RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 고등학교의 교통안전교육 체게적 방안에 관한 연구

        전순호(Jeon Sun-Ho),윤선화(Yoon Sun-Hwa) 한국안전교육학회 2002 한국안전교육학회지 Vol.5 No.1

        The purpose of this study is to provide a method with which traffic safety education will be conducted in high school through the analysis of teachers', parents' and students' needs for the education and existing educational system for the traffic safety. The method for the systematic provision of traffic safety education in high school is : 1) For the implementation of the education, it should become compulsory like in Japan that each high school should develop a plan for traffic safety education and designate a traffic safety teacher. 2) For the contents of the education, the government should provide each high school with recommended contents and guidelines for traffic safety education like in UK, Japan and Germany. Also, traffic safety elements should be added to the established educational materials and textbooks and various kinds of separate traffic safety materials should be published and distributed. 3) For the better training of teachers, there must be some incentives given to the teachers who completes traffic safety training and the traffic safety should become a core subject in the college of education.

      • 조선시대 왕실 호위조직에 관한 고찰

        이상철(Sang-Chol Lee),송상욱(Sang-Wk Song) 한국안전교육학회 2001 한국안전교육학회지 Vol.4 No.1

        The purpose of this study is to present fundamental data for understanding and development the historical approach of Korea protection by reexamining royal protective system through the history in Chosun Dynasty. In order to meet the purpose of this study, the records relating to the protection system among the primary references in the Chosun Dynasty were investigated and analyzed. The main materials of history in Chosun Dynasty were re-examined, investigated and analyzed and the main references are a code of laws and official as well as private documents such as Chosun-wangcho-silok, Kyungguk-tajoen, Kukjo-Oreyeui. Protection system for Royal prince has been found in Byung-jeon of Kyungguk-daejon. The protection organization has dual system, one was Gumgun which was a private military man and the other was Wuibyung which was a central military man. Gumgun were paid by government and had an extra orders. The number of Gumgun were exactly limited and they were selected among the best of best military man. Their duties were the protection of the King in vicinity and they were professional member of protective system. On the contrary, central military man were normally protected the royale palaces, but when the King come and go they accompanied and protected the King in safety zone. But just in case they did a job as a member of capital protection military affairs. A question of finance was the reason why there had been dual protection system due to financial matter. If it increased number of man it would pay much money, therefore central military man who has no relevance to national finance were supplied as members of military affairs for the protection of king.

      • 경호학전공 특성화 교육 개선방안

        박재홍,한홍태 한국안전교육학회 2000 한국안전교육학회지 Vol.3 No.1

        This research is a preliminary study for the improved management of educational specialization of guard and security major. A survey was performed with 174 registered students who are majoring in guard and security at nine universities throughout the country, and with 420 employees who are work ing for sixty firms in Seoul-Incheon area, out of more than 1.300 companies registered at The Korean Security Association. The systematic cluster sampling method was used for creating the data set and the total number of 594 interviewees answered our questionnaires. 1. The Result from Students The result of questions concerning their preference ordering for the major field, when they entered the school, was $quot;Guard and Security$quot;(81%), $quot;Private Security$quot;(12%) and $quot;Safety$quot;(7%). Their preference for the major courses also appeared in the same order of $quot;Guard and Security$quot;, $quot;Private Security$quot; and $quot;Safety$quot; area. In the field of $quot;Safety$quot;, relatively small number of students were evenly distributed to 13 courses such as $quot;Theory of Prevention of Disasters in Cities$quot; and $quot;Intelligent Building$quot;. Thirty-seven courses were opened in $quot;Guard and Security$quot; major, and 111 students took $quot;Martial Arts for Body Guarding$quot;, 99 for $quot;Planning Theory of Body Guarding$quot;, and 96 for $quot;Introduction to the Theory of Body Guarding$quot;, respectively. And students majoring in $quot;Private Security$quot; also took their 31 courses impartially, in which $quot;Theory of Private Security$quot;(21), $quot;Introduction to Machinery Security$quot;(21), $quot;Facilities Security$quot;(15) and $quot;Theory of Grisis Management$quot;(12) were included. 2. The Results from Employees in Security Business Firms emphasized the importance of integrity(63%), capability foroperation(18%) and special knowledge for the job(17%), when they hired the workers. The ways of acquiring skills necessary to an employee for his/her accomplishment of a given operation were turned out to be through on-the-job training(39%) and from their senior members inside the firm(20%). This tells us that there are not sufficient educational institutions to cultivate the specialists, therefore, we need to develop specialized educational programs for the major field in the universities

      • 국내 경호 위해사건 사례분석을 통한 경호활동 개선방안 연구

        박영진(Park Young-Jin) 한국안전교육학회 2003 한국안전교육학회지 Vol.6 No.1

        This thesis explains the basics of the security activity in general and proposes alternate methods that can meet the needs in the changing world of terrorist activities through various examples. The analysis process does not put emphasis on the detailed professional security measure but rather on the basic conduct. Also, it has it's reference on the foreign security system rather than the local. According to the analysis of security methods so far comes to the following summary. First, the security information activity program should be promoted actively to gather and analyze before the incident occurs. This gathered information then should be shared among relevant groups. When gathering security data from other information institutes the security data gathered should be carefully inspected for authorization before use. Secondly, the security activities must include the enclosure of the client's itinerary. Most terrorism activities occur when this information has leaked out. And for the antagonist, this information becomes most important. Thus in the case of public events the schedule of the client has to be enclosed as much as possible and for the disclosed information already out, necessary precautions should be maintained ahead of time. Thirdly, preventive measures should be enforced to enhance protection of relevant information, security and safety measures for prevention of catastrophe. It is also important to discover weak spots in the security region. Fourth, in the case of close protection of the client the guard should be taken in all directions and in the case of an emergency protection should be prepared in advance in form of tentative reflex as guiding the client to a safe area first aid. In conclusion, the protecting party should always be aware that even though there may be a heavily enforced security program set, the client will always be enclosed to danger thus always tense. The antagonist always thrives for the weakest spot and searches for the easiest way to approach the victim that is why the above becomes very important. Also, even though the client has been protected security institutes still holds fault for letting the incident happen. The method of security studies will be bettered once the protection program evolves as the years progresses and thus in the future a more developed method will be introduced

      • 경호 위해사건 사레분석을 통한 경호제도 개선방안 연구

        박영진(Park Young-Jin) 한국안전교육학회 2002 한국안전교육학회지 Vol.5 No.2

        To achieve political and social goals, terrorism in terms of creating fear from people with their lives, freedom and heath, possessions is becoming a global threat and thus a big issue in the world today. Upon different terrorism approaches the type that tends to threat lives of country leaders differentiates with terrorism among civilians in terms that the effect can monopolize the nation's security and the administrative power in short time span. Though each nation has its own security methods and personnel the structure seems to be different from one country to another, but the main purpose remains the same allover the world The top priority of these men in arms would be to protect the "victim" at all cause and come up with a resolution to prevent harm. Thus, the security offices, to protect the victims from assassinations and terrorism, are working on developing resolutions to prevent such incidents. Each office has its own unique security programs to protect the victim and so to enclose relevant information they are keeping strict guard. But, as time progresses the methods of terrorism and assassinations are increasingly becoming diverse in their technological, scheme and party. The system should be thus carefully analyzed and monitored to be upgraded to meet the requirements to fulfill the needs in the world today. This thesis explains the basics of the security activity in general and proposes alternate methods that can meet the needs in the changing world of terrorist activities through various examples. The analysis process does not put emphasis on the detailed professional security measure but rather on the basic conduct. Also, it has it' s reference on the foreign security system rather than the local. According to the analysis of security methods so far comes to the following summary, First, the security information activity program should be promoted actively to gather and analyze before the incident occurs. This gathered information then should be shared among relevant groups. When gathering security data from other information institutes the security data gathered should be carefully inspected for authorization before use. Secondly, the security activities must include the enclosure of the client's itinerary. Most terrorism activities occur when this information has leaked out. And for the antagonist, this information becomes most important. Thus in the case of public events the schedule of the client has to be enclosed as much as possible and for the disclosed information already out, necessary precautions should be maintained ahead of time. Thirdly, preventive measures should be enforced to enhance protection of relevant information, security and safety measures for prevention of catastrophe. It is also important to discover weak spots in the security region. But as mentioned ahead a 100% prevention measure is not possible and the security protection program should be ready for all kinds of sudden changes. Fourth, in the case of close protection of the client the guard should be taken in all directions and in the case of an emergency protection should be prepared in advance in form of tentative reflex as guiding the client to a safe area first aid. In conclusion, the protecting party should always be aware that even though there may be a heavily enforced security program set, the client will always be enclosed to danger thus always tense. The antagonist always thrives for the weakest spot and searches for the easiest way to approach the victim that is why the above becomes very important. Also, even though the client has been protected the 4 nation security institutes still holds fault for letting the incident happen. The method of security studies will be bettered once the protection program evolves as the years progresses and thus in the future a more developed method will be introduced.

      • 태권도 보급과 선교연구

        유호경 한국안전교육학회 2002 한국안전교육학회지 Vol.5 No.2

        Taekwondo is the name of the modern international sport, The population is estimated about 50 million People and the member of WTF more then 150 countries. Taekwondo served to improve health, Physical fitness and poise of the people Practicing it. The effective preaching the gospel is not easy especially in order cultural area. We must be think our method of mission. How many People like to learn taekwondo. It is can be help the extension of missionary work to preach the gospel. Taekwondo effect is great in dilieverng the messages.

      • 우리나라의 사고다발지점 선정방법의 문제점 및 개선대안

        성낙문(Sung Nak-Moon),이환승(Lee Hwan-Seung) 한국안전교육학회 2002 한국안전교육학회지 Vol.5 No.2

        In conducting traffic safety programs, it is very important to identify hazardous sites in appropriate manner. Many experts in the traffic safety fields have performed researches to choose hazardous sites. The method of identifying hazardous sites which prevails in Korea is based on the traffic crash frequencies, which is inevitable because of insufficient database associated with the traffic crash data This paper analyzed problem related to the method based on accident frequencies, and established an alternative which is named as frequency-quality control method, to make up for the weak points in the current method. As a result of test, the proposed method was reliable enough to be applied in the traffic safety program.

      • 경호 위해사건 사례분석을 통한 경호제도 개선방안 연구

        박영진 한국안전교육학회 2002 한국안전교육학회지 Vol.5 No.2

        To achieve political and social goals, terrorism in terms of creating fear from people with their lives, freedom and heath, possessions is becoming a global threat and thus a big issue in the world today. Upon different terrorism approaches the type that tends to threat lives of country leaders differentiates with terrorism among civilians in terms that the effect can monopolize the nation's security and the administrative power in short time span. Though each nation has its own security methods and personnel the structure seems to be different from one county to another, but the main purpose remains the same all over the world. The top priority of these men in arms would be to protect the "victim" at all cause and come up with a resolution to prevent harm. Thus, the security offices, to protect the victims from assassinations and terrorism, are working on developing resolutions to prevent such incidents. Each office has its own unique security programs to protect the victim and so to enclose relevant information they are keeping strict guard. But, as time progresses the methods of terrorism and assassinations are increasingly becoming diverse in their technological, scheme and party. The system should be thus carefully analyzed and monitored to be upgraded to meet the requirements to fulfill the needs in the world today. This thesis explains the basics of the security activity in general and proposes alternate methods that can meet the needs in the changing world of terrorist activities through various examples. The analysis process does not put emphasis on the detailed professional security measure but rather on the basic conduct. Also, it has it's reference on the foreign security system rather than the local. According to the analysis of security methods so far comes to the following summary. First, the security information activity program should be promoted actively to gather and analyze before the incident occurs. This gathered information then should be shared among relevant groups. When gathering security data from other information institutes the security data gathered should be carefully inspected for authorization before use. Secondly, the security activities must include the enclosure of the client's itinerary. Most terrorism activities occur when this information has leaked out. And for the antagonist, this information becomes most important. Thus in the case of public events the schedule of the client has to be enclosed as much as possible and for the disclosed information already out, necessary precautions should be maintained ahead of time. Thirdly, preventive measures should be enforced to enhance protection of relevant information, security and safety measures for prevention of catastrophe. It is also important to discover weak spots in the security region. But as mentioned ahead a 100% prevention measure is not possible and the security protection program should be ready for all kinds of sudden changes. Fourth, in the case of close protection of the client the guard should be taken in all directions and in the case of an emergency protection should be prepared in advance in form of tentative reflex as guiding the client to a safe area first aid. In conclusion, the protecting party should always be aware that even though there may be a heavily enforced security program set, the client will always be enclosed to danger thus always tense. The antagonist always thrives for the weakest spot and searches for the easiest way to approach the victim that is why the above becomes very important. Also, even though the client has been protected the 4 nation security institutes still holds fault for letting the incident happen. The method of security studies will be bettered once the protection program evolves as the years progresses and thus in the future a more developed method will be introduced.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼