• Title/Summary/Keyword: private security

Search Result 1,397, Processing Time 0.033 seconds

A Study on the Direction of Policing for Effective Disaster Prevention and Management (효과적인 재난 예방 및 관리를 위한 경찰활동 방향)

  • Lee, Ju-Lak;Shin, So-Young
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.317-334
    • /
    • 2017
  • The burden of addressing the damage and financial losses caused by disaster events falls primarily on local governments. Given this reality, preparing for disasters and assessing the effects of disaster management would be more effective if both were carried out at the local level. However, disaster management in South Korea is realized at the national level, revolving around the central government. The Ministry of Public Safety and Security, which was newly established after the sinking of MV Sewol, was criticized for failing to carrying out its role as a "disaster control tower" in dealing with the earthquakes near the city of Gyeongju in 2016. The criticism, as well as deep anxiety concerning the ministry's ability to effectively respond to disasters, means that there is a need for a practical alternative plan to the current method of dealing with disasters. As such, there is an increasing call to re-examine the role of the police force, which played an integral part in past disaster response efforts, in future disaster events. Among the various activities the police force performs, this study focused on one particular role and function of the police, namely community policing. Specifically, this study examined community policing within the context of local governments. The primary purpose of community policing is crime prevention. But the police must respond to citizens' expectations and desires that the police expand the scope of its role. Thus, to maximize public safety and order, the police must be actively engaged in conducting disaster response activities. Hence, this study concentrated on the measures, including community policing, that need to be taken to enable the police to respond rapidly and effectively to disaster events, thereby minimizing losses, and to contribute meaningfully to disaster recovery efforts. Because community policing requires public cooperation, community-oriented disaster response and disaster management are closely examined. This study basically seeks to expand the scope of community policing to strengthen disaster safety. Furthermore, this study aims to assert that disaster safety can be promoted by establishing a cooperation system between the police and private security; changing how the role of community policing in disaster response activities is perceived; increasing professional manpower and establishing a comprehensive and independent department dedicated to disaster-related matters; and merging consultative organizations into one organization. Additionally, this study states that an integrated CCTV platform and police cars on disaster prevention patrol duties would enhance the capability of the police to respond to disasters and perform their community policing activities.

  • PDF

The Limitations of the Privatization of Social Security Programs : the American Workers' Compensation Program Case (산재보험 민영화의 한계 : 미국 산재보험 사례)

  • Cho, Young-Hoon
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.31-49
    • /
    • 2003
  • Neo-liberalism, the most influential ideology in the current world, argues for the commercialization of social security programs and for the dissolution of the interventionist welfare state. From the neo-liberal viewpoint, social services become more efficient and more advantageous for recipients, when provided by the market, not by the state. It is also argued that the welfare of all social members is best secured when the market freely operates without any interference from the state. From the neo-liberal point of view, an argument was raised to commercialize the state-administered Workers' Compensation program of Korea in the mid-1990s. This argument was faced with strong resistances from labor unions and social welfare circles, and has disappeared since the economic breakdown and the restructuring of Korean society during the late 1990s. Butr, such an argument can emerge anytime as the nee-liberal ideology become more powerful. This article aims to examine the neo-liberal argument that the privatization of social security programs, through an increases in efficiency, improves the interests of the recipients as well as the whole society. For this, this article attempts to analyze the Workers' Compensation programs of the USA, which, from state to state, are administered by the state government or by private insurance companies. This study can serve as an effective critique for the neo-liberal argument, if it finds that state-administered Workers' Compensation programs are more efficient than those managed by insurance companies. This article's another aim is to assess the controversies over the privatization of the Workers' Compensation program of Korea during the mid to late 1990s. The controversies were more about which viewpoint is right and, in most cases, lacked empirical evidence. This study shall empirically criticize the argument for the privatization of the Workers' Compensation program.

  • PDF

A Study on Actual Conditions of Preschool Education for Activation of Public Education (공교육 활성화를 위한 유아교육 현황 분석)

  • Jeong, Kyoung Hwa;Kwon, Eun Joo
    • Korean Journal of Childcare and Education
    • /
    • v.2 no.1
    • /
    • pp.65-88
    • /
    • 2006
  • This study intended to activate public education, researched and analyzed real conditions of preschool education to know desirable directions of public education and help parents recognize public education. The final purpose is to offer basic materials to reestablish preschool education in the public education system. First, parents' recognition concerning preschool education in the public education system was much different from that of teachers. As for definitions of preschool education as a public education, parents understood that it means 'the nation and self-governing bodies manage aid both the public and private kindergartens', and teachers recognized that it means that 'the nation and self-governing bodies not only found operate public kindergartens but also aid manage educational funds of private kindergartens. Second, the examination of educational environments of kindergartens told that teachers and parents thought that opportunity to enter the kindergarten is not equal for all children in our country, and quality of kindergarten teachers is satisfactory. Also, they thought that curriculums of preschool educational organs have been set well according to children's developmental stages, education quality is different according to preschool education organs' foundation-types. They recognized that facilities and apparatus of preschools are satisfactory, security and neatness of preschools are satisfactory, too. Third, the examination of developmental directions of preschool education as a public education proved following facts; as for foundation-types of kindergartens in the future when promoting preschool education as a public education, parents answered financial support and supervision by the government, teachers answered aid and management of operational fees as well as support for teacher personnel expenses.

  • PDF

Composting Method and Physicochemical Characteristics of By-products from Home Garden Plants and Small Herbivore Feces (옥수수 부산물과 토끼 분변의 이화학적 성분특성 및 퇴비 제조조건)

  • Kim, Dae-Gyun;Kim, Jin-Young;Lee, Won-Suk;Kim, Hye-Hyeong;Seo, Myung-Whoon;Park, In-Tae;Hyun, Junge;Yoo, Gayoung
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.6
    • /
    • pp.695-703
    • /
    • 2018
  • This study was conducted to suggest a sustainable farming practice forresource recycling in vegetable gardens of North Korea. In North Korea, farmers are allowed to own private vegetable gardens less than $100m^2$. However, usage of fertilizers in private vegetable gardens is very limited due to economic sanctions by UN security council. If North and South Korea initiated the cooperative action in the near future, agricultural sector would be the highest priority cooperation area. Considering the current North Korean situation in agriculture, we would like to suggest a method for producing organic fertilizer manure. For raw materials for producing manure, we selected corn byproduct, which is the most abundant material, and rabbits' feces, which are easily obtained from individual private farms in North Korea. As we cannot get corn byproducts and rabbits' feces from North Korea, we prepared samples of corn byproducts and rabbits; feces from many places in South Korea. After statistical analysis of variance, there was no significant difference in the T-N contents of corn byproducts from Gyeonggi, Gangwon, Chungnam, Chungbuk, Jeollabuk and Gyeongsangnam-dos, which indicates that the fertilizing quality of corn byproducts does not vary significantly in the spatial scale of South. Korea. In this sense, if we use corn samples from Gyeonggi province, they would not be very different from those of North Korean regions. Physicochemical properties of rabbits' feces were different between those eating feed grains and those eating plants only. Hence, we used rabbits' feces of the rabbits from Yeonchun area, which were fed by plants only. Using three different mixing ratios of corn byproducts and rabbits' feces, composting was conducted for 60 days. The mixing ratio of 1:1 produced the manure with % T-N of 1.98% and OM/N ratio of 31.7 after 30 days of composting, which is comparable to the quality of commercial manure.

Retail Product Development and Brand Management Collaboration between Industry and University Student Teams (산업여대학학생단대지간적령수산품개발화품패관리협작(产业与大学学生团队之间的零售产品开发和品牌管理协作))

  • Carroll, Katherine Emma
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.3
    • /
    • pp.239-248
    • /
    • 2010
  • This paper describes a collaborative project between academia and industry which focused on improving the marketing and product development strategies for two private label apparel brands of a large regional department store chain in the southeastern United States. The goal of the project was to revitalize product lines of the two brands by incorporating student ideas for new solutions, thereby giving the students practical experience with a real-life industry situation. There were a number of key players involved in the project. A privately-owned department store chain based in the southeastern United States which was seeking an academic partner had recognized a need to update two existing private label brands. They targeted middle-aged consumers looking for casual, moderately priced merchandise. The company was seeking to change direction with both packaging and presentation, and possibly product design. The branding and product development divisions of the company contacted professors in an academic department of a large southeastern state university. Two of the professors agreed that the task would be a good fit for their classes - one was a junior-level Intermediate Brand Management class; the other was a senior-level Fashion Product Development class. The professors felt that by working collaboratively on the project, students would be exposed to a real world scenario, within the security of an academic learning environment. Collaboration within an interdisciplinary team has the advantage of providing experiences and resources beyond the capabilities of a single student and adds "brainpower" to problem-solving processes (Lowman 2000). This goal of improving the capabilities of students directed the instructors in each class to form interdisciplinary teams between the Branding and Product Development classes. In addition, many universities are employing industry partnerships in research and teaching, where collaboration within temporal (semester) and physical (classroom/lab) constraints help to increase students' knowledge and experience of a real-world situation. At the University of Tennessee, the Center of Industrial Services and UT-Knoxville's College of Engineering worked with a company to develop design improvements in its U.S. operations. In this study, Because should be lower case b with a private label retail brand, Wickett, Gaskill and Damhorst's (1999) revised Retail Apparel Product Development Model was used by the product development and brand management teams. This framework was chosen because it addresses apparel product development from the concept to the retail stage. Two classes were involved in this project: a junior level Brand Management class and a senior level Fashion Product Development class. Seven teams were formed which included four students from Brand Management and two students from Product Development. The classes were taught the same semester, but not at the same time. At the beginning of the semester, each class was introduced to the industry partner and given the problem. Half the teams were assigned to the men's brand and half to the women's brand. The teams were responsible for devising approaches to the problem, formulating a timeline for their work, staying in touch with industry representatives and making sure that each member of the team contributed in a positive way. The objective for the teams was to plan, develop, and present a product line using merchandising processes (following the Wickett, Gaskill and Damhorst model) and develop new branding strategies for the proposed lines. The teams performed trend, color, fabrication and target market research; developed sketches for a line; edited the sketches and presented their line plans; wrote specifications; fitted prototypes on fit models, and developed final production samples for presentation to industry. The branding students developed a SWOT analysis, a Brand Measurement report, a mind-map for the brands and a fully integrated Marketing Report which was presented alongside the ideas for the new lines. In future if the opportunity arises to work in this collaborative way with an existing company who wishes to look both at branding and product development strategies, classes will be scheduled at the same time so that students have more time to meet and discuss timelines and assigned tasks. As it was, student groups had to meet outside of each class time and this proved to be a challenging though not uncommon part of teamwork (Pfaff and Huddleston, 2003). Although the logistics of this exercise were time-consuming to set up and administer, professors felt that the benefits to students were multiple. The most important benefit, according to student feedback from both classes, was the opportunity to work with industry professionals, follow their process, and see the results of their work evaluated by the people who made the decisions at the company level. Faculty members were grateful to have a "real-world" case to work with in the classroom to provide focus. Creative ideas and strategies were traded as plans were made, extending and strengthening the departmental links be tween the branding and product development areas. By working not only with students coming from a different knowledge base, but also having to keep in contact with the industry partner and follow the framework and timeline of industry practice, student teams were challenged to produce excellent and innovative work under new circumstances. Working on the product development and branding for "real-life" brands that are struggling gave students an opportunity to see how closely their coursework ties in with the real-world and how creativity, collaboration and flexibility are necessary components of both the design and business aspects of company operations. Industry personnel were impressed by (a) the level and depth of knowledge and execution in the student projects, and (b) the creativity of new ideas for the brands.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

A Study on Improvement of the police disaster crisis management system (경찰의 재난위기관리 개선에 관한 연구)

  • Chun, Yongtae;Kim, Moonkwi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.556-569
    • /
    • 2015
  • With about 75% of the population of Korea criticizing the government's disaster policy and a failure to respond to large-scale emergency like the Sewol ferry sinking means that there is a deep distrust in the government. In order to prevent dreadful disasters such as the Sewol ferry sinking, it is important to secure a prime time with respect to disaster safety. Improving crisis management skills and managerial role of police officers who are in close proximity to the people is necessary for the success of disaster management. With disaster management as one of the most essential missions of the police, as a part of a national crisis management, a step by step strengthening of the disaster safety management system of the police is necessary, as below. First, at the prevention phase, law enforcement officers were not injected into for profit large-scale assemblies or events, but in the future the involvement, injection should be based on the level of potential risk, rather than profitability. In the past and now, the priortiy was the priority was on traffic flow, traffic communication, however, the paradigm of traffic policy should be changed to a safety-centered policy. To prevent large-scale accidents, police investigators should root out improper routines and illegal construction subcontracting. The police (intelligence) should strengthen efforts to collect intelligence under the subject of "safety". Second, with respect to the preparatory phase, on a survey of police officers, the result showed that 72% of police officers responded that safety management was not related to the job descriptions of the police. This, along with other results, shows that the awareness of disaster safety must be adopted by, or rather changed in the police urgently. The training in disaster safety education should be strengthened. A network of experts (private, administrative, and police) in safety management should be established to take advantage of private resources with regard to crisis situtions. Third, with respect to the response phase, for rapid first responses to occur, a unified communication network should be established, and a real-time video information network should be adopted by the police and installed in the police situation room. Fourth, during the recovery phase, recovery teams should be injected, added and operated to minimize secondary damage.

A Practical Approach to Implement QoS in Broadband Access Networks (광대역 접속망에서 QoS 구현을 위한 현실적 접근법)

  • Park Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.277-287
    • /
    • 2006
  • Most of the existing broadband access networks based on DSL, cable modem, and Ethernet support the best-effort internet access service, and adopt the flat rate pricing mechanism. It is almost impossible to provide the differentiated communication services, in current broadband access networks, for the different users and/or the different application services. Currently, however, the advances in multimedia, communication, and security technologies push the interactive and/or streaming multimedia services and VPN services to be widely deployed over Internet, and they require more QoS-sensitive services than the best-effort service. Though various QoS technologies such as RSVP-based IntServ and DiffSern were already developed and under standardization in Internet world, it is impractical to replace the existing QoS-unaware access networks with the QoS-enabled ones at a time to deploy QoS-sensitive services. In this paper, after analyzing current broadband access network architectures and the status of QoS support, we propose a practical approach to support multimedia QoS in the broadband access networks. The approach will be based on the integration of the differentiated pricing and the DiffServ technology. And it will be a step-wise approach to support backward compatibility with the legacy broadband access networks as much as possible.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.