• Title/Summary/Keyword: collective security

Search Result 58, Processing Time 0.029 seconds

A Study on Influencing Factors of Disabled Person's fear of crime: Focused on the person with physical disability (장애인의 범죄두려움에 미치는 영향에 대한 연구: 지체장애인을 중심으로)

  • Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.141-169
    • /
    • 2016
  • This study aims to analyze the causes of the disabled people's fear of crimes and to provide the implication to relevant policies. For this, we scrutinize how the disabled perceive the fear toward felonies and the police action. Further, we empirically tested how police action and their recognition toward it affects the fear toward crimes, on the basis of collective efficacy and victimization which is believed to have effects on people's fear of crimes. As the physically disabled are incompetent to respond to the questions, we survey 122 person with physical disability for 25 branches of Seoul Association of Person Physically Disabled. Our regression results show negative correlations between collective efficacy and fear of crimes, which is in accord with preceding researches of the non-handicapped. While indirect victimization shows positive correlations with their fear toward crime, it is ot statistically significant in conventional confidence level. Contrarily, direct victimization shows positive correlation with it, and the coefficient is different from zero in conventional level. As it is proven from preceding studies, confidence in police action and their perception toward it has negative correlations with their fear of crimes.

  • PDF

Alliance of the Baltic States in the System of Collective Security

  • Kikste, Kaspars;Djakona, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.189-194
    • /
    • 2022
  • The formation of a new world order is primarily caused by new conditions and military operations on the European continent. The intensification of military-political tension led to the formation of new centers of power and gravity, which in turn led to the concentration of weapons and general militarization. Changes in the world order as a result of military conflicts and an increase in hot spots in the world, an increase in threats and the formation of centers of military gravity, the inability of existing institutions to resolve the situation lead to the need to develop new security mechanisms. Studies show that in the current situation, the countries of the Baltic countries are especially actively increasing their level of technologization of the army and militarization in general. The creation of any alliance is always conditioned by the presence of external threats. Naturally, the increase in the number of threats creates preconditions for the development of new forms of cooperation within existing military alliances. It seems obvious that due to the current situation in the context of the military conflict and military aggression of Russia in Ukraine, as well as its constant threats, including to the Baltic countries, there is a need to form a certain alliance that can protect the eastern border of Europe and form a certain border between European countries and aggressor countries. The Baltic countries are actively involved in these processes, in addition, it is the Baltic countries that can enter the new military alliance proposed by Britain, which will unite Poland, Ukraine, the Baltic countries and, possibly, Great Britain.

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Modelling Civic Problem-Solving in Smart City Using Knowledge-Based Crowdsourcing

  • Syed M. Ali Kamal;Nadeem Kafi;Fahad Samad;Hassan Jamil Syed;Muhammad Nauman Durrani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.146-158
    • /
    • 2023
  • Smart City is gaining attention with the advancement of Information and Communication Technology (ICT). ICT provides the basis for smart city foundation; enables us to interconnect all the actors of a smart city by supporting the provision of seamless ubiquitous services and Internet of Things. On the other hand, Crowdsourcing has the ability to enable citizens to participate in social and economic development of the city and share their contribution and knowledge while increasing their socio-economic welfare. This paper proposed a hybrid model which is a compound of human computation, machine computation and citizen crowds. This proposed hybrid model uses knowledge-based crowdsourcing that captures collaborative and collective intelligence from the citizen crowds to form democratic knowledge space, which provision solutions in areas of civic innovations. This paper also proposed knowledge-based crowdsourcing framework which manages knowledge activities in the form of human computation tasks and eliminates the complexity of human computation task creation, execution, refinement, quality control and manage knowledge space. The knowledge activities in the form of human computation tasks provide support to existing crowdsourcing system to align their task execution order optimally.

An Analysis of the Economic Impact of International Society and Unilateral Sanctions (국제사회와 독자제재에 따른 경제적 영향 분석)

  • Hee-Jun Kim;Myong-Sop Pak
    • Korea Trade Review
    • /
    • v.45 no.4
    • /
    • pp.83-93
    • /
    • 2020
  • Sanctions by the international community can increase their effectiveness with the participation of major countries with global economic influence, and can lead to efficient sanctions against the target countries when different sanctions procedures and methods can be operated in an integrated manner. To this end, it is being carried out with the aim of maximizing the performance of sanctions through collective economic solidarity by inducing international participation centered on the joint agenda, such as drawing up a resolution for sanctions. In this study, the definition and purpose of sanctions imposed by the international community and by major specific countries were explained and an empirical analysis was conducted on the economic impact of each sanctions, focusing on the United Nations Security Council and the United States, which directly implement them. Based on the selected research model, the effects of economic sanctions on the international community and countries subject to sanctions by certain countries were mutually compared and analyzed in the data. Finally, the conclusion obtained from this study was stated and the implications were derived and the possibility of further research expansion was described.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

A Study on the Transition of North Korean Income Security Terminology: 1936-2013 (북한 소득보장 용어의 변천에 관한 연구: 1936-2013)

  • Min, Kichae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.1-8
    • /
    • 2020
  • Existing studies have used a variety of terms related to North Korea's income guarantees, causing some confusion. It can be said that it is a problem that appears only when dealing with the contents of a specific statute in an existing study. To this end, we will look at the laws and regulations related to income security by period and analyze the contents of dictionaries that are also the explanations of the laws and the status of orders and rules. As a result of the analysis, living subsidies are classified into subsidies under the national social insurance system and pension and subsidy under the national social security system. Among them, the pension under the national social security system, which is an income security system for non-workers, includes old age pensions, labor capacity loss pension(general work ability loss pension, accidental work ability loss pension, honored soldiers' work ability loss pension), and survivor pension(general survivor pension, war deads' survivor pension, victims' survivor pension). In particular, it was confirmed that the terminology for social security pension, which has been confusing in previous studies, is a collective jargon for all pensions under the national social security system. This study is significant in that it synthesized the historical transition process of the terminology of income security from the 10th Platform for the National Liberation Society in 1936 to the Socialist Constitution of the Democratic People's Republic of Korea in 2013.

A Study on development of personal protection service (신변보호업무 발전방안에 관한 연구)

  • Ha, Jung-Hoon
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.199-223
    • /
    • 2015
  • The purpose of this study is to find the development of the personal protection business plan based on the problem that guards are now aware of personal protection service. In order to achieve the objectives of this study, we analyzed the data after expert survey and interview conducted by seven experts engaged in personal protection services more than 15 years. The guard who perform personal protection service proposed a development plan of personal protection services as follows. First, the current education system for new employees' training is required to improve the educational program of 40 hours in subjects related to personal protection duties by reorganization Second, the personal protection service training for guards also appropriate to switch to 8-hour training program for three months through an educational organization controlled by country. Third, the personal protection guards should be proceeding the practical programs required in the field and quality education in the different section by competent and professional instructors. Fourth, it should be revised Regulating that on the site of collective civil petition including in Events related to events across the board in the security services law. Fifth, there needs to be a change of recognition between police and private security firms, and to be set up the organization for supervision of management by police and private security firms jointly. Sixth, there needs to be organized a subcommittee which is consisting of experts in each task on Korea Security Association, and founded Korea Personal Protection Association for development associated with the personal protection service and to protect the rights of personal protection guards.

  • PDF

Location Analysis of A Collective Consumption Facility with GIS: The Location of Gu-Office and Its Administrative District in Ulsan, South Korea (GIS기법을 이용한 도시공공서비스 시설의 입지분석 -울산시 구 관할구역과 구청입지를 중심으로-)

  • Cho, Sung-Ho;Park, Soon-Ho
    • Journal of the Korean association of regional geographers
    • /
    • v.2 no.1
    • /
    • pp.69-85
    • /
    • 1996
  • This research adoptes a spatial analysis function of the Geographic Information System[GIS] to analyze the location and the service district of a collective consumption facility, to discover the optimal location, and to redefine the service district. The location and spatial district of a collective consumption facility strongly influences the quality of life of residents. This research studies administrative offices and districts, especially Gu-offices in Ulsan. Ulsan would be raised to the status of Kwangyokshi in 1997; so that, the status of four Gus would be changed from a general administration into a self-governing administration. The summary of this research focuses on five significant points. First, the districts of four Gus were strongly required to be redefined to obtain the maximization of the degree of potential development as well as of the efficiency and equity of administring services. The spatial range of residents in a Gu was not in accord with its administrative district. The administrative districts of four Gus in Ulsan were not balanced in terms of area and population, and the high degree of disparity among Gus existed the efficiency and equality of a collective consumption service. Second, the current gu-offices were located based on security of land and accessibility of a main route; so, there was difficult to find the creteria and the principles of selections of the location of Gu offices. The social disparity of an administrative service existed in the accessibility into Gu-offices. Third, the administrative districts of Gus were redefined with spatial analysis tool of ARC/INFO. It was recommended that Ulsan maintain four Gus under the condition of five Kwangyokshi in South Korea. The redefined districts of administration reduced the disparity among four Gus in terms of area and population. improved the degree of harmony between the spatial range of residents of Gus and the administrative district of Gus, and increased the efficiency and equity of administrative service. Fourth, within the redefined adminis trative district of a Gu, the centroid reduced the maximum distance and mean distance; so, the efficiency and equity of public service provided by the Gu-office were improved. Last, the spatial analysis function of GIS helped to select the optimal location and to delineate the district of public service with more speedly and objectively. The function of spatial analysis of GIS was very useful to minimize the conflict in the determination of the location of a collective consumption facility and of the service district. To improve location analysis with GIS. non-spatial data base such as budget, thought of residents, and development policy and program, should be constructed.

  • PDF