• Title/Summary/Keyword: life security

Search Result 1,283, Processing Time 0.028 seconds

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

Effects of Security Needs of Citizens Utilizing CCTV on the Life Satisfaction (CCTV를 통한 시민들의 안전욕구충족이 생활만족에 미치는 영향)

  • Park, Young-Man;Kim, Eun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.437-447
    • /
    • 2011
  • This study will compare and analyze the effect of satisfaction of security needs on life satisfaction according to sociodemographic features and will find the factors of security needs satisfaction and life satisfaction. a total of three humdred questionnaires was distributed to male and female who live in Seoul(Gang-dong, Gang-sue, Songpa-gu and Gand-buk) in Aug. and Sept., 2010 and over nineteen years old. Except making the wrong questionnaires, total questionnaires was sampled from 259 questionnaires using judgment sampling method after selecting. Data analysis be used by SPSSWIN 18.0 Version. The validity and reliability of questionnaires are verified for factorial analysis and reliability analysis and also T test and F test are used for finding for differences of life satisfaction and satisfaction of security needs. And, this study is tested the regression analysis for the effects on the life satisfaction and satisfaction of security. Utilizing CCTV on the Life Satisfaction, this study were drawn the conclusions as following. First, the satisfaction of security needs as demographic characteristics have the part of the difference. the result shows to different psychological needs as educational level at the group less than college graduates. Second, the result of satisfaction of security as demographic characteristics is significantly higher in the male group and life satisfaction as education is significantly higher in more than college graduates. Third, the satisfaction of security needs of citizens through the CCTV effects to life satisfaction. environmental needs and information needs are as high as life satisfaction.

Influence of the Leisure Constraint of a Private Security Guard on His/Her Task Stress and Life Satisfaction (민간경비원의 여가제약이 직무스트레스 및 생활만족에 미치는 영향)

  • Lee, Gun-Chun;Song, Kang-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.359-366
    • /
    • 2010
  • The purpose of this study is to examine the influence of the leisure constraint of a private security guard on his/her task stress and life satisfaction. The subjects of this study were chosen among the private security guards working in Seoul based private security firms in 2009, and by going through judgement sampling, 300 cases were applied in the final analysis. Collected data went through factor analysis, reliability analysis, regression analysis, and path analysis by using SPSSWIN 17.0. In reference with the reliability of the questionnaire, Cronbach's $\alpha$ was over .600. The conclusion of this study is as following. Firstly, the leisure constraint of a private security guard affects his/her task stress. In other words, when peripheral and individual constraint increase, task stress is intensified, while task stress winds down when interpersonal constraint decreases. Secondly, the leisure constraint of a private security guard affects life satisfaction. That is, when individual constraint goes down, life satisfaction is improved. Thirdly, the task stress of a private security guard affects life satisfaction. when compensation and career development increase, life satisfaction rises. On the other hand when task characteristic is weakened, life satisfaction gets lower. Fourthly, the leisure constraint of a private security guard has a causal influence on task stress and life satisfaction. Accordingly, it becomes apparent that the task stress is a significant variable which intermediates the relation between leisure constraint and life satisfaction.

Comparative Analysis on Security Needs Satisfaction and Life Satisfaction of Electronic Security System Users by City Size (도시크기에 따른 기계경비시스템 이용자의 안전욕구충족과 생활만족 비교분석)

  • Yoo, Young-Chang;Lee, Jong-Hwan;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.330-341
    • /
    • 2010
  • The purpose of this study is to have comparative analysis on the differences between metropolis and provincial city's electronic security system users' security needs satisfaction and life satisfaction. This study sampled total 400 users with using purposeful sampling after selecting specific metropolis and provincial cities as population. It was conducted on 4 realms-bank, jewelry store, convenience store and communication industry- with two times. First one was on June, 2008, it was conducted in Seoul, 5 areas divided based on Hangang, which are Gang-dong, Gang-seo, Gang-nam, Gang-buk, and civic center. We sampled 40 electronic security system users of each area which are 200 in sum. Second one was on January, 2009, with users in Cheonan and Asan, 200 was sampled in the same way with metropolis; 100 users of each city. The reliability of the questionnaire showed Cronbach's ${\alpha}$ value over .812. The results are as follows. First, there showed difference on physical security needs satisfaction of electronic security system users with the size of city. In other word, users in metropolis have higher environmental, psychological, and informational security needs satisfaction than users in provincial city. Second, there is also difference in life satisfaction. Namely, users in metropolis have higher security needs satisfaction than users in provincial city. Third, security needs satisfaction of electronic security system users by city size effects life satisfaction. That is, in case of users in metropolis, the more physical, environmental, and informational security needs satisfaction it shows, the more life satisfaction it showed.

A Study on the Partnership of the Japanese Police and Private Security (일본 경찰과 민간의 협력에 관한 연구)

  • Ahn, Hwang Kwon;Ahn, Chung Joon
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.61-70
    • /
    • 2012
  • The security law and security industry of Japan have a great impact on Korea. In a modern sense, there are little large disparities between the two nations in the history and development of private security. However, the way they look at private security is not the same in large part. In Japan, private security companies are highly regarded by Japanese people as organizations that guarantee their safety, owing to the efforts of private security companies themselves, the National Security Association and civic groups. Private security has especially been approved and supported since it was decided in the anticrime cabinet council in December, 2003, in line with the action plan for the realization of anticrime society to boost private security as an industry to ensure people's safety in daily routine life by curbing crimes that might pose a threat to peaceful life. Afterwards, there has been a dynamic collaboration between the Japanese police and private security in terms of education, crime prevention, disaster prevention/restoration and everyday life safety. As for Korea, the necessity of cooperation between private security and the police is increasingly stressed, and it's required to strengthen their partnership to ensure successful crime prevention in consideration of Japanese partnership cases. In Japan, the police, civic groups, the security association and security companies make every effort to satisfy Japanese people's safety needs in diverse ways and take disaster-prevention measures as well.

Korean Security Risk Management Framework for the Application of Defense Acquisition System (국방획득체계 적용 한국형 보안위험관리 프레임워크)

  • Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1183-1192
    • /
    • 2022
  • Information and Information processing systems must maintain a certain level of security during the total life cycle of Information. To maintain a certain level of security, security management processes are applied to software, automobile development, and the U.S. federal government information system over a life cycle, but theme of no similar security management process in Korea. This paper proposes a Korean-style security risk management framework to maintain a certain level of security in the total life cycle of information and information processing system in the defense sector. By applied to the defense field, we intend to present the direction of defense security work in the future and induce an shift in security paradigm.

A Design on the Information Security Auditing Framework of the Information System Audit (정보시스템 감리에서의 정보보호 감리모형 설계)

  • Lee, Ji Yong;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

New Approaches to the Formation of the Food System in Modern Conditions

  • Kulaiets, Andrii;Kulayets, Mariia;Shynkaruk, Lidiia;Kendus, Daria;Gerashchenko, Mykyta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.51-56
    • /
    • 2022
  • The main purpose of the article is to analyze the main approaches to the formation of the food system in modern conditions. The constant growth of the population, the increase in the level of use of natural resources against the background of a decrease in their reserves causes a number of risks for the food security of both a person and the country as a whole. The problem of the formation of food security has always remained at the center of scientific interests of both domestic and foreign researchers. In the context of globalization, this issue is considered as one of the key global problems in the system. Theoretical and metodological basis studia systematic approach to study of fundamental provisions of economic science regarding the formation of the food system. Based on the results of the study, the main approaches to the formation of the food system in modern conditions were characterized. The study has limitations associated with the lack of the ability to analyze the food system on the practical activities of a single socio-economic system.

Perception of Family financial Security and Satisfaction with Quality of Family Life - For Urban husband and Wives.- (가정경제안정도인지와 가정생활의 질 만족 -도시 기혼남.녀를 대상으로-)

  • 고보선;임정빈
    • Journal of Families and Better Life
    • /
    • v.10 no.2
    • /
    • pp.191-208
    • /
    • 1992
  • The study is focused on the perception of husbands and wives family financial security and satisfaction with quality of family life. Data was collected from the husbands and wives in Seoul. Eligibility was limited to family units with husband, wife, and at least one child. 852(Husbands:432, Wives: 420) out of 1200 respondents were finally selected as datum sources. The data was analyzed by Frequency, OneWay-ANOVA, t-test, Pearson' correlation and regression analysis. The major findings are the following: 1) In regard to the perception of family income adequacy, wives' perception was higher than husbands'. On the family financial problem, husbands had more experienced the financial problem than wives. 2) Marriage education, family income, husbands and wives education , and savings effected satisfaction with quality of family life. and husbands are more satisfaction with quality of family life than wives. 3) Determined the impact of the perception of family financial security on the satisfaction with quality of family life was 41% for wives and 33% for husbands, respectively.

  • PDF

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.