• Title/Summary/Keyword: security activity

Search Result 598, Processing Time 0.027 seconds

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Relationship between Perceived Neighborhood Characteristics and Vigorous Physical Activity among Adult Seoul Residents

  • Lee, Chung-Gun;Cho, Young-Tae
    • Journal of Preventive Medicine and Public Health
    • /
    • v.42 no.4
    • /
    • pp.215-222
    • /
    • 2009
  • Objectives : Vigorous physical activity is a well-known method to promote people s health. This research aims to investigate whether perceived neighborhood characteristics affect vigorous physical activity among adult Seoul residents (aged 19 to 64). Methods : Utilizing the 2005 Seoul Citizens Health Indicators Survey data, this study estimates the probability of vigorous physical activity. Particular attention is given to the effects of three perceived neighborhood characteristics satisfaction with relationship to the neighborhood, satisfaction with park and recreational facilities, and satisfaction with public security). Logistic regression models are analyzed separately by gender for the parameter estimation. Results : Vigorous physical activity is positively associated with three perceived neighborhood characteristics for women, while neither significant nor substantive association is found for men. Conclusions : As vigorous physical activity among Seoul citizens is differentially affected by perceived neighborhood characteristics and by gender, a different approach will be needed to increase vigorous physical activity of men and women in Seoul.

A Common Data Model for Bridge Management and Maintenance Activities (교량 유지관리 업무를 위한 공통 자료모델)

  • Lee, Ji- Hoon;Kim, Bong-Geun;Lee, young Jung;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • As bridges have been longer and bigger recently, lots of bridge management systems (BMS) have been developed for each bridge. However, the differences among the data models developed by different system developers give a serious problem in integrated information management for national security. The aim of this study is to develop a common data model which can be referred in development of the BMS. The existing BMS and work process by laws are carefully analyzed. Based on the analysis results, the bridge management and maintenance process is categorized into the four basic activity types. In addition, common data models for each the unit activity type are defined.

  • PDF

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

The analysis of Windows 7·8 IconCache.db and its application (Windows 7·8 IconCahe.db 파일 포맷 분석 및 활용방안)

  • Lee, Chan-Youn;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.135-144
    • /
    • 2014
  • Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis, "Iconcache.db" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.

Study on the Difference of Physical Fitness and Cardiovascular Risk Factors for the Security Guards' Working Type (경호원의 근무유형에 따른 체력과 심혈관질환 위험인자의 차이 연구)

  • Kim, Kyong-Tae;Park, Jun-Suk
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.31-49
    • /
    • 2011
  • The subjects consisted of 60 healthy men who absence of cardiopulmonary diseases, orthopedic diseases, and metabolic diseases. The difference of physical fitness, body composition, cardiovascular risk factors, and psychological characteristics for security guards' working type were examined using one-way ANOVA through SPSS 12.0 version and was treated for the post hoc test when the difference appeared significantly. According to the result, first, there were higher level for the physical fitness according to the security guards' position and it increases body composition and cardiovascular risk factors from higher position. Second, physical fitness level is higher, body composition and cardiovascular risk factors is lower in the security guards for the field service than the security guards on inside duty according to the security guards' working type. Third, it decreases body composition and cardiovascular risk level when the physical fitness level is getting increase for the security guards. In conclusion, it needs to have a physical activity with aerobic system for the security guards of leading members and inside service to decrease the overweight or obesity and cardiovascular risk level.

  • PDF

Comparative Exploratory Research to Improve the Research Security System: Focusing on U.S Research Security Cases (연구보안제도 개선을 위한 비교탐색적 연구: 미국의 연구보안 사례를 중심으로)

  • Han, So Young;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.111-126
    • /
    • 2022
  • As the technology hegemony war between the United States and China develops and the importance of R&D increases, countries around the world are increasing their R&D investment. In Korea, the size of R&D investment by the government and companies has steadily increased every year, and cutting-edge technologies are being developed in various fields as it shifts to the direction of creative technology development. However, the number of cases in which high-tech core technologies in Korea, which have invested a lot of budget, time, and effort, are illegally leaked overseas is also steadily increasing. Research security is an activity to safely protect protected objects in the research environment from risk factors such as leakage and deodorization, and laws and systems for research security are being reorganized not only in Korea but also in the United States and other countries around the world. In this paper we aims to derive Korea's research security policy direction, focusing on US research security cases which ranks first in R&D expenses around the world to improve the R&D system and actively discusses R&D policies and laws.

Study on the Difference of Body Composition, Metabolic Factor, and Blood Components according to Job Form and Stress Level for Security Guard Workers (경호업 종사자의 직무형태와 스트레스 수준에 따른 신체구성, 대사적 변인, 혈액성분의 차이 연구)

  • Kim, Kyong-Tae;Lee, Chang-Han
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.1-14
    • /
    • 2010
  • The purpose of this study was to analyze the difference of body composition, metabolic factor, and blood components according to job forms which are job period and job type and stress level for security guard workers. The conclusion is as follows. 1. There were lower level for the body fat with short term and higher level for the lactate with long term according to the job period. 2. There were lower level for the body fat with the field service and higher level for the lactate and stress with the field service according to the job type. In conclusion, it needs to have a continuous physical activity behavior for the security guard workers to manage for their effective health and to have a rest for the field service workers to decrease their physical and mental stress.

  • PDF

A Study on Technical features and characteristics for Ship Security Alert Systems (선박보안경보장치(Ship Security Alert System)의 기능 및 기술적 특성 연구)

  • 장동원
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.85-90
    • /
    • 2004
  • In this paper, we analysed the technical features and characteristics for Ship Security Alert Systems(SSAS). Due to the steady increase in incidents, and partly triggered by the events of 9/11, the International Maritime Organization (IMO) initiated an intense programme of activity, resulting in a conference on maritime security measures during December 2002. IMO SOLAS Regulation XI-2/6 applies to the following types of vessels on international voyages which include passenger ships, including high-speed passenger craft, cargo ships, including high-speed craft, of 500 gross tons and upwards and mobile offshore units. The paper has discussed on international technical trends and its characteristics and provided how to regulate for activating and harmonizing internationally domestic ships.

  • PDF

A Study on The Crime Prevention System Improvement of Seoul Metropolitan Police (서울 경찰(警察)의 방범체제(防犯體制) 개선(改善)에 관한 연구(硏究))

  • Lee, Sang-Won
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.175-208
    • /
    • 1997
  • I study the actual condition and the problem of the crime prevention system of two seoul police station. that is operated on the unit of police box, and present the new improvement. Stragic and active is the new crime prevention system that introduces a concept of community oriented policing, the tendency of a developed country police. I present a medium - sized police station where 250${\sim}$300 policemen work. It consist of a patrol division, a community division and a administration support division. The chief of police bears the responsibility only for crime prevention service by concentrating on pure Patrol - centered crime prevention activity and community relation activity. Next I present a police inspector system. The most important on this paper is the community policing officer system that a policeman bears responsibility on district apart from a patrol division and support a police service related community. To be operated these systems effectively, these need to be regulated according to a police distinct, a police purpose and it's demand. Also a scale, function, authority of a existing. Police station must be regulated and the police training must be carried out.

  • PDF