• Title/Summary/Keyword: terror threat

Search Result 55, Processing Time 0.021 seconds

Incident shock and job Stressor analysis in Private Guards (민간경비원들의 사건충격과 직무스트레스 요인 분석)

  • Kim, Chan Sun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.51-59
    • /
    • 2012
  • Purpose of this study analyzes deeply and examine closely effect that incident shock of private guards gets in job stress. Used participation observation and In-depth analytical method to 10 common people guards inhabiting in capital region in 2012 to achieve purpose of this study. Collected interview data encoded using computer and analyzed by incident shock, job effect, job stress, organizational life. Conclusion proved in this study is as following. First, private guards appeared that incident shock such as suicide, terror threat, irrationality of superior that is produced in business spot gives great psychological fear. Second, private guards appeared suffer important shock are influenced in fear about business from shock that suffered in the past, and sociophobia appeared by thing which exert important effect changing by other business territory. Third, most private guards appeared that oneself experienced job stress from experiencing incident shock in the past. That is, incident shock exerts direct influence on customer confrontation in the past. Fourth, private guards appeared by thing which individual's organization life reduces when do not overcome incident shock that occur in the past. That is, incident shock decreases trust development and teamwork between superior and subordinate in organizational culture of private security.

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

Maritime Security of the Republic of Korea: year 1998 and year 2018 (한국의 해양안보: 1998년과 2018년)

  • Jung, Ho-Sub
    • Strategy21
    • /
    • s.43
    • /
    • pp.57-88
    • /
    • 2018
  • Security situations are fundamentally and rapidly changing on the Korean Peninsula. Above all, as North Korea(NK) is heightening its nuclear and missile capabilities, Republic of Korea(ROK) is facing an existential threat. At the same time, as China's economic, diplomatic and military power is quickly rising, the balance of power is shifting and strategic competition between the Unite States(US) and China is accelerating in the Asia-Pacific region. Under the pressure of development of these situations, ROK seems to face allegedly the most serious crisis in its national security since the end of the Korean War. In the current grim geopolitical situation, maritime security may become the most difficult security challenge for ROK in the years to come. The purpose of this paper is to compare major changes in maritime security affairs of the ROK during last twenty years from 1998 until now(2018). 1998 was when this journal 『Strategy 21』 was published for the first time by the Korea Institute for Maritime Strategy. Then, this paper tries to identify challenges and risks with which this country has to deal for its survival and prosperity, and to propose some recommendations for the government, the Navy, and the Coast Guard as they are responsible for the maritime security of the country. The recommendations of this paper are as follows: strengthen ROK-US alliance and expand security cooperation with regional powers in support of the maintenance of the current security order in the region; building-up of maritime security capacity in preparation for crisis on the maritime domain with the navy targeting to acquire 'a non-nuclear, balance-of-terror capability, to improve interoperability with the Coast Guard based on 'a national fleet,' and to actively pursue innovation in naval science and technology. Finally, this paper proposes that naval capability the country needs in another twenty years depends on how effectively and rigorously the navy put its utmost efforts towards building 'a strongest navy' today.

Suggestion on the Convention for Anti-Terrorism of North Eastern Asian Countries: Focusing on Tendency Analysis of Regional International Conventions (동북아시아 국가들의 대(對)테러리즘 관련 협약체결을 위한 제언: 지역별 국제협약의 경향분석을 중심으로)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.19-26
    • /
    • 2015
  • The threat of international terrorism has been increasing in international society. It could be no exception in northeastern Asian countries. First, north eastern Asian countries have exercised influences on many areas in international society such as politics, military and diplomacy. So international terrorism could occur in the countries. Second, as the north eastern Asian countries such as Korea, China, Russia and Japan have their own unique politics, religions, ethnic group and culture, terrorism have happened or could happen in their own countries. In this research, it will analyze the tendency of seven regional international conventions on anti-terrorism of international society. The result is as follows. It dealt with the following issues. 1. Reason and purpose of terrorism, 2. Contents of conventions on anti-terrorism, 3. Psychological and physical aspects of attacking types of terrorism, 4. Personal and physical aspects of damage of terrorism, 5. Hard targets and soft targets of victims of terrorism. It could be necessary for the north eastern Asian countries to review regional international convention on anti-terrorism based on this.

A Study on the Planning of Civil Defense Shelter and Design 1 - On the ideas of the State of Civil Defense Shelter & Design Criteria - (민방위 대피시설 계획 및 설계 방안에 관한 연구 1 - 민방위 대피시설의 현황 및 설계기준을 중심으로 -)

  • Park, Namkwun;Paik, Sungkun
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.358-365
    • /
    • 2014
  • North Korea has been preparing for WMD(Weapons Mass Destruction) using asymmetric force since it recognized the economic effects of CBR (Chemical, Biological, Radiological) weapons system operation and the limitations of conventional weapons. However, the threat only to conventional bombs, missiles and etc. is considered on the current Civil Defense Shelter, which could increase civil damages, not responding appropriately to disasters such as CBR weapons, terror attacks and etc. Therefore, this study confirms the current situation of Civil Defense Shelter and design criteria focused on CBR disasters so that we could make a plan and design of Civil Defense Shelter. In addition, we suggest the research result and improvements on Civil Defense Shelter and Design.

A study on measure of North Korea's nuclear terror threat; Focusing on the guarantee of 'anticipatory self-defense' (북한 핵테러 위협 대비방안 연구; '선제적 자위권' 보장을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.13-23
    • /
    • 2016
  • North Korea had recently conducted the fourth nuclear test and ICBM tests, dared nuclear provocation targeting the Korea and the international community. It is determined based on experiments of nuclear and missile in progress in North Korea that the technical level of nuclear force reached the completion stage of standardization, lightweight, and variation. It is expected to become reality that North Korea executes the nuclear provocation targeting the Korea and the international community in the near future. Nuclear bomb is an absolute weapon that the logic of counterattack after allowing the first strike of the other party cannot be applied due to its tremendous destructive power. Therefore, as the opponent to North Korea that it decided to hold the nuclear, the exercise of anticipatory self-defense in order to guarantee a minimum of right to life is not a choice, but the only essential correspondence concept. At the moment that the North Korean nuclear provocation is expected in the near future, it shall be provided with competence to strike the origin region of provocation by forming a national consensus of preemptive strike enforcement. Also, in preparation for the fifth nuclear test of North Korea, which is anticipated, the national competence must be mobilize to be able to ensure the 'Nuclear Option' from the international community.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF