• Title/Summary/Keyword: life security

Search Result 1,266, Processing Time 0.033 seconds

Policing the police service quality, service satisfaction and life satisfaction relationship (경찰의 치안서비스품질과 서비스만족 및 생활만족의 관계)

  • Ahn, Dong Hyon;Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.71-81
    • /
    • 2014
  • The purpose of this research is to find out the relationship among the quality of service, the satisfaction of service and the satisfaction of life in public security of Police. This research made by Final Judgment based on Seoul Citizens living in Seoul as a focus group, total number of citizens for final analysis is 491. The research consists of 60 questionnaires shows frequency analysis, factor analysis, reliability analysis, multiple regression, path analysis by SPSSWIN 18.0 and reaches the following. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.607. results; First, the quality of service in public security of Police in fluences the satisfaction of service. Second, the quality of service in public security of Police in fluences the satisfaction of life. Third, the satisfaction of service in public security in fluences the satisfaction of life. Fourth, the quality of service in public security of Police in fluences the satisfaction of service in public security and the satisfaction of life directly and indirectly.

Analysis of Relation between Safety Needs and Life Satisfaction of Security Safety System Users (경비안전시스템 이용자들의 안전욕구와 생활만족에 대한 관계 분석)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.141-148
    • /
    • 2018
  • The purpose of this study is to analyze the safety needs and life satisfaction of users of security system. The contents of the questionnaire consisted of "safety need, use satisfaction, life satisfaction". As a result of the analysis, Chronbach's alpha coefficient was calculated as 0.897 for safety needs, 0.888 for use satisfaction, and 0.887 for life satisfaction. The items were found to have internal consistency. In the validation of discriminant validity, both AVE and CR values were found to be 0.6 or more than the reference value of 0.8. The intuitiveness of the variables used in this study was found to be largely secured. As the hypothesis test result, the standardization factor was calculated as 0.993 for 'safety needs ⇨ use satisfaction' and 0.453 for 'use satisfaction ⇨ life satisfaction', and both hypotheses were positive. As a result of the verification, it was analyzed that the higher the user's safety needs, the higher the use satisfaction, and the higher the use satisfaction, the higher the life satisfaction.

  • PDF

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle (소프트웨어 생명주기 단계별 사이버보안 평가 방법론 제안)

  • Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.363-374
    • /
    • 2015
  • Instrumentation and control(I&C) system has been mainly designed and operated based on analog technologies in existing Nuclear Power Plants(NPPs). However, As the development of Information Technology(IT), digital technologies are gradually being adopted in newly built NPPs. I&C System based on digital technologies has many advantages but it is vulnerable to cyber threat. For this reason, cyber threat adversely affects on safety and reliability of I&C system as well as the entire NPPs. Therefore, the software equipped to NPPs should be developed with cyber security attributes from the initiation phase of software development life cycle. Moreover through cyber security assessment, the degree of confidence concerning cyber security should be measured and if managerial, technical and operational work measures are implemented as intended should be reviewed in order to protect the I&C systems and information. Currently the overall cyber security program, including cyber security assessment, is not established on I&C systems. In this paper, we propose cyber security assessment methods in the Software Development Life Cycle by drawing cyber security activities and assessment items based on regulatory guides and standard technologies concerned with NPPs.

Moderated Mediating Effect according to the Severity Level of a Disability and Mediating Effect of Job Security in the Relationship between Difficulties in the Workplace of the Disabled Wage Workers caused by the COVID-19 Pandemic and Their Life Satisfaction (장애인의 코로나19로 인한 직장 내 어려움과 생활만족도의 관계에서 고용안정성의 매개효과 및 장애중증여부의 조절된 매개효과)

  • Jung, HyoungJin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.679-689
    • /
    • 2021
  • The objective of this study is to verify the moderated mediating effects according to the severity level of a disability as well as the mediating effects of job security in the relationship between difficulties in the workplace of the disabled wage workers caused by the COVID-19 pandemic and their life satisfaction. As a result of analysis using SPSS ver. 25 and PROCESS macro, the difficulties within the workplace caused by the COVID-19 pandemic had a negative influence on life satisfaction through the job security of the disabled wage worker. In other words, it was revealed that the level of difficulties being faced by the disabled wage workers, which were caused by the COVID-19 pandemic, hinders their life satisfaction through job security. In addition, no moderating effect according to the severity level of disability was identified in the relationship between these variables. This is translated that difficulties in the workplace caused by the COVID-19 pandemic reduce job security and life satisfaction of the disabled wage workers regardless of the severity level of the disability. Based on the results thus far, this study further discussed the institutional implications for promoting the job security and life satisfaction of the disabled wage workers under the COVID-19 pandemic situation.

An Economic Perspective on Food Security

  • Seung-Ryong Yang
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.9-9
    • /
    • 2022
  • The concept of food security has gained increasing attention during the food crisis period between 2006 and 2011. According to the FAO, food security is defined as an access by all people at all times to the food needed for healthy and active life. Achieving food security means that sufficient food is available, food supply is relatively stable, and those in need of food can afford food at a reasonable cost. After a short period of stable food prices the world is facing another food crisis due mainly to the COVID-19 pandemic and the Russian invasion over Ukraine. Food security has re-emerged as an urgent problem to the world. There have been two conflicting opinions about how to achieve food security. Agricultural exporting countries insist diversification of food sources and freer trade on the top of domestic self-reliance. On the other hand, food importing countries emphasize self-sufficiency of major food crops. This study investigates whether domestic agricultural production contributes to strengthening food security. The panel data analysis shows that the increase in food self-sufficiency raises the Global Food Security Index and lessens the probability of food riots, while lower import tariffs (implying freer trade) do not. Some related issues are discussed accordingly.

  • PDF

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

5th Generation Wireless Networks Security: Challenges and Solutions

  • Siddiq, Bashayer Ahmed Bin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.157-162
    • /
    • 2022
  • In reason of the high capacity and low latency, the 5G wireless networks used nowadays in many of life applications such as: remote surgery and guiding vehicle. The high requirements of 5G networks makes it more vulnerable for security threats and attacks. This paper presents some challenges faced by 5G networks and presets some of the security solutions.

A Study on the Relation to Life Style and Housing Satisfaction of High School Students (고등학생의 생활양식과 주거만족도와의 관련 연구)

  • 곽경숙;김정희
    • Korean Journal of Human Ecology
    • /
    • v.6 no.2
    • /
    • pp.13-25
    • /
    • 2003
  • The purpose of this study was to clarify the relationship between life style and housing satisfaction of high school students. This is the investigation of which 1015 high school students live in Chonbuk province. In this statistical analysis, SPSS program was utilized to calculate percentage, mean and standard deviation. Also. these materials were verified by t-test, one-way ANOVA, Pearson's correlation coefficient. The main results of this study were as follows. There was a significant difference between life style and housing satisfaction, according to demographic variables and housing characteristic variables. The entire life style has been appeared high type of a along with PC. Most of students has been appeared high in health and security of housing. Also, correlation of life style and housing satisfaction showed significantly. On the basic of these results, it can be suggested : It is necessary to have the righteous understanding about life style and housing satisfaction, of high school students for advisable guidance of housing education. It needed to continue diversified researches considering spread of life style 'with PC' and enough awareness of health and security in housing satisfaction.

  • PDF