• Title/Summary/Keyword: attacks

Search Result 3,675, Processing Time 0.033 seconds

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons (북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.325-354
    • /
    • 2013
  • The concept of national security and the fundamental system for crisis management have departed from traditional methods and the importance of a national critical infrastructure crisis management has been emphasized. A national critical infrastructure crisis means a situation where human resource, material and functional system that may have a material effect on the critical functions of the government, the vitality and integrity of society, national economy and the safety of the public becomes disabled due to causes such as terrorism or major disasters. Although North Korea had been subject to numerous rounds of negotiations and sanctions as it continually developed nuclear weapons since the 1960s, it has also showed off its nuclear armaments through successful nuclear testings and missile launches. As the development and threat of North Korea's weapons of mass destruction becomes more noticeable and the range of its risk expands, this study focuses on the potential for an absence of leadership for national crisis management where the country's leadership, which should serve the critical role and function of handling national crises, becomes completely destroyed by the unexpected initial attacks by North Korea. As a result, the purpose of this study is to propose safety measures for the country's leadership in preparation for North Korea's threat of nuclear weapons by examining the concept and degree of risk of weapons of mass destruction with a focus on nuclear weapons, analyzing the substance of the threat of North Korean nuclear weapons and evaluating such threat. In conclusion, first, to ensure the normal functioning of a national crisis management system in the event of a national crisis, we must seek safety measures that conform to the scope and succession order of the leadership of the national crisis management for an Enduring Constitutional Government (ECG) and the Continuity Of Operations (COOP). Second, in the event of a national ceremony, the gathering of the country's leadership all together in an open place should be avoided. In unavoidable circumstances, the next in rank that will act on behalf of the current leader should be designated and relevant safety measures should be taken. Third, during time of peace, in preparation for national crises, the scope of protection for the country's leadership should be prescribed and specific security and safety measures should be implemented. Fourth, the succession order for acting president in the case of the death of the president pursuant to Articles 71 and 26(1) of the National Government Organization Act should reconsidered to see whether it is a reasonable provision that takes into consideration a national crisis management that corresponds to the threat of North Korean nuclear weapons and weapons of mass destruction. Pursuant to the Basic Guidelines for National Crisis Management set out under Presidential Directive No. 229, the Korean government is currently operating a case-by-case "crisis management standard manual" and its sub-manuals and has also prepared the Presidential Security Service's security and safety measure regulations regarding the acting president. Therefore, the Korean government should actualize the above points in the case-by-case crisis management standard manual and security and safety measure regulations regarding the acting president to implement and legislate them.

  • PDF

Clinical Observation on The Left and Right Facial Palsy (${\cdot}$右側 口眼와斜 患者에 對한 臨床的 考察)

  • Lim, Jin-Ki;Lim, Gyu-Sang;Hwang, Choong-Yeon
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.10 no.1
    • /
    • pp.383-402
    • /
    • 1997
  • The author analyzed 155 cases of Facial Palsy, excluding lesions caused by cerebrovascular attacks, who were treated in the Kwang-ju Oriental Medical Hospital of Wonkwang University from March 1996 to September 1996. I've examined the 155 cases in the view of the etiologic distributions, the age, the relationship of the sex and paralytic side, attended symptoms and analyzed 95 cases who were treated over ten times in the view of the ratio of recovery according to the age, anatomic focus, the relations of sex and paralytic side. The following results are obtained. 1. The ratio of punghan(風寒) was $20.64\%$(32 cases), overwork was $18.70\%$(29 cases), stress was $6.44\%$(10 cases), excessive drinking was $3.23\%$(5 cases), teeth pain was $1.93\%$(3 cases), and idiopathy was $38.05\%$(59) and etc. 2. The ratio of stylomastoid pain was $15.48\%$(24 cases), auricular pain was $10.32\%$(16 cases), headache was $4.51\%$(7 cases), eyedried was $4.51\%$(7 cases), taste paralysis was $2.57\%$(4 cases), tinnitus was $2.57\%$(4 cases) and non-significant symptoms was $50.97\%$(79) and etc. 3. The ratio of 2th and 5th decade were $20.00\%$(31 cases), 4th decade was $18.71\%$(29 cases), 3th decade was $16.71\%$(26 cases), 6th decade was $11.61\%$(18 cases), teenagers in $5.81\%$(9 cases), over seventy and under teenagers were $3.23\%$(5 cases), and infant was $0.65\%$(1 case). 4. The ratio of the male-right was $28.39\%$(44 cases), female-right was $25.82\%$(40 cases), male-left was $23.23\%$(36 cases), female-left was $20.65\%$(32 cases) and male-both side was $1.94\%$(3 cases) in order. 5. Topographically, The ratio of the infrachordal lesion was $72.90\%$(113 cases), transgeniculate lesion was $16.13\%$(25 cases), suprageniculate lesion was $5.81\%$(9 cases), infrastapedial lesion was $3.87\%$(6 cases) and suprastapedial lesion was $1.29\%$(2 cases) in order. 6. When we examined the degree of recovery about the 95 patients who were treated over ten times after on attack, normal improvement was seen in $46.32\%$(44 cases), excellent in $7.37\%$(7 cases), good in $12.63\%$(12 cases), fair in $13.68\%$(13 cases), poor in $20.00\%$(19 cases). The total remedial value of the 95 patients who were treated over ten times was revealed $61.58\%$. 7. When we examined the 95 patients who were treated over ten times, the remedial value of the infant was $50.00\%$, under teenagers $43.75\%$, teenagers $37.50\%$, 2th decade $56.82\%$, 3th decade $64.06\%$, 4th decade $55.00\%$, 5th decade $73.53\%$, 6th decade $77.50\%$, over seventieth $68.75\%$. The remedial value of 3th decade, 5th decade, 6th decade, 7th decade and over seventieth were higher than the total remedial value($61.58\%$) 8. In the point of topographical lesion, when we examined the 95 patients who were treated over ten times, the remedial value of infrachordal lesion was $66.78\%$, infrastapedial lesion $58.33\%$, suprastapedial lesion $50.00\%$, transgeniculate lesion $48.44\%$, suprageniculate lesion $31.25\%$, in order. Only the remedial value of Infrachordal($66.78\%$) was higher than the total remedial value($61.58\%$). 9. In the point of the relationship of the sex and the paralytic side, when we examined the 95 patients who were treated over ten times, the remedial value of male-left was $57.29\%$, male-right $61.54\%$, male-both side $58.33\$%, female-left $57.81\%$ and female-right $68.27\%$. Only the remedial value of female-right($68.27\%$) was higher than the total remedial value($61.58\%$). These results demonstrated that in the point of prognostic view there was more concerned with the topographical lesion, body condition than the traditional rule of sex-paralytic relationship that man is awed left paralysis and woman right paralysis.

  • PDF

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

A Clinical Study on Treatments of Hwabyung with Oriental Medicine (홧병환자의 한의학적 치료에 대한 임상적 연구)

  • Kim, Jong-Woo;Whang, Wei-Wan
    • The Journal of Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.5-16
    • /
    • 1998
  • Hwabyung is a common emotional disorder which has symptoms expressed like firt's explosion in middle-aged after long period of emotional suppression among Koreans. It is similar in its characteristics such as neurosis, anxiety, panic attacks in Western Medicine, though the treatment method was not effective. So we have done a clinical research on Oriental Medical Method, especially on Acupuncture Therapy, and obtained following results. 1. Patients with Hwabyung complained of pressure pain around the Chunjung(?中, CV-17) point distinctively. About 70% of those were located on the CV-17 point, 25% were 1cm upper than the CV-17 point and 5% of those were 1cm lower point than the CV-17 point. 2. Degrees of pressure pain were divided into 5 grades from ade 1(feeling pain with slight pressure) to grade 5(feeling no pain with severe pressure), respectively. 3. Patients with Hwabyung showed various symptoms compared to fire's explosion such as anger, chest discomfort, difficulty in breathing. tachycardia. and feeling of epigasfric mass etc., and the degrees were divided into 5 grades according to the severities from grade 1(can't keep their usual living) to grade 5(no complaints with heavy stresses), respectively. 4. For the treatment of Hwabyung in this study, we had given Acupuncture therapy on some points such as Chunjung:?中:CV-17, Jungwan:中脘:CV-12) and Chunchu:天樞:S-25, etc. for 15 minutes a time twice a week. And Bunshimkiumgmnihang(分心氣飮加味方) was administered 3 times a day. 5. About 40% of the patients took treatment for more than 2 months, 29% of those took 1 to 2 months and 31% of those took less than 1 month. In this study, we excluded those who stopped treatment within a month without any expected effects. 6. We evaluated the changes of severity of pain according to the following categories such as - for no change, + for 1 grade, ++ for 2 grades, +++ for 3 grades, and ++++ for 4 grades of improvements. Among the patients taken 1 to 2 months of treatment. 48% of the those showed +, 7% of those showed ++, 3% of those showed +++ and 41% of those showed no change. Among the patients taken less than 2 months of treatment, 20%of those showed +, 40% of those showed ++, 28% of those showed +++ and 13% of those showed no change. 7. We evaluate the changes of symptoms according to the following categories such as - for no change, + for 1 grade, ++ for 2 grades, +++ for 3 grades and +++ for 4 grades of improvements. Among the patients taken 1 to 2 months of treatment, 34% of those showed +, 14% of those showed ++ and 52% of those showed no change. Among the patients taken more than 2 months of treatment, 20% of those showed +, 43% of those showed 20% of those showed +++, 3% of those showed +++ and 15% of those showed no change. 8. When we compare the changes of pain and symptoms according to the periods of treatment, the changes in quantity of pain in 1 to 2 months group was $0.72{\pm}0.75$, in more than 2 months group was $1.83{\pm}0.98$, and the changes in quantity of symptoms in 1 to 2 months group was $0.62{\pm}0.73$, in more than 2 months group was $1.75{\pm}1.03$. According to the above results, we have concluded that more than 2 months of treatment is more beneficial than 1 to 2 months of treatment.

  • PDF

"Liability of Air Carriers for Injuries Resulting from International Aviation Terrorism" (국제항공(國際航空)테러리즘으로 인한 여객손해(旅客損害)에 대한 운송인(運送人)의 책임(責任))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.47-85
    • /
    • 1989
  • The Fundamental purpose of the Warsaw Convention was to establish uniform rules applicable to international air transportation. The emphasis on the benefits of uniformity was considered important in the beginning and continues to be important to the present. If the desire for uniformity is indeed the mortar which holds the Warsaw system together then it should be possible to agree on a worldwide liability limit. This liability limit would not be so unreasonable, that it would be impossible for nations to adhere to it. It would preclude any national supplemental compensation plan or Montreal Agreement type of requirement in any jurisdiction. The differentiation of liability limits by national requirement seems to be what is occurring. There is a plethora of mandated limits and Montreal Agreement type 'voluntary' limits. It is becoming difficult to find more than a few major States where an unmodified Warsaw Convention or Hague Protocol limitation is still in effect. If this is the real world in the 1980's, then let the treaty so reflect it. Upon reviewing the Warsaw Convention, its history and the several attempts to amend it, strengths become apparent. Hijackings of international flights have given rise to a number of lawsuits by passengers to recover damages for injuries suffered. This comment is concerned with the liability of an airline for injuries to its passengers resulting from aviation terrorism. In addition, analysis is focused on current airline security measures, particularly the pre-boarding screening system, and the duty of air carriers to prevent weapons from penetrating that system. An airline has a duty to exercise a high degree of care to protect its passengers from the threat of aviation terrorism. This duty would seemingly require the airline to exercise a high degree of care to prevent any passenger from smuggling a weapon or explosive device aboard its aircraft. In the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescene to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. A finding of willful misconduct on the part of an air carrier, which is a prerequisite to imposing unlimited liability, remains a question to be determined by a jury using the definition or standard of willful misconduct prevailing in the jurisdiction of the forum court. Through the willful misconduct provision of the Warsaw Convention, air carrier face the possibility of unlimited liability for failure to implement proper preventive precautions against terrorist. Courts, therefore, should broadly construe the willful misconduct provision of the Warsaw Convention in order to find unlimited liability for passenger injuries whenever air carrier security precautions are lacking. In this way, the courts can help ensure air carrier safety and prevention against terrorist attack. Air carriers, therefore, would have an incentive to increase, impose and maintain security precautions designed to thwart such potential terrorist attacks as in the case of Korean Air Lines Flight No.858 incident having a tremendous impact on the civil aviation community. The crash of a commercial airliner, with the attending tragic loss of life and massive destruction of property, always gives rise to shock and indignation. The general opinion is that the legal system could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. I would like to remind all passengers that every discovery of the human spirit may be used for opposite ends; thus, aircraft can be used for air travel but also as targets of terrorism. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the soverign rights of the states, and the human rights of the individuals. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co-ordinated measures. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism.

  • PDF

A Study on UAV and The Issue of Law of War (무인항공기의 발전과 국제법적 쟁점)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.3-39
    • /
    • 2011
  • People may operate unmanned aerial vehicles (UAVs or drones) thousands of miles from the drone's location. Drones were first used (like balloons) for surveillance. By 2001, the United States began arming drones with missiles and using them to strike targets during combat in Afghanistan. By mid-2010, over forty states and other entities possessed drones, many with the capability of launching missiles and dropping bombs. Each new development in military weapons technology invites assessment of the relevant international law. This Insight surveys the international law applicable to the recent innovation of weaponizing drones. In determining what international law rules govern drone use, the most salient feature is not the fact that drones are unmanned. The fact drones carry no human operator may be the most important new technological breakthrough, but the key feature for international law purposes is the type of weaponry drones carry. Whether law enforcement rules govern drone use depends on the situation and not necessarily who is operating the drone. Battlefield weapons may also be lawfully used before an armed conflict in the following situations: when initiating self-defense under Article 51 of the United Nations Charter; when authorized by the UN Security Council; when a government seeks to suppress internal armed conflict; and, perhaps, when a state is invited to assist a government in suppressing internal armed conflict. The rules governing resort to force in self-defense are found in Article 51 of the UN Charter and a number of decisions by international courts and tribunals. Commentators continue to debate whether drone technology represents the next revolution in military affairs. Regardless of the answer to that question, drones have not created a revolution in legal affairs. The current rules governing battlefield launch vehicles are adequate for regulating resort to drones. More research must be undertaken, however, to understand the psychological effects of deploying unmanned vehicles and the effects on drone operators of sustained, close visual contact with the aftermath of drone attacks.

  • PDF

The Study on Aviation Crime in Aviation Safety and Security Act of Korea ("항공안전 및 보안에 관한 법률"에 있어서 항공범죄에 관한 연구)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.1
    • /
    • pp.27-54
    • /
    • 2010
  • Soon after September 11 attacks in 2001, there were strong demands in Korea on making relevant laws and regulations on aviation security, and Korean parliament legislated "Aviation Safety and Security Act"to fulfill the demands on safety and security of aircrafts during aviation. However, the current Aviation Safety and Security Act seems to have many problems which do not meet the practical needs in Korea, because there were not enough considerations on the practical needs and extinguishable national circumstances on civil aviation system in Korea, but only regarded the relevant international conventions and foreign practices on it. In this context, it is necessary to amend several provisions in Aviation Safety and Security Act to enhance more practical efficiencies in its implementation through systematization of the provisions on crimes which may happen during aviation. In this context, this article argues two main issues. First, Article 39 of Aviation Safety and Security Act does not express whether it is possible to punish the attempt of crime of causing damage to aircraft. Therefore, regarding a principle of legality, it is impossible to punish the perpetrator even when coincidently failed to destruct or damage aircraft. In this context, this article argues that the necessity to introduce the possibility to punish the attempt of crime of causing damage to aircraft. Second, regarding Article 160 of Civil Aviation Act of Korea, current Aviation Safety and Security Act should be amended by guaranteeing the culpability of negligence of crime of causing damage to aircraft.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.