• Title/Summary/Keyword: security officers

Search Result 183, Processing Time 0.021 seconds

A study on Causes and Improvements of the Police Corruption

  • Kim, Taek
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.70-78
    • /
    • 2021
  • It is true that the police have been faithful to the role of the regime's sewer and committed many disruptions and errors, and have been criticized and criticized by the public. It should now be the foundation of the democratic police and an organization supported by the people. The problem is that the quality, personality, and values of 130,000 police officers should be changed and should be in line with the spirit of the times. One of the theories of police corruption is the "rotten apple hypothesis." The theory is that there is a high possibility that the entire police force will be corrupted, as if the defective apple in the apple box is rotten and the whole apple is rotten, without filtering out potential corrupt police officers during the recruitment phase. In other words, the cause of corruption is based on personal flaws. This study intends to analyze the causes of police corruption and improvement measures. The purpose of this study is to ensure that police officers in charge of national security are usually armed with ethics and good conduct. The police should be trusted by the people and need a stronger prescription for police corruption. In this respect, this study aims to solve the corruption problem of police officials, analyze anti-corruption, and find out what are the desirable countermeasures. The main study methods of this study are as follows; First, we first tried to collect data through research on corruption-related literature. The analysis was focused on the related papers of police corruption and government reports. Second, police corruption theory and anti-corruption alternatives were analyzed. It was reviewed focusing on the theory of corruption or translated data. Third, a literature survey was analyzed to examine the National Police Agency's perception of police corruption. Based on these research methods, we tried to derive the desirable control measures for the hypothesis of police corruption. This study is believed to have contributed to supporting the organizational corruption and culture of the apple box, including the personality of the individual's values, which is a rotten apple theory of police corruption.

The Study on the Woman Soldier Human Affairs Operation Systems. (여군 인사운영시스템에 관한 연구)

  • Jung, Jae-Keak
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.31-39
    • /
    • 2015
  • The Female workforces opened the combatants which was not allowed so far including the artillery in the army, air defense, and etc. to the woman soldier in 2014. I exceeded 10,000 people in 2015 and it is in the plan to be expanded to 4,450 officers, 6,374 noncommissioned officers in 2017. A navy is the plan which selects the woman officer to board a submarine since 2017 and which I board over 3,000 t level in a submarine. But the institutional supplementation about this is insufficient although the woman soldier increased depending on the policy's decision. The role of the woman soldier was expanded and it was the time when the system developmental about the woman soldier management which is consistent with the future war aspect will have to be guaranteed, and the clear standard including the post circulation to the starting in advance of the woman soldier and human resource expansion and treatment, and etc. is required. I supplement the current regulation which I am applying as man soldier Army and the same standard although the woman soldier and man soldier Army has a difference and I analyze the phenomenon and the developmental solution should be suggested about the woman soldier people management.

Research and Direction of Cyber Operation Education System for Fostering Common Situation Awareness about Cyber Operation -Focusing on non-Cyber Operations Unit Officer Education- (사이버작전에 대한 공통상황인식 함양을 위한 군(軍) 사이버작전 교육체계 연구 및 방향성 제안 -비(非)사이버작전부대 장교 교육을 중심으로-)

  • Lee, Sangwoon;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.13-22
    • /
    • 2019
  • The purpose of this study is to suggest the educational system and direction of cyber operations officers of non-cyber operations forces who do not specialize in cyber operations. In order to carry out cyber operations as a joint operation, non-Cyber Operations officers must also know about cyber operations, but there is no education system for them at present, Since there is almost no previous research on this, research in the relevant field is necessary. Therefore, the education system was developed based on the prior literature review, that is, the education system, that is, the necessity of education, the object of education, the goals and contents of the education, and the curriculum. In addition, the relevant experts confirmed the validity of each item with Delphi method, and as a result, some improvement was needed, but it was shown to be suitable as a whole. In addition, detailed educational program development can be developed based on this in the future.

Development of Work Process on Natural Disaster Damage Investigation using Smartphones (스마트폰 기반 자연재난 피해조사 업무 프로세스 개발)

  • Choi, Woong Jung;Cho, Jae Woong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • Natural disasters are occurring frequently due to typhoon and flood. Especially, damage scales are increasing these days because of climate change. When natural disasters occur, civil engineering officers investigate them for the recovery. If public facilities are damaged, the disaster damage investigation must be finished within 7days. Currently, natural disaster damage investigation is done on two levels, field investigation and data input into NDMS. However, having those two overlapped most of the time, and we must do subsidiary works things to register field investigation data into system. Work efficiency is decreased due to repetition of additional work. So, many civil engineering officers indicated problems such as lack of manpower and time. In this study, We developed work process on natural disaster damage investigation that involves using smart phone to solve problems such as shortage of time and manpower.

A Study on Empirical Analysis Improvement in Special job of Womanpower performing ablity - Focusing on the woman soldier·police woman survey - (특정직 여성인력의 직무수행능력 향상 방안에 관한 실증 분석 - 여군·여경 설문조사를 중심으로 -)

  • Choi, Mi-Ae;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.147-175
    • /
    • 2015
  • Woman officers with the power of the future is likely to be more female officers can increase castration. These changes to the times in order to meet the recent Lady, chosen to increase the Police and military, and female employees in the movement to operate inside the police organization to efficiently is increasing. This study with regard to women soldier and police women a typical one of speecial job of womanpower, there is the purpose of study to suggest the direction to improve the job performing ability through the careful anlysis. On account of the minority in number of women soldier and police women in the group which consist of many men, there are lots of difficulties on duty. In order to keep up with the times for the expansion of opportunities for excellent womanpower, army and police should lead to stronger efforts for them. Besides, in comparison with the general work of womanpower, woman soldier and police woman have a special duty assignments in the groups wihich have a specific predisposition. In conclusion, it is necessary to have lots of politicasl support and cosideration.

  • PDF

The Study of Integrated Document Training Materials Related to NCS Communication Ability for Petty Officer Majors (NCS 의사소통능력과 연계된 부사관과의 자료통합적 문서 교육 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.137-146
    • /
    • 2019
  • This study seeks into an education goal and an achievement level based on investigating relationships between NCS communication abilities and communication educations for petty officer major students. Also, the study looks deep into approriate Integrated document training materials. A goal of the petty officer's communication education, which is supposed to achieve more than the average standard is improving abilities to understand documents and create documents related to the real petty officer's life. The goal of this communication study is designed with considering the petty officers' ability factors and the detailed weekly achievement goals based on characteristics of petty officers. the proper way to reach the goal of the Integrated document training materials is constructed as three step process; Presenting subject - group activity - handing in final activity report. Also, the education is designed to write evaluation forms continuously for students to keep eyes on their achievement levels. As the importance of NCS is emphasized these days, the Integrated document training materials present the ways how this education is needed to go on, and this shows ways to improve students' document writing abilities. For the last, the study mentions a proposal for further tasks on this field.

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

A Study on the Improvement Plan of ROK Army's ROTC System in the Aspect of Strategic Human Resource Management -Focusing on the Organizational Structure and Operation System- (전략적 인적자원관리 측면의 육군 ROTC 제도 개선방안 연구 - 조직편성 및 운영체계를 중심으로 -)

  • Myung-Lyul Kim;Choong-Kwan Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.141-148
    • /
    • 2022
  • Korea's ROTC system was introduced from the United States in 1961 to recruit competent primary grade officers and secure reserve forces in peacetime. However, entering the 2000s, it was faced with a serious crisis, which was a decrease of the application rate due to the change in the acquisition environment including the decrease in school-age population and military service resources due to the low fertility, and the shortened period of military service. Therefore, this study tried to suggest a ROTC system improvement plan focusing on the organizational structure and operation system by analyzing the change in the acquisition environment and the cause of decrease in the application rate. As a research method, a comparative method between the cases of the ROTC systems in the US and Korea was applied through domestic and foreign literature studies. In terms of theory, Strategic Human Resource Management, which is applied to corporate management to achieve organizational performance and secure comparative competitive advantage in a knowledge-based society, was used as a theoretical criterion.

Occupationally Acquired Plasmodium knowlesi Malaria in Brunei Darussalam

  • Koh, Gregory JN.;Ismail, Pg K.;Koh, David
    • Safety and Health at Work
    • /
    • v.10 no.1
    • /
    • pp.122-124
    • /
    • 2019
  • Simian malaria is a zoonotic disease caused by Plasmodium knowlesi infection. The common natural reservoir of the parasite is the macaque monkey and the vector is the Anopheles mosquito. Human cases of P. knowlesi infection has been reported in all South East Asian countries in the last decade, and it is currently the most common type of malaria seen in Malaysia and Brunei. Between 2007-2017, 73 cases of P. knowlesi infection were notified and confirmed to the Ministry of Health in Brunei. Of these, 15 cases (21%) were documented as work-related, and 28 other cases (38%) were classified as probably related to work (due to incomplete history). The occupations of those with probable and confirmed work related infections were border patrol officers, Armed Forces and security personnel, Department of Forestry officers, boatmen and researchers. The remaining cases classified as most likely not related to work were possibly acquired via peri-domestic transmission. The risk of this zoonotic infection extends to tourists and overseas visitors who have to travel to the jungle in the course of their work. It can be minimised with the recommended use of prophylaxis for those going on duty into the jungles, application of mosquito/insect repellants, and use of repellant impregnated uniforms and bed nets in jungle camp sites.

FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization (FDANT-PCSV: Parallel Coordinates 및 Sankey 시각화를 이용한 신속한 이상 트래픽 탐지)

  • Han, Ki hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.693-704
    • /
    • 2020
  • As a company's network structure is getting bigger and the number of security system is increasing, it is not easy to quickly detect abnormal traffic from huge amounts of security system events. In this paper, We propose traffic visualization analysis system(FDANT-PCSV) that can detect and analyze security events of information security systems such as firewalls in real time. FDANT-PCSV consists of Parallel Coordinates visualization using five factors(source IP, destination IP, destination port, packet length, processing status) and Sankey visualization using four factors(source IP, destination IP, number of events, data size) among security events. In addition, the use of big data-based SIEM enables real-time detection of network attacks and network failure traffic from the internet and intranet. FDANT-PCSV enables cyber security officers and network administrators to quickly and easily detect network abnormal traffic and respond quickly to network threats.