• Title/Summary/Keyword: special security service

Search Result 100, Processing Time 0.03 seconds

A Study for the Certified Security Certification in Private Security Industry in Korea (민간경비 자격제도에 관한 연구)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.159-181
    • /
    • 2006
  • This study is concerned on Why The Certified Security certification is needed and How to control the security quality to get better service to the clients. Theses days are required The Certified Certificate in all the industry. And in this point of view, the certified certificate is a kind of confirmation by an authority to the person who has how much special knowledge and practice in a certain field. Moreover, in the functionalism society the certified certificate system would be very positive effect to the related industry and society as official measurement by an authority. The security is freedom from fear and anxiety. Which means the security can not be operated in isolation from citizen's safe-living expectation, and which is also dealing with valuable human being's life. For getting the better purpose the security industry employees should have more organized special training and education. As my understanding the certified certificate exam system is the confirmation by an authority, the certified certificate is only neutral evidence to get the confidence and credit from the clients. In this point of view the core point is How to control The Certified Certificate by a credied authority.

  • PDF

Design and Implementation of the Performance Driven UI-Mashup Architecture (성능 주도의 UI-Mashup 아키텍처의 설계 및 구현)

  • Cho, Dong-Il
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.45-53
    • /
    • 2014
  • UI-Mashup is widely used as a service method to add value, which is composed of distributed various contents on the internet and has turned out to be one of the latest trends in web application program development. Previous UI-Mashup-related studies have focused primarily on the dynamic service composition and have not been able to adapt to a rapidly changing Web Standard, thusthe end users conclude that UI-Mashups are slow, incompatible and poor security services. In this study, We propose an architecture for the performance improvements of UI-Mashup.In order to provide fast services and security enhancements, the proposed architecture collects UI fragments on the server in parallel, and sends layouts and contents of Mashups UI to the client through a special delivery channel supporting fast reaction and response time. In this study, the implementation and performance tests were proceeded to verify the proposed architecture experimentally. As a result of the performance testing, the proposed architecture has two to three times faster response time and more than four times throughput compared to the previous UI-Mashup technology.

Content Analysis of Male Hospital Nurses' Experiences (남자 임상간호사의 경험에 관한 내용분석)

  • Ahn, Kyeong-Ha;Seo, Ji-Min;Hwang, Sun-Kyung
    • Korean Journal of Adult Nursing
    • /
    • v.21 no.6
    • /
    • pp.652-665
    • /
    • 2009
  • Purpose: This study was conducted to identify job experiences of male hospital nurses. Methods: Data were collected from 20 male nurses working at general hospitals, through semi-structured in-depth interviews. The interviews were recorded and subsequently transcribed verbatim. Using content analysis, data were coded and categorized. Results: The analyzed domains were motivations for choosing nursing, occupational experiences (3 subdomains), and attitudes toward the future. A total of 85 significant statements were selected from the data and classified into 32 categories. The nurses' motivations for choosing nursing were advantages of employment, their aptitude, scarcity value of men, professionalism and job security, good promotion, stable income, and family influence. In occupational experiences, they were assigned to special fields and dissatisfied with vertical relationship, promotion system, their salary, and gaps in military service time; they had difficulties in adapting to female-dominated groups and encountered gender role stereotype and preconception; they were satisfied with their distinguished performance, but had damaged self-esteem, and were stressed and disappointed in their work. In their attitudes toward the future, they considered their career changes, but tried to make professional and personal advancement. Conclusion: These findings have implications for recruiting and retaining male nurses in clinical settings.

  • PDF

A Study on the Development of Public Digital Signage Services (공공 디지털 사이니지 서비스 개발 연구)

  • Ahn, SungHee
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.185-196
    • /
    • 2021
  • This study is based on the 'National Pilot Project on Digital Signage in Sejong Special City', one of the pilot projects initiated by the Ministry of Public Administration and Security. This project was an attempt to present the digital signage as a 'public service content platform' integrated with smart technologies. This study suggests that the planning strategy for placing public service contents on digital signage platform should focus on interests of local communities or users rather than high-tech suppliers of digital signage. In consideration of growing needs for smart technology-based public service, this study concentrates on the strategy for developing 'public digital signage services'. In addition, 'digital signage service tools' were designed to easily establish or execute the strategy. The aim of this study is developing the strategy to make digital signage a public cultural service platform as well as a digital advertisement tool. The final goal of this study is to demonstrate public value creation performance of the 'Revitalisation Project of Sejong City's Commercial Districts', which was possible thanks to the proactive involvement of citizens coupled with progressive utilization of interactive media.

A case study on the Collective activities of Spectators of Professional soccer games (프로축구 관중의 집합행동 사례연구)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.195-213
    • /
    • 2003
  • This is a case study on the violent collective activities of spectators in professional soccer games. The purpose of this study is to examine the reasons and the processes of the activities. In order to achieve the purpose well, I analyzed two cases of violent collective activities in spectators of professional soccer games that were held on June 24 and July 28 in 2001. The data for this study was collected from 14 kinds of daily newspapers from June 10 to August 20 in 2001 to maintain the objective validity of the outline, the reasons, and the processes of the violent collective activities of spectators in two cases. The data was collected from Korea Integrated News Database System(KINDS) of Korea Press Foundation, and Chollian, on-line service of DACOM, for its efficiency, accuracy and promptness. On the basis of the above-mentioned method as well as the consequences of data analysis, I've reached to a conclusion as follows. The reasons of the violent collective activities of spectators in professional soccer games were the mass effect, the activities of players, umpires and the results of games, etc. The violent collective activities of spectators in professional soccer games need pre-requirements and have relationships with special affairs that are developed in a regular sequence. In other words, a collective activity gives an effect on another one directly or indirectly. Therefore, this study shows that we can reduce or prevent the damages by the violent collective activities of spectators in sport games when we analyze the processes of collective activities and make a previous counter-measure for that.

  • PDF

Error Control Protocol and Data Encryption Mechanism in the One-Way Network (일방향 전송 네트워크에서의 오류 제어 프로토콜 및 데이터 암호화 메커니즘)

  • Ha, Jaecheol;Kim, Kihyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.613-621
    • /
    • 2016
  • Since the error control problem is a critical and sensitive issue in the one-way network, we can adopt a forward error correction code method or data retransmission method based on the response of reception result. In this paper, we propose error control method and continuous data transmission protocol in the one-way network which has unidirectional data transmission channel and special channel to receive only the response of reception result. Furthermore we present data encryption and key update mechanism which is based on the pre-shared key distribution scheme and suggest some ASDU(Application Service Data Unit) formats to implement it in the one-way network.

Implementing Parental Involvement in Infants' Rooms: Explore Infant Teachers' Perspectives and Practices

  • Liu, Yanhui;Sulaimani, Mona F.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.123-130
    • /
    • 2022
  • Researchers had theorized that the earliest years' experiences were extremely critical to a child's future development (Jung, 2008; Liu et al., 2020), and parental involvement was a key character (Lamb et al., 2002; Liu, 2020). Though the critical role of parental involvement in education has been confirmed, less attention has been paid to its influence on infants' development. For the sake of infants' appropriate development, infant teachers always met barriers to finding, designing, and implementing age-appropriate activities. This case study aims at exploring the role of parental involvement in the development in infancy by surveying one director, four infant teachers, and six early childhood pre-service teachers' perspectives and practices regarding parental involvement in infant rooms within a Reggio Emilia-inspired child development center. Findings revealed that all participants: (1) thought parental involvement was essential to their decision-making process; (2) were aware of the benefits of implementing parental involvement in infants' rooms; (3) gained an opportunity to reflect on their practices regarding parental in-volvement and reprocess their previous perspectives. This study recommends that, in order to facilitate infants' development appropriately, child-care centers need to take into account parental involvement and work with parents collaboratively.

A Logical Group Formation and Key Distribution Scheme in WSN (WSN 환경에서 논리적 그룹 형성과 키 분배 방법)

  • Lee, Jae-Won;Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.296-304
    • /
    • 2007
  • This paper deals with essentially secure group management and key transfer methods in a wireless sensor network environment. To provide an efficient security service to a widespread network with a large number of sensor nodes, the network has to be made up by several security groups, and Group Key distribution and group management are needed. In this paper we propose a mechanism for efficiently constructing and managing a security node by constructing a group using an algorithm to construct a logical group. Previous Group Key Transport method has special condition. When Base Station transports Group Key, all sensor nodes must share Secret Key with Base Station before it is intended to be deployed. Hence, we also propose a Key transport mechanism without sharing Secret Key between Base Station and sensor node.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

OTACUS: Parameter-Tampering Prevention Techniques using Clean URL (OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법)

  • Kim, Guiseok;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.55-64
    • /
    • 2014
  • In a Web application, you can pass without restrictions special network security devices such as IPS and F/W, URL parameter, which is an important element of communication between the client and the server, is forwarded to the Web server. Parameters are modulated by an attacker requests a URL, disclose confidential information or through e-commerce, can take financial gain. Vulnerability parameter manipulation thereof cannot be able to determine whether to operate in only determined logical application, blocked with Web Application Firewall. In this paper, I will present a technique OTACUS(One-Time Access Control URL System) to complement the shortcomings of the measures existing approaches. OTACUS can be effectively blocked the modulation of the POST or GET method parameters passed to the server by preventing the exposure of the URL to the attacker by using clean URL technique simplifies complex URL that contains the parameter. Performance test results of the actual implementation OTACUS proves that it is possible to show a stable operation of less than 3% increase in the load.