terrorism to be a real threat. This study aims to suggest methods to quickly raise awareness and create a security culture to improve Mongolia's long-term terrorism prevention policy. In particular, the authors review Mongolia's anti-terrorism policy, focusing on legal regulations, and suggest education methods to raise terrorism awareness for the public as a primary preventive measure. The study also presents a comparative analysis and a summary conclusion by examining international legal acts, conventions on new manifestations of terrorism, the foundations of laws and regulations of Mongolia, and related research on terrorism.

A Study on the Establishment of Anti-Drone Concept and Effective Response System (안티드론 개념 정립 및 효과적인 대응체계 수립에 관한 연구)

  • Lee, Donghyuk;Kang, Wook
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.9-31
    • /
    • 2019
  • Due to the development of technology and popularization of drone, the so-called "dirty drone" that exploits drones for crimes and terrorism has become a social problem, and it is time to seriously consider the "revenge of drones." Indeed, the cases of threats posed by drones are expanding not only to threats to ground facilities, but also to aviation safety threats, more recently to large-scale events, demonstrations and crimes targeting specific personnel, and terrorism. This research clearly defined the concept of anti-drone when it emerged as a new type of social safety threat as it was abused in crime and terrorism, while response to it was not enough yet. Through this process, it was intended to present an effective anti-drones system. We analyzed the major controversial elements of anti-drone, and defined them as "comprehensive response activities at the legal, institutional and technical levels performed by law enforcement agencies, related technology and industrial entities in a way that prevents, detects, and blocks acts that violate public well-being and order, such as crimes and terrorism caused by the drones." To effectively respond to dirty drones, the authority of law enforcement agencies and the enactment of relevant laws were proposed. In the future, a comprehensive and systematic follow-up study of the anti system should be conducted.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Field Bioassay for Longhorn Pine Sawyer Beetle Monochamus alternatus (Coleoptera: Cerambycidae) in Korea Based on Aggregation Pheromone 2-(Undecyloxy)ethanol (집합페로몬 2-(Undecyloxy)ethanol을 이용한 솔수염하늘소 유인 실험)

  • Lee, Sung-Min;Hong, Do Kyung;Park, Jongseong;Lee, Jinho;Jang, Sei-Heon;Lee, ChangWoo
    • Journal of Life Science
    • /
    • v.25 no.12
    • /
    • pp.1445-1449
    • /
    • 2015
  • The pinewood nematode Bursaphelenchus xylophilus (Nematoda: Parasitaphelenchidae) poses a serious threat to pine forests in Europe and East Asia, leading to a debilitating pine wilt disease. Infected pine trees in Korea are generally fumigated or crushed to small wood chips after felling. Although pine wilt disease often recurs in pest management sites, there are no adequate means to monitor the effectiveness of pest control measures in those sites. Recently, a male-produced aggregation pheromone, 2-(undecyloxy)ethanol, was shown to be useful for attracting several Monochamus species, which are vectors for the pinewood nematodes. In this study, we investigated the abilities of 2-(undecyloxy)ethanol at three different doses (175, 350, and 700 mg), as well as host plant volatiles (α-pinene and ethanol), to attract M. alternatus (Coleoptera: Cerambycidae) at a pine forest in Pohang, Korea where infected pine trees had been cut down and fumigated. Twenty-seven M. alternatus were captured in cross-vane panel traps made of polyethylene terephthalate bottles and acrylic sheets. The results indicate that a high dose of 2-(undecyloxy)ethanol (700 mg per trap) is the most effective for attracting M. alternatus. The aggregation pheromone could be used to monitor the effectiveness of pest control measures as well as M. alternatus populations.

A Three-year Survey on Korean Consumer's Awareness, Perception and Attitudes toward Genetically-modified Foods; Years 2000-2002 (유전자재조합식품의 인지도 및 수용도에 대한 연차별 비교)

  • Kim, Myung-Hee;Kim, Jay-Wook;Chae, Kyung-Yeon;Park, Se-Won;Kim, Youn-Soon;Kyung, Kyu-Hang
    • Korean Journal of Food Science and Technology
    • /
    • v.35 no.6
    • /
    • pp.1155-1161
    • /
    • 2003
  • A three-year (2000-2002) survey on consumer's awareness and perception of genetically-modified (GM) foods was conducted on random samples of Korean consumers. More than 65% of the respondents were exposed to some information related to GM foods. The greatest benefit of the development of GM foods was thought to be their remedy of potential food shortages in the future. More than 90% of Korean consumers wanted GM foods to be labeled. About 18% of the respondents would buy GM foods voluntarily, whereas over 46% would not until they knew more about the product. Only 39% of Korean consumers were found to have realized that food items origination from plants contained genes. More consumers responded that they would not buy herbicide-resistant GM soybean and buy vitamin-enriched GM soybean instead. Many Korean consumers appeared to make decisions of acceptance or rejection of GM foods not on the basis of biotechnology, but on the basis of the word(s) used to describe the products, such as herbicide and vitamin. Only 4% of Korean consumers responded that GM foods were the greatest threat to the safety of Korean foods.

Effective Fungicides on Control of Stem and Root Rot of Paprika Caused by Nectria haematococca (Nectria haematococca에 의한 착색단고추 줄기 및 과실썩음병의 약제방제)

  • Jee Hyeong-Jin;Shim Chang-Ki;Ryu Kyoung-Yul;Nam Ki-Woong
    • Research in Plant Disease
    • /
    • v.11 no.2
    • /
    • pp.179-184
    • /
    • 2005
  • A previous study reported that the stem and root rot of paprika (Capsicum annum L. var, grossum) caused by Nectria haematococca became a threat to safe cultivation of the plant in the country. However, no strategies for control the disease have been suggested. In this study, fungicides registered for pepper were screened to evaluate their control effects on the disease. Among fungicides tested, prochloraz manganase complex com pletely suppressed mycelial growth of the pathogen at 10 ppm a.i. tebuconazole, benomyl, and carbendazim $\cdot$kasugamycin also effectively inhibited mycelial growth of the fungus. However, kresoxim-methyl and triflox ystrobin did not suppress mycelial growth but significantly suppressed conidial germination of the fungus. Azoxystrobin, benomyl, prochloraz, tebuconazol, and carbendazim$\cdot$ kasugamycin were also effective to retard conidial germination. In vivo tests, tebuconazole strongly inhibited the plant growth even at 16,000x (15.6 ppm a.i.), while others did not induce chemical injury at 4,000x or 8,000x when drenched into a rockwool cube. In a greenhouse test, prochloraz manganase complex at 125 ppm a.i. (4,000x) showed highest control value by $89.9\%$. Other fungicides thiophanate-methylthiram, axozystrobin, trifloxystrobin, and benomyl presented $60-80\%$ control value in the hydroponic cultivation system. However, application time and interval remained to be investigated for identify maximum residue limit.

Induced Systemic Tolerance to Multiple Stresses Including Biotic and Abiotic Factors by Rhizobacteria (근권미생물에 의한 식물의 생물·환경적 복합 스트레스 내성 유도)

  • Yoo, Sung-Je;Sang, Mee Kyung
    • Research in Plant Disease
    • /
    • v.23 no.2
    • /
    • pp.99-113
    • /
    • 2017
  • Recently, global warming and drastic climate change are the greatest threat to the world. The climate change can affect plant productivity by reducing plant adaptation to diverse environments including frequent high temperature; worsen drought condition and increased pathogen transmission and infection. Plants have to survive in this condition with a variety of biotic (pathogen/pest attack) and abiotic stress (salt, high/low temperature, drought). Plants can interact with beneficial microbes including plant growth-promoting rhizobacteria, which help plant mitigate biotic and abiotic stress. This overview presents that rhizobacteria plays an important role in induced systemic resistance (ISR) to biotic stress or induced systemic tolerance (IST) to abiotic stress condition; bacterial determinants related to ISR and/or IST. In addition, we describe effects of rhizobacteria on defense/tolerance related signal pathway in plants. We also review recent information including plant resistance or tolerance against multiple stresses ($biotic{\times}abiotic$). We desire that this review contribute to expand understanding and knowledge on the microbial application in a constantly varying agroecosystem, and suggest beneficial microbes as one of alternative environment-friendly application to alleviate multiple stresses.