• Title/Summary/Keyword: security demands

Search Result 252, Processing Time 0.023 seconds

A Study on Private Security Guards' Working Position - Focusing on the Prevention and Management of Low Back Pain Caused by Working in a Standing Position - (민간경호원의 근무 자세에 관한 연구 - 선자세로 인한 요통의 예방과 관리를 중심으로 -)

  • Song, Sang wook;Roh, Jung gu;Lee, Sang bin
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.142-158
    • /
    • 2009
  • The increasing number of crimes in rapidly changing modern society is enhancing people's desire for safety. As of 2008, 2,900 private security businesses with 133,000 employees operated in the private security industry which emerged in response to growing demands from society and people. Of the employees, bodyguards (hereinafter referred to as "private security guard") accounted for about 10% or 13,000. Most private security guards were suffering from various occupational diseases. Especially as they needed to guard their clients many hours a day and worked in a standing position for a long time, private security guards often complained of low back pain. Under the pain, they were hardly expected to perform their tasks efficiently. There are several causes of low back pain. The most prevalent cause is muscle weakness and imbalance around low back. Especially because private security work often requires security guards to maintain a standing position for a long time, many of them are suffering from low back pain. This study pursued the following purposes. First, it tried to identify the pathogenesis of low back pain caused by muscle weakness and imbalance around low back. Second, it tried to provide private security guards, who can hardly have personal time at work, with an easy method to prevent and manage low back pain any time by researching an effective therapy for low back pain caused by muscle weakness and imbalance around low back.

  • PDF

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

A Road To Retain Cybersecurity Professionals: An Examination of Career Decisions Among Cybersecurity Scholars (사이버 정보보호 인력의 양성과 유지를 위한 방향: 정보보호 전공자들의 직업 선택 의도에 관한 연구)

  • Chai, Sang-Mi;Kim, Min-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.295-316
    • /
    • 2012
  • In the recent field, cybersecuriyt has become one of the critical areas in the information technology field, and demands for cyberseucirty professionals have been increasing tremendously. However, there is In the recent past, cybersecurity has become one of the critical areas in the Information Technology (IT) field, and demands for cybersecurity professionals have been increasing tremendously. However, there is a shortfall in the qualified cybersecurity workforce which is a factor that contributes to the vulnerability of society to various cyber threats. Our study articulates a model to explain career selection behavior in the cybersecurity field. The study explored factors that affect scholars' behavioral intention to pursue a cybersecurity career. Positive outcome expectations from a cybersecurity career as well as high self-efficacy about skills and knowledge about cybersecurity have a strong impact on the scholars' cybersecurity career decisions. Further, perceived usefulness of the cybersecurity curriculum has a positive effect on the scholars' career decisions. The results of this research have implications for retaining a qualified workforce in the computer and information security fields.

Identifying the Dynamic Structure of Mobile Banking Market: The System Dynamics Perspective (모바일 뱅킹 시장의 동태적 구조 분석: 시스템 다이내믹스 관점)

  • Kim, Hyo-Gun;Yun, Sun-Hee;Suh, Hyun-Ju
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.99-124
    • /
    • 2006
  • The development of IT has made it possible to use various terminal systems for financial transaction and demands for financial survices are getting more and more diversified at the same time. Among others, mobile banking service market based on IC chips has been expanded its service areas and the number of mobile banking users has been increased. The study analyzes and tests the dynamic effects of the inflow of potential customers on mobile banking market condition by using system dynamics methodology to identify the dynamic structure of mobile banking market. The simulation model is designed to track the variation in the number of subscribers of mobile banking servides according to two scenarios, and the results are as follows; First the effect of word of mouth by customers who have used the service already is significant. The satisfactory level of early adopters is reflected in WOM, and as a test result shows, increase in word-of-mouth causes the growth of potential customers' demands for mobile banking service. Second, perceived attractiveness of mobile banking service market is another important construct. Factors such as convenience, mobility, time saving, security, and various services explain the construct perceived attractiveness of the service, and it makes the potential customers adopt the service, causing the increase of demands.

  • PDF

Research on the Importance of Security and Personal Information in Mobile Commerce (모바일커머스에서 보안과 개인정보의 중요성에 대한 연구)

  • Lee, Chan-Hee;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.913-921
    • /
    • 2017
  • Mobile electronic commerce is rapidly growing up on the strength of popularization of smart devices such as smart phone followed by internet user increase. Concurrently with this, the anxiety on information security and personal information leakage of the user of mobile electronic commerce significantly built up in recent. In this respect, the information security and personal information protection should be become aware of their importance for the sustainable expansion and development of mobile commerce. Based on the demands as mentioned, this study analyzed the effects of the awareness of personal information security on recognized risk, recognized confidence and intent to use. The result of this study indicates that information security and personal information protection contribute to improvement in confidence by decreasing anxiety and uncertainty related to mobile commerce. Reduction of anxiety and uncertainty implies a crucial point that affects psychological mechanism making intent to use higher.

The Optimal Pourer Flow Considering the Characteristics of Electric Pourer Consumers (전력소비자 특성을 고려한 최적조류계산)

  • 김문영;백영식;송경빈
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.2
    • /
    • pp.107-113
    • /
    • 2003
  • In a deregulated electric power market, a demand function to consider the characteristics of electric power consumers should be required. It is essential that the optimal power flow algorithm with object function of social welfare maximization using the demand function for a competitive electric power market is applied to resolve in a point of economic benefits as well as the security of power systems. Therefore, in this paper, we implement the optimization problem based on linear programming to consider the characteristics of electric power consumers using the demand function and analyze not only the nodal cost for generations and demands but also the variation of demands as a function of the characteristics of electric power consumers through numerical studies.

A Study on System Requirements for the Development of Intelligent Container using QFD (QFD를 활용한 지능형컨테이너의 시스템요구사항 도출)

  • Kim, Chae-Soo;Choi, Hyung-Rim;Kim, Jae-Joong;Hong, Soon-Goo;Kim, Hui-Yun;Kim, Jea-Hwan;Shin, Joong-Jo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.64-72
    • /
    • 2008
  • Recently security is being an important issue in almost every field of industry. This situation has affected port logistics industry deeply. Ports are now leaving operational methods that only focus on productivity, and shifting to new ones which focus on safety and customer services on the basis of it. Thus a lot of companies and institutions have offered various solutions as this issue becomes more and more intense. Among them, most typical solutions involve installing special devices to ordinary containers to improve its security, such as CSD (Container Security Device) of GE (General Electric) and eSeal of Savi Networks. On the other hand, these devices focus only on international standards or technical implementation, and this causes inconvenience to actual users like cargo owners, sea carriers, or stevedoring companies. This is considered to be due to lack of sufficient consideration on user demands. This research uses QFD (Quality Function Deployment) method for deducting system requirements in order to solve the problems of previous security devices and to develop a security system that can not only reflect the demands of the users but also considers real-world conditions. According to the QFD results, a total of 21 system CTO's were deducted under 5 categories.

  • PDF

Analysis on CC Evaluation Demand and Selection of IT Security Products to be evaluated under CC Scheme in Korea (CC 평가수요 분석 및 차기 평가대상 제품군 선정)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.79-95
    • /
    • 2004
  • The Common Criteria can be used as a guideline for one CCRA member to avoid re-evaluating IT security products which were already evaluated by other CCRA members. In this paper, we have analyzed the evaluated IT security products under CC scheme in several nations, such as Unite States, Great Britain and Australia. and defined new category of the IT security products for the domestic CC evaluation. And we have analyzed the domestic and international market on the information security products, have conducted a poll to receive opinions and demands of the Korean industries for Korea policy decision maker to select the possible IT security products which will be evaluated in Korea under CC scheme. As a conclusion, we have selected 15 IT products based on the response to a poll by the industries, the market size, the evaluation amount demanded by the user, manufacturer, and evaluator, to select the possible IT security product under CC schemes in Korea during next 5 years. Moreover, the characteristics, the benefit, and the demerit of the selected IT products were analyzed. This paper can be used as a guideline document for Korea policy decision maker to select the IT products to be evaluated under CC scheme in Korea for next 5 years.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.