• Title/Summary/Keyword: private security market

Search Result 98, Processing Time 0.025 seconds

A Study on the License & Training System of Security Agent in Japan (일본 민간경비원의 자격 및 훈련제도에 관한 연구)

  • Jo, Yong-Chul;Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.339-356
    • /
    • 2008
  • This study discusses some topics of Security License System and Security Training System in Japan. Especially, the Security License must be very influence that the growth of security industry. And it's true that a few enlightened approach to cooperation between police and private security has already begun to take place in some divisions. The most important thing of the License Test System in Japan is the method of test rule and test section. Then the training systems of the security agent have been very impressive rule and the system for security agent. Today, the market of the security industry in Korea have been going to develop and extend to the future industry. The assignments that are leaved to security industry in Korea must be that the improvement of the License & Training System of Security Agent in Korea should be made effort by the security industry and the public section that looks like the police.

  • PDF

Digital Forensic Investigation of Virtual Desktop Infrastructure (가상 데스크톱 환경에 대한 디지털 포렌식 연구)

  • Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.203-212
    • /
    • 2013
  • Recently, cloud computing is one of the parts showing the biggest growth in the IT market and is expected to continue to grow into. Especially, many companies are adopting virtual desktop infrastructure as private cloud computing to achieve in saving the cost and enhancing the efficiency of the servers. However, current digital forensic investigation methodology of cloud computing is not systematized scientifically and technically. To do this, depending on the type of each cloud computing services, digital evidence collection system for the legal enforcement should be established. In this paper, we focus on virtual desktop infrastructure as private cloud computing and introduce the most widely used around the world desktop virtualization solutions of VMware, Citrix, and Microsoft. And We propose digital forensic investigation methodology for private cloud computing that is constructed by these solutions.

A Risk Management of Architectural Planning Phase in the Korea Private Infrastructure Project Using Project Financing (프로젝트 파이낸싱을 활용한 국내 SOC 민간투자사업 건축기획 단계에서의 리스크 관리)

  • Lee, Sin-young;Kim, Seon-Gyoo;Lee, Nak-Woon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.177-184
    • /
    • 2007
  • Project Financing(PF) was introduced from the way of banks' conditional financing that take buried oil as security and offer required money to oil explores which have weak loaning ability in the U.S. 1930s. After that PF has developed with financial market and it has been activated in the market of Korea since 'An Institution about Private Financing Invitation Promotion' was established. Started with I-Hwa Ryoung tunnel project, PF has been used in the Metropolitan Area Airport Highway and etc. But because of the risk that occurred by PF's complexity and uncertainty, PF has not been used fully and there are only few practical examples. The purpose of the present study is to investigate how to decrease, identify and extract the risky factors of project that being planned by PF.

  • PDF

The Influence of Perception and Attitudes of Inpatients Towards the Activation of Private Health Insurance (민간의료보험 활성화에 대한 입원환자의 인식 및 태도에 미치는 영향 - 서울시내 일개 종합병원을 대상으로 -)

  • Yoon, Soo-Jin;Kim, Seong-Ju;Yu, Seung-Hum;Oh, Hyohn-Joo
    • Korea Journal of Hospital Management
    • /
    • v.13 no.1
    • /
    • pp.24-41
    • /
    • 2008
  • This research is aimed at analyzing and understanding the perception and attitudes of inpatients in a general hospital in Seoul towards the activation of private health insurance. Survey was conducted against 231 inpatients, results of which were analyzed in the methods of frequency analysis, chi square test, and logistic regression. The results are summarized as follows; First, better-educated population who finished college education at least, higher-income population, and people who had more knowledge about private health insurance showed more perception about activation of private health insurance. Second, better-educated population who finished college education at least, higher-income population, those who are insured in existing private insurance, oncological patients, and people who had more knowledge about private health insurance showed more positive attitude towards private health insurance paying for actual damages, long-term care insurance, and income security insurance. Third, age and education were the factors affecting perception about activation of private health insurance. The older the age is, perception was 1.035 times positive towards activation of private health insurance, and those who finished college education or above showed 3.148 times positive perception towards the same. Forth, surgical patients showed 1.087 times more positive attitude towards private health insurance paying for actual damages than internal medicine patients, while oncological patients showed 2.314 times more positive attitude than internal medicine patients. Further, understanding on the activation of private health insurance was 6.014 times higher in the higher understanding group than in the lower understanding group. Intention to use long-term care insurance was 2.692 times stronger in the male group than in the female group, and 3.616 times stronger in the oncological patients group than in internal medicine patients group. Further, understanding on the activation of private health insurance was 3.881 times deeper in the higher understanding group than in the lower understanding group. Intention to use income security insurance was 3.185 times stronger in those who have academic background of under the high school than those over the college, and 4.175 times higher in the group those whose monthly average income is over 4 million won than those under 4 million won. Also, intention to use income security insurance was 4.323 times higher in the group those who are insured by existing private insurances than those who are not insured by those insurances and it was 5.234 times higher in the group of oncological patients than in the group of internal medicine patients. Further, intention to use income security insurance was 3.559 times higher in the group those who thought that out-of-pocket money of the National Health Insurance is too much to bear than those it is quite endurable. Understanding on the activation of private health insurance was 4.875 times deeper in the higher understanding group than in the lower understanding group. There were some suggestions could be made based on the results of this research. First, reinforced publicity and education is needed for the low-educated or low-income group, as there are gaps in the understanding on the activation of private health insurance depending on the degree of education and income. Second, government should prepare administrative complementary measures to solve the problem of adverse selection by the consumer which is foreseen when private health insurances are activated. Third, government should suggest the desirable course of development of private health insurance items to ensure efficient use of enormous fund of private insurance market for health security of the people. Further, institutional complementary measures are needed to convert existing cancer insurances or specific disease insurances to private health insurances paying for actual damages guaranteeing against every kind of disease. Forth, it judged that, not only private health insurances paying for actual damages, but also long-term care insurances and income security insurances are prospective as fields to create fresh demand for insurance industry.

  • PDF

Modelling and Factor Analysis of Pricing Determinants in the State-Regulated Competitive Market: The Case of Ukrainian Flour Market

  • Dragan, Olena;Berher, Alina;Plets, Ivan;Biloshkurska, Nataliia;Lysenko, Nataliia;Bovkun, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.211-220
    • /
    • 2021
  • The aim of the study is to implement a factor analysis of the determinants of pricing in a state-regulated competitive market using economic and mathematical modelling methods and to develop ways to improve the pricing environment of the market under study. The purpose of the work defines the main objectives: (i) to investigate the features of the competitive model of the Ukrainian flour market; (ii) to analyse the current price conjuncture of the flour market and the dynamics of the main determinants of pricing; (iii)to develop ways of improving the price situation on the flour market on the basis of the factor analysis on the results of economic and mathematical modelling. In order to ensure the reliability and validity of the research results, the following methods were applied: the logical-dialectical method of scientific knowledge in the study of the main theoretical aspects of flour market functioning, the method of logical generalisation and synthesis, comparison, factor analysis, correlation and regression analysis, the graphical method, etc. It has been shown that pricing in a state-regulated competitive market has its own characteristics. For example, in the flour market the price of goods cannot be influenced by producers (sellers) by any methods, therefore determinants of pricing by indirect influence have been taken into account. The five-factor power model of wheat flour price has been constructed. It was substantiated that the price of wheat flour in Ukraine is mostly influenced by consumer price index (0.92 %). The received complex model of wheat flour price may be used also for medium-term forecasting and working out the ways of price formation optimization in the flour market.

Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System

  • Prakash Kuppuswamy;Saeed QY Al Khalidi;Nithya Rekha Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.196-204
    • /
    • 2024
  • The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

A qualitative Research on Establishment of Department of Private Investigation and Its Future Direction (민간조사학과 개설의 필요성과 성장방향에 대한 질적 연구)

  • Jo, Sung-Gu;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.181-205
    • /
    • 2011
  • There are various discussions about introducing private investigation in South Korea these days, and training private investigators is one of the main topics. Training private investigators, unlike other training, is required to instill expertise and ethical quality into the trainees since the major task of the investigators includes protecting the lives of the citizens as well as their properties. Therefore, many agree to the idea that systematic educational programs need to be organized to produce private investigators with expertness and morality. In this study, we explored the opinions of those who are concerned with this issue of establishing private investigation in the university education and analyzed the data by using the NVivo 2 program. The result revealed that the reasons that people supported the idea of launching private investigator services were as follows. First, there is lack of manpower to maintain peace and public order in the country. Second, the police does not intervene actively and help harmed victims unless it is a consequential incident. Third, in position to wield public power, police officers cannot get involved in civil affairs. Also, absence of an academic institution to educate private investigators and lack of the police and clients' trust in private investigation were the two biggest reasons that people approved the proposal to introduce department of private investigation in universities. The interviewees of the study believed the outlook and future direction for private investigation would change depending on the status of the licensed private investigation business bill. Before the bill passes, they thought that the work of private investigators will be performed by insurance companies, foreign private investigation businesses, domestic consulting firms, and security providers which supply similar services. On the other hand, after the bill passes, they believed that numerous private investigator corporations resembling existing security corporations will be founded in addition to the current market, and that private investigation in the academic field will also be vitalized.

  • PDF

Retirement Age and Social Security (정년제도와 사회보장 : 1980년 이후 OECD 회원국들의 노후 소득보장 정책의 변화)

  • Na, Byong-Kyun
    • Korean Journal of Social Welfare
    • /
    • v.42
    • /
    • pp.169-198
    • /
    • 2000
  • This paper attempts to analyze the early retirement in the OECD countries and discuss implication of that in the old age policy in Korea. The increase of the early retirement in the almost all OECD countries is a common fact. Especially the rate of early retirement rapidly increased in the 1980s, mostly reflecting the high rate of unemployment and states' policies to reduce it. However, it varies across countries: the unemployment compensation pathway in France, the mixture of social assistance and private insurance in England, VUT in Netherland, the privatization of the early retirement in the U. S., and partial retirement and labor market policy in Sweden. The early retirement in the advanced countries contributes to de-institutionalization and de-standardization in life course model. It resulted in the erosion of the ordinary conception that the retirement was the beginning of the old age. And the last phase of life course became blurred. With respect to the problem of the early retirement, there is a big difference between Korea and the OECD countries. Above all, the retirement age is 55 years in many companies and the public pension is not universalized in Korea. Accordingly the policy for income security of the old age in Korea should be connected with social security policy such as the gradual extension of the retirement age and the expansion of the public pension and labor market policy such as job training for the old age, transformation of the seniority wage system etc.

  • PDF