• Title/Summary/Keyword: safety and security management

Search Result 740, Processing Time 0.035 seconds

Affecting Factors on the Safety on School -Focusing on U.S Public School Security Guard Patterns- (학교 내 안전에 영향을 미치는 요인: 미국 공립학교의 경비활동 유형을 중심으로)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.137-163
    • /
    • 2013
  • This research will incorporate cases from U.S public schools to analyze the factors which influences the security within the school and efficient security patterns to suggest an adequate suggestion to elevate domestic school security system. This study is divided into two following models: a serious criminal offense model, which considers crimes occurred on campus as subordinate variables, and a school violence model, which considers as subordinate variables after limiting an act of delinquency and an a group action that can harm the safety of students, although they are not included in the categories of crimes. First, from analyzing the factors which influences security within school, the explanation power of serious crime offense safety model and school violence safety model is measured 12% and 11.3%. In serious crime offense safety model, the safety education for students, among the safety programs provided by schools(t=2.548, p=0.011), parent participation to school management(t=10.694, p=0.000), Security activities on campus(t=3.643, p=0.000), and CPTED activity(t=6.467, p=0.000) are statistically significant, as affecting factors on the safety from serious crimes. Similarly in school violence model, the safety education for students, among the safety programs provided by schools(t=3.228, p=0.001), parent participation to school management(t=12.034, p=0.000), security activities on campus(t=2.663, p=0.000), and CPTED activity(t=3.928, p=0.000) are statistically significant, as affecting factors on the safety from school violence. Second, according to the analytic results on figuring out the optimal pattern to heighten the security activities, the serious offence model's explanatory power was 4.4% and school violence safety model rated 3.9%. With the serious offense safety model, the activity factors which showed statistically significant in influencing safety from serious offenses were cooperation with local police force (t=2112, p=0.035), school policy management (t=3.309, p=0.001), security patrolling activity (t=2.548, p=0.011). In the school violence model, security activities initiated by the school which showed statistically significant from serious offenses were cooperation with local police force (t=2.364, p=0.018) and policy management (t=4.142, p=0.000). In accordance with the result of this study, education for students rather than education for teachers is more positive in terms of the safety on campus, and parent participation, like education, is consistently needed for the safety on campus. In case of CPTED activity, reinforcing plans should be prepared by intactly accepting examples in the USA. In case of security activity, plans that can increase visibility and reinforce cooperation with local police in a smooth way will provide a positive effect to the safety on campus.

  • PDF

A Study on Security Factors on Online Shopping - focus on internet bookshops -

  • Hua, Deng;Kim, Chang-Eun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.11a
    • /
    • pp.418-422
    • /
    • 2005
  • Electronic commerce has provided another access for consumers to purchase products, but some researches have pointed out that there are difficulties for companies to do business on web. For lack of trust, many people not prefer purchasing through virtual channels. Based on the literature review, this study aims at empirically testing the impact of website design on individual trust in internet firms. From statistic analysis, we will conclude that security, interaction, and navigation functionality will affect on-line trust.

  • PDF

Research on disaster management personnel improvement measure of local government

  • Young Ran Kim;JungHyun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.1-9
    • /
    • 2023
  • The purpose of this study is to examine the disaster management system of local governments by diagnosing the current status of disaster management experts in Korea, deriving problems and improvement measures, and looking at local governments' total labor cost system. The status and status of disaster management personnel were compared and analyzed to find ways to improve the local government's disaster management response system under the Framework Act on Disaster and Safety Management in Korea. Considering Korea's reality, because national security and disaster management exist together, we devised a plan to improve on-site response capabilities and seek solutions by deriving the problems of the currently operating security and safety-related organizations.

A Study on the Countermeasure of the Security Threats for Coastal Passenger Ships (연안여객선의 보안위협 대응방안에 관한 연구)

  • Ju, Jong-Kwang;Lee, Eun-Kang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.3
    • /
    • pp.199-206
    • /
    • 2007
  • In analyzing the security threats and their management system and making questions on security awareness to the concerned parties in the field of coastal passenger ship, we draw its security vulnerability and the features of security threats. The countermeasures and security system are proposed in order to response the diverse security threats and to set up the security culture of coastal passenger ship.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

A study on the precedent trend of safe port and its Implication (안전항 판례동향과 시사점에 관한 연구)

  • Kim, Taw-Woo;Lee, Won-Jeong
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.3
    • /
    • pp.93-99
    • /
    • 2010
  • As more than 90% of global trade is carried by sea there is little doubt that the safety of the ports at which the world's trading fleet call is of critical concern. The concept of 'safe port' continues to be an area of critical concern for charterers and ship-owners. In light of increased global security and health risks the recognised principles are under security. This paper examines the nature of safe port, and analyses the precedent trend of safe port and its Implication

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.