• Title/Summary/Keyword: public security agency

Search Result 143, Processing Time 0.024 seconds

Decision Tree Analysis for Prediction Model of Poverty of The Older Population in South Korea

  • Lee, Soochang;Kim, Daechan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.28-33
    • /
    • 2022
  • This study aims to investigate factors that affect elderly poverty based on a comprehensive and universal perspective, suggesting some alternatives for improving the poverty rate of the elderly. The comprehensive and universal approach to the poverty of the aged that this study attempts can give a better understanding of the elderly poverty beyond the contribution of the existing literature, with the research model including individual, family, labor, and income factors as the causes of old-age poverty from the comprehensive and universal perspective on the causes of poverty of the elderly. In addition, the study attempts to input variants of variables into the equation for the causes of elderly poverty by using panel data from the 8th Korean Retirement and Income Study. This study employs decision tree analysis to determine the cause of the poverty of the elderly using CHAID. The decision tree analysis shows that the most vital variable affecting elderly poverty is making income. For the poor elderly without earned income, public pensions, educational careers, and residential areas influence elderly poverty, but for the poor elderly with earned income, wage earners and gender are variables that affect poverty. This study suggests some alternatives to improve the poverty rate of the aged. The government should create a better working environment such as senior re-employment for old people to be able to participate in economic activities, improve public pension or social security for workers with unfavorable conditions for public security of old age, and give companies that create employment of the aged diverse incentives.

A Research on Institution's Countermeasure for Personal Information Protection Act Based on the Examples of Performing the Privacy Impact Assessment (개인정보 영향평가 수행 사례에 기반한 기관의 개인정보보호법 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.89-98
    • /
    • 2012
  • According to the enforcement of Personal Information Protection Act as of September 2011, the laws and regulations for the protection of personal information that were applied only to the certain sectors such as information & communication network, financial institutions, public sector etc. for the time being has been expanded to apply to all public and private sectors to process personal information. In particular, because the public institutions are obliged to be mandatorily conducted of the Privacy Impact Assessment, it will be enforced in earnest for each agency's informationization business that handles personal information. In this paper, I examine the most derived vulnerability and set up the improvement measure to supplement it with the examples of 10 of all the institutions conducting the Privacy Impact Assessment in the year 2011. And, I suggest the measures to be prepared by the institutions to observe the Personal Information Protection Act.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.

A Study on the Analysis and Improving Measure of Public Relations Activities of Korea Coast Guard (해양경찰 홍보실태 진단 및 강화방안)

  • Lee, Kyu Ik;Shin, Yong-John
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1011-1022
    • /
    • 2021
  • The Korea Coast Guard(KCG) is the only comprehensive maritime administrative agency in Korea that performs various tasks taking place in the ocean, including rescue operations, disaster management, policing, Drug and smuggling crackdown, responding to Response to invasion of maritime territory, environmental conservation, and maritime security. It is vital to inform the public of the role and mission of KCG as the only comprehensive maritime administrative agency in Korea. However, most citizens, excluding residents of the coastal and island areas, have little knowledge of the security administration services of the KCG due to lack of exposure. This study reviewed the KCG's public relations(PR) organization and current status using KCG promotional materials, diagnosed the actual conditions of KCG's PR, and suggested ways to improve public relations activities through a questionnaire survey of public relations personnel. Through literature research and questionnaire survey, the KCG's public relations status was estimated and the measures to enhance publicity was derived as follows: strengthening the PR organization by reinforcing the personnel in charge of PR, improving customized promotion by clarifying the promotion strategy according to the promotion target, enhancing job training for PR personnel, and increasing the interest and support of commanders and internal members in charge of PR work.

A case study on the building of integrated CCTV control center at Busan metropolitan city (부산광역시 CCTV통합관제센터구축 사례연구)

  • Kwon, Chang-Hwan;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.191-202
    • /
    • 2011
  • Public agencies and local governments have been installing CCTV cameras for the prevention of crime, traffic jam, and unauthorized waste. Additionally, national government agencies and schools, a special corporation by special law, local construction and industrial company installed CCTV cameras of their own and are operating them. Various types of CCTV systems disclosed technical heterogeneity. In February, 2011, Ministry of Public Administration and Security presented guidelines for building an integrated control center. This study examines the case of Busan by using the administrative guidelines. Busan integrated CCTV control center among themselves, police agency and fire department. This study looks into the potential problems with the integration process of CCTV cameras and proposes a solution to them.

A study of the Domestic Trend in the law and institutions of International Standard Disaster Management -Focusing on ISO/TC 292- (재난관리 관련 국제표준별 국내 법·제도 동향 -ISO/TC 292 중심으로-)

  • Yun, Junyoung;Min, Geumyoung;Jung, Dukhoon
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.2
    • /
    • pp.287-296
    • /
    • 2015
  • In this study, international standards in disaster management and the management of the relevant International Standards Organizations(ISO), in particular ISO / TC 292 (Security- Safety) research subcommittee to look at international standards of relevant international standards for disaster management trends, each international domestic law related to the standard were researched. National Disaster Management Authority as a Ministry of Public Safety and Security (formerly the National Emergency Management Agency) has continued to prepare a plan for applying national disaster management relevant to the international standards. As the disaster management international standard continues to be established, disaster management agencies need to continue to keep pace with the international community to find ways to introduce international standards.

Reliability of the Ubiquitous Home-Based Simulator Developed for the Eerror Control (유비쿼터스 홈 기반의 신뢰성 제공을 위한 오류 제어 시뮬레이터 개발)

  • Lee, Si-Heung;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5885-5894
    • /
    • 2011
  • Ubiquitous environment is expected to be result of researches and studies in ubiquitous home base on. However, because of the complexity of the ubiquitous home base on, the realization of error handling seems impossible. In this paper, we present how to detect and recover from these errors for the Ubiquitous Home utilizing a fault simulator developed for the study and through a variety of experiments, results were discussed and analyzed. Base on the said results, future works are also discussed.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

An Assessment and Policy Implication of Information Technology Convergence Programs in Korean Public Service Area (공공부문 IT신기술 적용사업의 추진현황 평가와 정책적 시사점)

  • Kim, SungHyun
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.1-16
    • /
    • 2012
  • Information technology is a useful strategic weapon that can create competitive advantage and new business opportunity by applying it in the organization' value chain. IT convergence can be understood as an attempt of industrial level IT adoption to facilitate the innovation of the industry and the birth of a new industry. This study provides the comprehensive review of the Korean government' three IT assimilation programs, ubiquitous technology diffusion program of the Ministry of Knowledge Economy, u-service program of the Ministry of Public Administration and Security, and u-Defence cooperation program of the Department of Defense. The analysis is done through the interpretation of the existing literature and the logic model. The result proposes inter-agency cooperation and building of new technology road-map in the planning stage, flexible management in the execution phase, and failure tolerant evaluation system. The proposal for developing competencies and institutional foundations for IT convergence also presented.