• Title/Summary/Keyword: The Private Security

Search Result 1,401, Processing Time 0.076 seconds

Relationship between Leisure Activity Participation, Job Stress, Social Support and Subjective Well-being among Security Agents (시큐리티 요원의 여가활동 참가와 직무스트레스, 사회적 지지 및 주관적 안녕감의 관계)

  • Kim, Kyong-Sik;Kim, Chan-sun;Park, Young-Man
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.620-625
    • /
    • 2009
  • The purpose of this research Is to clarify the relationship between leisure activity participation, job stress, social support and subjective well-being among security agents. 356 (92%) questionnaires were obtained from 12 private security companiesin metropolitan Seoul. The conclusion follows. First, the frequency of participation in activities on the subjective well-being reflects the direct influence. and period by participating in the job stress on the subjective well-being reported more negative affect, in other words, Job Stress is reduced, social support and subjective well-being is increased. Second, job stress has a negative effect as a parameter to subjective well-being and participation in the period, in other words, subjective well-being is decreased by the more get job stress. Third, social support affects the subjective well-being, leisure activity participation and social support that have no relationship, In other words, subjective well-being is increased by the more get social support. Fourth, frequency and duration of participation in leisure activity directly and indirectly affects to subjective well-being. increasing the frequency of participation activities make that subjective Well-being is increased, increasing the participation period makes that job stress is reduced, job stress reduction make that subjective well-being is increased, and increasing the social support makes that subjective well-being is increased.

  • PDF

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

Regulation and Its Tasks of Privately Contracted Armed Security Personnel on Board Ships Against Somali-based Piracy (소말리아 해적행위 대응을 위한 민간무장보안요원 승선의 규제 및 그 과제에 관한 연구)

  • Keum, Jong-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • The increased threat to commercial shipping by Somalia-based pirates has triggered an increased use of PMSC(Private Maritime Security Contractors). The use of PMSC to protect merchant ships against Somali-based piracy threat seems to have been most effective counter-piracy measures. However, there are various legal and practical questions around using PMSC and PCASP(Privately Contracted Armed Security Personnel) on board at sea. This paper aims to study the regulation and its problems of PMSC and PCASP on board to protect merchant ships against Somali-based piracy in the Indian Ocean and Gulf of Aden. In particular, this paper focuses on the legal issues including jurisdictional issues of PCASP on board merchant vessels, use of force by PCASP in self-defense, and authority for using PMSC. Currently, the legal framework relating to use of PMSC and PCASP on board protecting ships from Somali-based piracy is complex, sometimes ambiguous or inconsistent, and currently in a state of flux. Thus, this paper concludes that at this juncture an effort to coordinate this legal framework is necessary, as regards both the interpretation of existing rules related to PCASP on board merchant ships under UNCLOS(United Nations Convention on the Law of the Sea) and the creation of new rules. Also, this paper suggested that there is an urgent need to establish the PMSC-specific laws in Korea.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

Relationship between Organizational Culture, Organizational Trust and Organizational Performance of Special Guard Organization (특수경비조직의 조직문화와 조직신뢰 및 조직성과의 관계)

  • Kim, Hyo-Joon
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.59-86
    • /
    • 2011
  • The purpose of this study is to investigate the relationship between organizational culture, organizational trust and organizational performance of special guard organization. This study had selected special guards from 4 different private guard companies which are in Seoul area on March 2011. Using Judgement Sampling, 161 samples were drawn for the use of final analysis. Questionnaire used in this study was consisted of the total 42 question, and executed frequency analysis, factor analysis, reliability analysis, correlation analysis, multiple regression analysis, path analysis by SPSSWIN 18.0. The Cronbach's ${\alpha}$ value which represents the reliability of the survey came out to be over .592. The results are following: First, the organizational culture of special guard organization affects organizational trust. That is, when a developmental, reasonable, consensual and hierarchical culture is activated, cognitive emotional and behavioral trust is increased. Second, organizational culture of special guard organization affects organizational performance. That is, when a reasonable and consensual culture is activated, job-satisfaction becomes higher. On the other hand, when a developmental, reasonable and hierarchical culture is activated, organizational flow becomes higher. Third, organizational trust of special guard organization affects organizational performance. That is, when a cognitive emotional and behavioral trust works highly, job-satisfaction and organizational flow is increased. Fourth, Special security organization's organizational culture affects as a result in organization result. As well as organizational culture exerts direct influence on organization outcome, I exert effect that is indirect in organization outcome through action trust which is low rank factor of organization trust.

  • PDF

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

An Efficient Broadcast Encryption System with Delegation of Decryption (복호화 위임을 제공하는 효율적인 브로드캐스트 암호시스템)

  • Han, Su Min;Park, Seung Hwan;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of Broadcast Engineering
    • /
    • v.18 no.5
    • /
    • pp.758-770
    • /
    • 2013
  • In a Broadcast Encryption System, a sender sends an encrypted message to a large set of receivers at once over an insecure channel and it enables only users in a target set to decrypt the message with their private keys. In 2005, Boneh et al. proposed a fully collusion-resistant public key broadcast encryption in which the ciphertext and the privatekey sizes are constant. In general, pairing-based broadcast encryption system is efficient in bandwidth and storing aspects than non-pairing based broadcast encryption system, however, it requires many computational costs that resource-constrained devices is not suit to be applied. In this paper, we propose a Broadcast Encryption scheme(called BEWD) that user can decrypt a ciphertext more efficiently. The scheme is based on Boneh et al.scheme. More precisely, it reduces receiver's computational costs by delegating pairing computation to a proxy server which computation is required to receiver in Boneh et al.scheme. Furthermore, the scheme enables a user to check if the proxy server compute correctly. We show that our scheme is secure against selective IND-RCCA adversaries under l-BDHE assumption.

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.

How to Maintain the Financial Stability and Adequacy of Teachers Pension (사학연금의 재정안정화와 적정성 유지 방안)

  • Park, Yousung;Jeong, Min-Yeol;Jeon, Saebom
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.4
    • /
    • pp.643-661
    • /
    • 2015
  • Korea Teachers Pension (private school pension) is a mandatory pension and a social security system for private school teachers to ensure the stability of subscribers by a supplying pension when they (and their dependents) face future economic risk due to retirement or death. Therefore, the Teachers Pension must provide stability and sustainability in regards to adequacy of income and to function as a pension. However, the Government Employees Pension System (GEPS) of Korea (the most representative special occupation pension) recorded a fiscal deficit in 2001 and with an accumulated deficit that is expected to grow; subsequently, various plans for the reform of GEPS have been actively discussed. The Korea Teachers Pension system is based on the GEPS scheme and is not free from the GEPS discussions on reforms of national pension. The current system for the Teachers Pension needs to be improved because it is expected to be depleted within the next 30 years due to low fertility and an aging population in Korea. This study discusses existing Teachers Pension schemes problems and suggests a projection method and revised plans to improve it. We use long-term financial projections of the Teachers Pension to estimate the fund exhaustion point and the minus balance of the financial scale as well as analyze the supply-demand burden structure that reflects the future population structure to propose Teachers Pension reforms that will improve stability and adequacy.