• Title/Summary/Keyword: collective security

Search Result 58, Processing Time 0.033 seconds

A Study on the Formation and Development of Collective Security System and the Possibility of Security System Shift in East Asia (집단안보체제의 형성 및 발전요인과 동아시아 안보체제의 변화 가능성 연구)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 2023
  • For the last 70 years, the U.S.-led bilateral security system, or "Hub-and-Spokes" system, has been applied to Northeast Asia, and the system has been successfully settled in terms of stability and economic achievements of the region. Given the increasing complexity of the security environment of East Asia, it is plausible to consider the possibility of a security system shift from bilateral alliances to collective security. In order to analyze the driver of collective security system, this study developed three factors of formation and development of collective security system - main threat, intensity of the threat, and confidence among countries in the system - by reviewing international political theories related to security cooperation. Comparing the formation, development, and achievements of NATO and SEATO, the study figures out that the existence of the main threat, the high intensity of the threat, and the strong confidence among countries in the security system are the primary drivers for a successful collective security system. Based on the result, the study also analyzed the possibility of a security system shift in East Asia. Considering contemporary international conflicts such as U.S.-China strategic competition, Russia-Ukraine War, and growing threats posed by North Korean nuclear and missiles, the study anticipates that the necessity of a collective security system that will replace the current security system of the region would arise. Still, although some issues between countries should be overcome, the growing intensity of the threats will promote cooperation among countries by improving their confidence.

  • PDF

Democratic Values, Collective Security, and Privacy: Taiwan People's Response to COVID-19

  • Yang, Wan-Ying;Tsai, Chia-hung
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.222-245
    • /
    • 2020
  • In the pandemic crisis, many governments implemented harsh interventions that might contradict democratic values and civil liberties. In Taiwan, the debate over whether or not to reveal personal information of infected persons to limit the coronavirus's spread poses the democratic dilemma between public health and civil liberties. This study examines whether and explains how Taiwan's people respond to the choice between individual privacy and collective security. We used survey data gathered in May 2020 to show that, first, the democratic values did not deter the pursuit of collective safety at the cost of civil liberty; rather, people with higher social trust were more likely to give up their civil liberties in exchange for public safety. Second, people who support democratic values and pursue collective security tend to avoid violating privacy by opposing the release of personal information. This study proves that democratic values do not necessarily threaten collective safety and that the pursuit of common good can co-exist with personal privacy.

A case study on the Collective activities of Spectators of Professional soccer games (프로축구 관중의 집합행동 사례연구)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.195-213
    • /
    • 2003
  • This is a case study on the violent collective activities of spectators in professional soccer games. The purpose of this study is to examine the reasons and the processes of the activities. In order to achieve the purpose well, I analyzed two cases of violent collective activities in spectators of professional soccer games that were held on June 24 and July 28 in 2001. The data for this study was collected from 14 kinds of daily newspapers from June 10 to August 20 in 2001 to maintain the objective validity of the outline, the reasons, and the processes of the violent collective activities of spectators in two cases. The data was collected from Korea Integrated News Database System(KINDS) of Korea Press Foundation, and Chollian, on-line service of DACOM, for its efficiency, accuracy and promptness. On the basis of the above-mentioned method as well as the consequences of data analysis, I've reached to a conclusion as follows. The reasons of the violent collective activities of spectators in professional soccer games were the mass effect, the activities of players, umpires and the results of games, etc. The violent collective activities of spectators in professional soccer games need pre-requirements and have relationships with special affairs that are developed in a regular sequence. In other words, a collective activity gives an effect on another one directly or indirectly. Therefore, this study shows that we can reduce or prevent the damages by the violent collective activities of spectators in sport games when we analyze the processes of collective activities and make a previous counter-measure for that.

  • PDF

A Study on the provisions relating to 'the collective civil appeals spot' in the Security Services Industry Act (경비업법상 '집단민원현장' 관련규정에 관한 연구)

  • Lee, Sanghun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.55-63
    • /
    • 2015
  • Like a violence occurred by security guardians in the Yoosung or SJM Enterprise, a series of security company in Korea has repeated illegal conduct. So human rights violations are getting to be very heavy. The National Police Agency, the controller of the Security Services Industry Act, requires stricter regulations for the defense industry direction. here followed the research about some provisions in the Security Services Industry Act relating to 'the collective civil appeals spot' examining the contents of the Problems and discussed about it.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking - (사이버공격시 게임이론을 활용한 집단지성간 전략결정 모델 연구 - 한수원 해킹사건을 중심으로 -)

  • Park, Sang-min;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.237-246
    • /
    • 2016
  • Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.

A Study on the Education Curriculum for Bodyguarding Related Departments with the Prospect of Security Services (한국 경비업발전 전망에 따른 경호관련학과 교육과정 연구)

  • Kim, Young-In
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.89-108
    • /
    • 2002
  • The prospect of security services industries is as followings. First, integrated security system will be increased in the security service sphere of collective housing such as apartments. Second, the needs to security services with high-tech electronic security system and systematic security service against crimes will be increased. Third, the needs to crime prevention and disaster prevention service including information security service by means of internet and information and communication technology will be increased. Fourth, perhaps domestic market of security service will be reshaped in relation with localization trend and entrance of foreign security service companies to our country. With these conclusions I think that the departments of universities related to security services will focus on their social roles.

  • PDF

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.

A Study on the Application of Private Security in Assembly and Demonstration Sites Using SNS Emotional Language Analysis

  • Kunhee, Kim;Cheolyeung, Jang
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.1-7
    • /
    • 2022
  • The purpose of this study is to review the appropriateness of deploying private security guards using SMS emotional language analysis at the current assembly and demonstration sites, which rely only on the police force, and to suggest a plan. Therefore, it is intended to contribute to suppressing the problems at the assembly and demonstration sites and present a new paradigm for responding to the assembly and demonstration sites based on the study's results. First, it is necessary to prepare a legal basis for the deployment of private security guards in the 'Security Services Industry Act' and 'Assembly and a Demonstration Act'. Second, there is a need for a 'security company selection criteria' for selecting security companies with a lot of experience, such as collective civil petition sites and security for national critical facilities (special security services). Third, it is necessary to prepare financial resources for the deployment of private security guards. This study is expected to serve as a new cornerstone for effective management of assembly and demonstration sites through mutual complementation of the police and private security.