• Title/Summary/Keyword: security officers

Search Result 183, Processing Time 0.023 seconds

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Influence of Strategic Human Resource Management of on Organizational Culture and Organizational Citizenship Behavior of Private Facility Security Guards (시설경비조직의 전략적 인적자원관리가 조직문화 및 조직시민행동에 미치는 영향)

  • Kang, Min-Wan;Kim, Hyo-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.389-403
    • /
    • 2011
  • The objective of this study is to find out how strategic human resource management(SHRM) of a facility security firm affects its organizational culture and behaviors of its members. This study was executed in June 2010 with facility security officers(FSO) in four private security firms by using a judgment sampling technique. A total of 343 FSOs were used in final analysis. Coefficient of reliability(Cronbach's coefficient alpha) of the survey was 0.691. The conclusion was as follows: First, SHRM of facility security firms exert its influence on organizational culture. That is, promotion of education/training, compensation, making avid followers, and career development may facilitate settlement of hierarchical, development-oriented, agreement -based and rationality-oriented culture. Second, SHRM of security firms would affect organizational citizenship behaviors(OCB), i.e., the promotion of education/training, compensation, making avid followers, and career development would tend to enhance consideration for others and altruistic, participatory, conscientious and gentlemanly behaviors. On the other hand, if proper compensation is not made, above-mentioned behaviors would decrease. Third, organizational culture of security firms tends to affect OCB. That is, when hierarchical, development-oriented, agreement-based and rationality-oriented culture is settled, consideration for others, altruistic, participatory, conscientious and gentlemanly behaviors tends to be enhanced.

An Empirical Study on Critical Success Factors in Internet Shopping Mall (인터넷쇼핑몰 성공요인에 관한 실증적 연구)

  • Kim, Chi-Ho;Eom, Kwang-Yeol
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.3-18
    • /
    • 2005
  • The purpose of this study is to investigate the determinants of critical success and to analyze the main factors which are affecting the successful implementation of Internet shopping mall. The major findings of empirical analysis are as follows : 1) The degree of searching easuness in the internet shopping mall is statistical significance. 2) The degree of customer response is the important success factor. 3) The speed of connection exert a beneficial influence upon the performance of shopping mall. 4) The standard of security system is be in direct proportion to the performance of shopping mall The result of this study will be useful for the chief executive officers to make more rational decision making for e-Business strategies is related to the Internet shopping mall. The paper also strives to provoke debate in this area with to encouraging further research on the topic.

  • PDF

The Characteristics of 'Vow by Five Meritorious Subjects' (오공신회맹문기의 성격)

  • Shim Woo-Choon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.29
    • /
    • pp.45-62
    • /
    • 1995
  • 'Vow by Five Meritorious Subjects' was drawn up in November 14 of the second year of King Sejo's reign. The document was a pledge taken by King Sejo's son, Prince Chang, and the King's five meritorious officers in charge of national foundation (개국공신), affairs(정사공신), national defense(좌명공신), national security(정난공신), national building(좌익공신), and their offsprings in an attempt to consolidate their political power and to eliminate the opposition after having forged their coup as if King Tanjong abdicated his throne in favor of King Sejo. The signatories to this document numbered 137 persons whereas non-signatories were 83. It appears that those 83 non-signitorious were unabled to sign the vow for they were not present at the signing ceremony which followed the drafting of the document because all of them had, later on, been promoted to advice King Sejo.

  • PDF

An Architecture Design and Implementation of Stateful Traffic Generation for Cyber Warfare Training (사이버전 훈련을 위한 상태 저장 트래픽 발생 Architecture 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.267-276
    • /
    • 2020
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a stateful traffic generator that provide network background traffic for cyber warfare training. The proposed architecture is designed for generating traffic similar to real system traffic, so the trainee can perform more realistic training.

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

Police Networks for Criminal Intelligence Functions: Based on Informal Social Network Analysis (경찰 범죄정보 수집 활동의 관계망 분석: 비공식적 사회연결망 분석을 중심으로)

  • Choi, Yeong Jin;Yang, Chang Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.448-459
    • /
    • 2020
  • Recently, the necessities of gathering, producing, and sharing criminal information are critically important as intelligence functions of police agencies to improving public safety and national security. However, the inadequacies and barriers within which police agencies have in regard to intelligence functions impede criminal information gathering, intelligence producing within their agency, and intelligence sharing with other agencies. In this study, we analyzed informal networks constructed from a survey dataset of information and intelligence sharing among officers in police agencies. The results revealed the different structural properties of intelligence networks between police agencies. We did find that officers with high indegree and outdegree in a network played critical role on the dynamics and degree of intelligence gathering and assessment responsibilities. Finally, we could find evidence that the potential role of intermediary triggered relational dynamics for developing and sharing critical information among all police agencies.

Self-Symptom Checker for COVID-19 Control and Symptom Management

  • Sun-Ju Ahn;Jong Duck Kim;Jong Hyun Yoon;Jung Ha Park
    • Health Policy and Management
    • /
    • v.33 no.1
    • /
    • pp.29-39
    • /
    • 2023
  • Background: Breaking the chain of disease transmission from overseas is necessary to control new infectious diseases such as coronavirus disease 2019 effectively. In this study, we developed a mobile app called Self-Symptom Checker (SSC) to monitor the health of inbound travelers. Methods: SSC was developed for general users and administrators. The functions of SSC include non-repudiation using QR (quick response) codes, monitoring fever and respiratory symptoms, and requiring persons showing symptoms to undergo polymerase chain reaction tests at nearby screening stations following a review of reported symptoms by the Korea Disease Control and Prevention Agency, as well as making phone calls, via artificial intelligence or public health personnel, to individuals who have not entered symptoms to provide the necessary information. Results: From February 12 to March 27, 2020, 165,000 people who were subjected to the special entry procedure installed SSC. The expected number of public health officers and related resources needed per day would be 800 if only the phone was used to perform symptom monitoring during the above period. Conclusion: By applying SSC, more effective symptom monitoring was possible. The daily average number of health officers decreased to 100, or 13% of the initial estimate. SSC reduces the work burden on public healthcare personnel. SSC is an electronic solution conceived in response to health questionnaires completed by inbound travelers specified in the World Health Organization International Health Regulations as a requirement in the event of a pandemic.

Studies of Communicational Education Suitable for Security Environment (안보환경에 적합한 해군부사관과의 의사소통 교육방안 연구 - 맥락적 의사소통을 중심으로)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.47-56
    • /
    • 2016
  • This study's goal is to consider deeper about the Context-Communication Study on candidates of future petty officers in community colleagues, therefore the study uses theoretical approaches of the communications based on literature research. The petty officer majors in community colleagues need to set a curriculum to achieve the goal of the Context-Communication Study. The class, which is a continuous class from freshman to sophomore year, needs to be designed as a combination class of command/discipline major classes and communication studies. This study shows the detail ways of the Context-Communication Study to bring student's interests by using simulation studies with writing papers, training interviews, and presentations which all will be checked by their instructors. Instructors will get students to the point that they have upscale communication abilities and language abilities. Finally, this study shows limitations of the Context-Communication Study and suggests the further direction of research.

iRF: Integrated Red Team Framework for Large-Scale Cyber Defence Exercise (iRF: 대규모 사이버 방어 훈련을 위한 통합 레드팀 프레임워크)

  • Jang, In Sook;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1045-1054
    • /
    • 2021
  • As APT attacks become more frequent and sophisticated, not only the advancement of the security systems but also the competence of the cybersecurity officers of each institution that operates them is becoming increasingly important. In a large-scale cyber defence exercise with many blue teams participating and many systems to simulate and defend against, it should be possible to simulate attacks to generate various attack patterns, network payloads, and system events. However, if one RT framework is used, there is a limitation that it can be easily detected by the blue team. In the case of operating multiple RT frameworks, a lot of time and effort by experts for exercise setup and operation for each framework is required. In this paper, we propose iRF(integrated RT framework) that can automatically operate large-scale cyber defence exercise by integrating a number of open RT frameworks and RT frameworks created by ourselves.