• Title/Summary/Keyword: security event

Search Result 398, Processing Time 0.031 seconds

Research for the Security Studies in the Universities of U. S. A. (미국 대학 시큐리티 교육내용에 관한 연구 -한국 대학교육과 비교를 중심으로-)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.35-43
    • /
    • 2011
  • In the universities of U.S.A., Criminal Justice is the interdisciplinary study of the institutions and policies that constitute the criminal justice system, as well as theories of human behavior and philosophies of justice related to the maintenance of social order, the control of crime, and the achievement of a just society. There are 103 American Universities have Criminal Justice department and they provide about 180 differents courses as a pre-requisition or optional subject in the major. The most 10 courses that those colleges adopted are Introduction to Criminal Justice, Criminal Law, Criminology, Criminal Procedures, Research Methods in Criminal Justice, Criminal Investigation, Juvenile Justice, Terrorism, Ethical Issues in Criminal Justice, Introduction to Psychology or Introduction to Sociology. Also, 10 fields more important in the major if we group together similar courses those are Criminal Justice and Procedures Sequences, Law, Justice and corrections, Theory and Methods Sequences, Homelend Security and Security Operations, Forensics and Cybercrime, Management and Administration, Police, Race and Ethnicity, General Requirements, Other Social Science Fields. The combined degree program leading to Bachelor of Arts Degree in Criminal Justice and Master in Public Administration provides a concentration in criminal justice, management, administration, and leadership. They have big different courses between USA and Korea event though they have similar educative goal and way of approach to the target in the major.

Development of a Flood Disaster Evacuation Map Using Two-dimensional Flood Analysis and BIM Technology (2차원 침수해석과 BIM 기술을 활용한 홍수재난 대피지도 작성)

  • Jeong, Changsam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.53-63
    • /
    • 2020
  • In this study, the two-dimensional flow analysis model Hydro_AS-2D model was used to simulate the situation of flooding in Seongsangu and Uichang-gu in Changwon in the event of rising sea levels and extreme flooding, and the results were expressed on three-dimensional topography and the optimal evacuation path was derived using BIM technology. Climate change significantly affects two factors in terms of flood damage: rising sea levels and increasing extreme rainfall ideas. The rise in sea level itself can not only have the effect of flooding coastal areas and causing flooding, but it also raises the base flood level of the stream, causing the rise of the flood level throughout the stream. In this study, the rise of sea level by climate change, the rise of sea level by storm tidal wave by typhoon, and the extreme rainfall by typhoon were set as simulated conditions. The three-dimensional spatial information of the entire basin was constructed using the information of topographical space in Changwon and the information of the river crossing in the basic plan for river refurbishment. Using BIM technology, the target area was constructed as a three-dimensional urban information model that had information such as the building's height and location of the shelter on top of the three-dimensional topographical information, and the results of the numerical model were expressed on this model and used for analysis for evacuation planning. In the event of flooding, the escape route is determined by an algorithm that sets the path to the shelter according to changes in the inundation range over time, and the set path is expressed on intuitive three-dimensional spatial information and provided to the user.

Comparison of Airport Emergency Plans in Korea and Japan and Survey of Emergency Response of Airline Employees at Check-in Counter (한·일 공항비상계획 비교 및 체크인카운터의 항공사 직원 비상대응 실태조사)

  • Kwon, Kyum;Kwon, Byung Hwa;Cheung, ChongSoo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.11-25
    • /
    • 2020
  • This study is a basic study to improve responsiveness in the event of a disaster in the landside area of the Airport Passenger Terminal, and it investigated the airport emergency plan and the status of emergency response in the event of a disaster by the airline's ground staff. The Airport Emergency Plan examined the airport evacuation plan of Korea's Gimpo Airport and Japan's Ministry of Land, Infrastructure, and Transport, confirming that the domestic airport emergency plan was not specific. In addition, a survey of 100 airline ground employees working at check-in counters found that 69% of the respondents were unaware of their role in disaster situations, 90% were not educated in emergency response and 98% were not trained in disaster training in landside areas. Cross-analysis confirmed significant results in the safety of the airport where the service life worked and whether it was a role in the event of a disaster. Therefore, it is suggested that the airport emergency response plan should be improved to improve the ability to respond to disaster sites in the landside area of the airport passenger terminal and that the airline's ground staff should be educated and trained to enhance disaster response.

Development of Culinary Tourism in European Countries

  • Boiko, Viktoriia;Liubynskyi, Oleksandr;Strikha, Liudmyla;Zarakhovskyi, Oleksandr Y.;Neilenko, Sergii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.167-177
    • /
    • 2021
  • The scientific paper studies the impact of tourism and traveling on the economic level of development of countries at the macro level and its relationship with other sectors of the economy. Tourism is one of the budget-forming factors of every economy. This work describes the main trends in the development of tourism. It is determined that about one third of tourism revenues are generated by the food sector, i.e., the culinary niche of tourism. Culinary tourism is a new direction of tourism, but it is developing quite dynamically in the EU. Culinary is an important part of rural tourism in the EU and culinary tourism is actively promoted at fairs and festivals. In recent years rural tourism has been developing both at the international level and in Ukraine, primarily due to its features, which include the implementation of the principles of sustainable community development, preservation of local traditions and cultural values, gastronomic events to promote them. The aim of the article is to study the theoretical aspects of the development of gastronomic tourism in the world, to analyze the actual condition of gastronomic tourism in the EU and Ukraine, identifying prospects and ways to develop regional gastronomic tourism. The methodological and informational basis of the work is analytical reports and researches related to the development of event tourism and statistics. Systematic and logistical approaches to the studied problems were used to achieve this goal. Various general scientific and special research methods were also used. Based on PESTLE analysis, key aspects of the external environment of gastronomic tourism in Ukraine are identified. We took into account the principles of sustainable development: political, economic, social, technological, legal and environmental. The main trends in the development of gastronomic tourism in the world are studied and it is found that the greatest development in the coming years will be the trend of combining gastronomic and event tourism on the basis of sustainable development. The main preconditions and possibilities of introduction of this holistic approach to the strategy of development of the tourist branch of Ukraine are determined. A model of sustainable value chain of gastronomic tourism in the region is formed and the main advantages of its implementation are identified: formation of a regional brand, preservation of culinary traditions, development of green farming, minimization of negative impact on the environment, sustainable development of communities.

Deep Learning-Based User Emergency Event Detection Algorithms Fusing Vision, Audio, Activity and Dust Sensors (영상, 음성, 활동, 먼지 센서를 융합한 딥러닝 기반 사용자 이상 징후 탐지 알고리즘)

  • Jung, Ju-ho;Lee, Do-hyun;Kim, Seong-su;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.109-118
    • /
    • 2020
  • Recently, people are spending a lot of time inside their homes because of various diseases. It is difficult to ask others for help in the case of a single-person household that is injured in the house or infected with a disease and needs help from others. In this study, an algorithm is proposed to detect emergency event, which are situations in which single-person households need help from others, such as injuries or disease infections, in their homes. It proposes vision pattern detection algorithms using home CCTVs, audio pattern detection algorithms using artificial intelligence speakers, activity pattern detection algorithms using acceleration sensors in smartphones, and dust pattern detection algorithms using air purifiers. However, if it is difficult to use due to security issues of home CCTVs, it proposes a fusion method combining audio, activity and dust pattern sensors. Each algorithm collected data through YouTube and experiments to measure accuracy.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Method for Detecting Modification of Transmitted Message in C/C++ Based Discrete Event System Specification Simulation

  • Lee, Hae Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.171-178
    • /
    • 2021
  • In this paper, the author proposes a method for detecting modification of transmitted messages in C/C++ based Discrete Event System Specification (DEVS) simulation. When a message generated by a model instance is delivered to other model instances, it may be modified by some of the recipients. Such modifications may corrupt simulation results, which may lead to wrong decision making. In the proposed method, every model instance stores a copy of every transmitted message. Before the deletion of the transmitted message, the instance compares them. Once a modification has been detected, the method interrupt the current simulation run. The procedure is automatically performed by a simulator instance. Thus, the method does not require programmers to follow secure coding or to add specific codes in their models. The performance of the method is compared with a DEVS simulator.

A Study on Prevention of Accident in Korean Security Industry (경호산업의 재해예방에 관한 연구)

  • Cho, Han-Bong
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.259-289
    • /
    • 1999
  • The Security Industry has dynamic working conditions. So this study intends to find the advisable direction for the reduction of accidents. To achieve the aim, the investigation of documents and the examinations of actual proofs have been done to figure the theoretical background and to see the basic knowledge of security industry. The questionnaire was composed of two question sheets to search real data and actual proofs, with making targets of pure security organization and personnel. The one consists of 9 questions to find the scale and extent of security organizations and the population and character of security personnel, and the other 25 questions in 3 major areas to analyze the causes, the frequency rates, the factors, and the condition of accidents. The period of survey was July 15th to October 15th in 1997 by mail/telephone/interview. The questionnaires were efficiently returned from 102 different organizations including the public security groups of Seoul Metropolitan Police Bureau and so on, with the information of 8,222 persons having worked for Korean Security Industry in 1996. So being based on the reality, some meaningful facts were found, and were compared with the national statistics of the Government. This study is made up of 5 chapters : in the 1st chapter the motivation, the object, the method, the direction and the limitation of the approach were presented ,in the 2nd chapter the theoretical background were inferred ; in the 3rd chapter the collected data of accidents in Korean Security Industry were analyzed and explained on the base of the questionnaires , in the 4th chapter the advisable facts connected with preventing accidents were mentioned ; in the last the conclusion were stated. With the replies of 102 different organizations including the information of 8,222 persons in 1996, the main facts found or analyzed through this study are as follows. Firstly, accident is an unpredictable and occasional event. It occurs to man and/or thing, but the frequency rate of accidents in Korean Government and other Institutes has been calculated and evaluated only in the point of the accident related with man. Secondly, the factors of accidents are firstly relevant to the way preventing accidents in Security Industry in Korea. However the frequency rate is academically calculated and evaluated by at once man(population) and hour(time). But the Government has done the rate only by man(population). This can be improper and inaccurate rates. Thirdly, the confused concept of security is used in Korean Government, academic society, corporation and so on. Therefore the detailed formation of the concept is needed for the development of Security Industry in Korea. Fourthly, security organizations can be classified into 'public security(public law enforcement)' and 'private security' according to its identification, and furthermore 'private security' can be divided into 'facilities-guard service', 'body-guard service', and 'patrol service' according to its major role. Fifthly, in the viewpoint of the number of both organization and population,'facilities-guard service' is centered in Korean 'private security'. According to the analyzed results of the questionnaires in this study, the frequency rate of accidents of Korean Security Industry is 0.43(%) totally in 1996 : 'facilities-guard service' 0.54(%), 'body-guard service' 0.12(%), and 'patrol service' 0.21(%) in 'private security', and 'public security' 0.20(%). With regard to the accident frequency rate of organization and population, 'facilities-guard service' is the highest. The accident frequency rate of population in 'facilities-guard service' organization ranges dispersively from 0.20(%) to 11.11(%). Sixthly, the accidented rate of workers having serviced for under one year is 57.6(%). This can mean that the main factor of accidents in Korean Security Industry is the lack of role-understanding and training/education. And another factor can be found on the time of accident occurrence. Many accidents have been occurred on the relaxed points like as just after lunch and morning rush-hour. Lastly, the major advisable facts related to preventing accidents are as follows : The workers who are over fifty years old in 'facilities-guard service' organization need to be educated for preventing accidents ; It is desirable that the training and education to prevent accidents should be practiced in the time of pre-service ; As the style of accidents and the age of the accidented are not same according to major service area('public security' and 'private security' : 'facilities-guard service', 'body-guard service', and 'patrol service'), the plans to prevent accidents must be different and various. However fracture and bruise are general accidents in Korean Security Industry ; Workers must care about traffic accident and violent fall ; It seems that the grouped working with other two persons will reduce accident occurrence possibility rather than individually single working.

  • PDF

A Study on Export Bond Insurance as a Security for Independent Bank Guarantee in International Transactions (국제거래에서 독립적 은행보증서에 대한 담보장치로서의 수출보증보험에 관한 연구)

  • Kim, Sang-Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.59-85
    • /
    • 2008
  • An independent bank guarantee(aka an independent guarantee) is provided as an security on a principal obligor's performance of his obligation, and a guarantor should pay the guaranteed amount only upon a beneficiary's written demand. A standby letter of credit has been used in the United States, since it was construed that a bank should not issue a guarantee. There was wide misunderstanding that a standby letter of credit differs from an independent bank guarantee. However, a standby letter of credit is the same security as an independent bank guarantee, and in international business a standby letter of credit is not differentiated from a independent bank guarantee. An independent bank guarantee are independent from the underlying contract, unconditional, and irrevocable. And a guarantor should pay upon written demand without proving a principal obligor breaches the underlying contract. These features of an independent bank guarantee has been abused in international transactions. Thus it has been proposed that some exceptions to the features of an independent bank guarantee should be allowed. United Nations Convention on Independent Guarantees and Standby Letter of Credit(1995) stipulates some exceptions to payment obligation. Export bond insurance, a part of export insurances, operated by the Korea Export Insurance Corporation under the Export Insurance Act, is used as a security for unfair calling by a beneficiary under an independent bank guarantee. Most of the export subsides by the government are prohibited under WTO's Agreement on Subsidies and Countervailing Measures. However, as export insurance is allowed under the WTO, it operates a significant role in enhancing the export. In the event that export bond insurance is provided for a guarantor, an obligor who is subject to recourse by a guarantor, can be exempt from the recourse in case of unfair calling. The Korea Export Insurance Corporation, an insurer, bears unfair calling risk by a beneficiary. Generally it is understood that a demand shall be made before the expiry of an independent bank guarantee. However this is not absolutely true, it shall be decided by URDG, ISP98, the governing law.

  • PDF

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.