RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
          펼치기
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        경호산업 전문인력 양성을 위한 대학 내 경호보안 전공계열 교육과정 개선 방안

        신미애,박영만 한국민간경비학회 2023 한국민간경비학회보 Vol.22 No.4

        The purpose of this study is a plan to improve the curriculum for security majors in universities to train security industry professionals, and the research method to achieve the research purpose was set as a systematic literature review. The identified problems consisted of three issues: first, deepening of the centralization of educational subjects, second, the curriculum not reflecting social changes and trends, and third, the inconsistency between the goals of the curriculum and industrial demands. The improvement measures for this were first, it was proposed to increase the proportion of public security subjects, second, to establish 4th Industrial Revolution technology convergence subject, and third, to establish a new subject that reflects the demands of the security industry. The meaning of the improvement plan presented above is that the curriculum of majors and departments related to security and security ultimately has a mutual influence with science of security and the security industry. In other words, as the decline of the curriculum can be seen as a decline of the science of security and the security industry, it can be seen that this suggests that intensive changes and efforts must be made in the current security and security-related majors and departments.

      • KCI등재

        안보와 지역: 안보개념의 정립과 동북아안보공동체의 가능성

        박인휘 세종연구소 2010 국가전략 Vol.16 No.4

        This research includes analyses on the definitions of security and insecurity, the referent subject of security, the meaning of threat, and the related political process. In the history of modern sovereign states 'individual security', which emphasizes the physical, economic, and social conditions of human beings, has been centered on the discussions on security. Those conditions mainly based on the 'social contract' between individuals and state stand on the reliable foundation of the domestic political stability and rational diplomatic relations with neighboring countries. In other words, 'being secured condition' of human beings only can be achieved by the understanding of the social relations or interdependence in which peoples are associated with in regional levels. The Northeast Asian region has been identified as one of the most typical regions at which the 'individual security' of the people is unlikely to be understood in the context of regional level. To achieve the better secured Northeast Asian region it is mostly necessary to explore theoretical concepts on security which would lead to develop a regional security community. 안보연구는 통상 ‘안보’ 및 ‘안보부재’를 정의하는 방법, 안보의 주체, 위협의 내용, 안보를 확보하는 방법, 그리고 관련 정치화 과정 등을 핵심 내용으로 한다. 근대 주권국가의 역사에서 안보의 출발은 ‘개인의 안보(individual security)’ 확보에 있으며, 생명의 보장과 행복한 삶으로 통칭되는 개인의 안보는 ‘국가’와의 계약을 토대로 국내 정치적 안정 및 주변 국가들과의 이성적인 외교관계를 전제로 하고 있다. 즉, 개인을 둘러싸고 있는 환경들과의 지속적인 ‘상호작용 및 사회적 연합’을 이해하고, 이를 둘러싼 다양한 노력과 실천이 안보 확보의 핵심임을 깨닫게 된다. 시간적, 공간적, 구조적 수준의 안보 이슈들이 서로 복합적으로 얽혀있는 동북아의 경우 이 지역에 살고 있는 사람들의 안보를 확보하기 위해서는 동북아를 하나의 지역으로 설정한 공동체적 접근이 긴요히 요구된다. 그러기 위해서는 무엇보다도 동북아 지역의 안보를 구성하고 있는 인식적 요소 및 관련 개념화 작업이 필요하다고 판단된다.

      • An Empirical Study on Republic of KOREA Information SECURITY Convergence-Type: Latent Means Analysis of Social Welfare Average Presence and Gender Differences

        Yun Il-hyun J-INSTITUTE 2016 Protection Convergence Vol.1 No.1

        Social workers are based, including the professional skills and experience they have. The professionals who are professionally addressed with respect to interact with individuals, families and communities with life on the difficulty or problem.Social workers and ensure a comprehensive and professional information about them. Information with a social worker it is very important to the individual level, family level there, the group level, the community level. And are resources that can give serious damage. It is very important to ensure profes-sionalism and ethics professional knowledge about information security as a prerequisite. Social workers should learn the professional knowledge and skills in social work practice based on high ethical. This learning can be made from the University of Social Welfare Training begins. Therefore, the information security training for social workers shall be made from the university. The purpose of this study is to provide basic information for information security training of social workers. An Empirical Study on Republic of Korea Information Security Convergence-type Latent means Analysis of Social Welfare average presence and gender differences. Information security configuration parameters are information security act, information security education, information security behavior.Personal information is information security behavior is not experienced, optimis-tic bias in information security, technical understanding of information security, and understanding of infor-mation security threats. The study is the welfare of students majoring in Gwangju University students and Non - Major Students. The samples of this study were carried out three weeks from March 05, 2016 using a non-probability sampling methods. Self-report questionnaire was used to survey. 317 people were targets except one respondent insincere. Target of the lion male 106 people (33.4%) were female students, 211 people (66.6%). Social work majors are 149 people (47.0%), Non - Major Students was 53.0%). This study applies the correlation analysis, multi-group analysis and latent mean analysis. The results of this study were as follows. First, personal experience, optimistic bias, the difference between groups for the presence gender and social groups majoring in structural relationships of technical understanding, understanding of threats, information security education, information security and information security for the action showed that. The difference was not great. Second, women s groups and major groups personal experience in information security, optimism bias, higher education technological understanding is increasing security information, and information security In-formation security is high, the action showed that high. Third, it was a personal experience, optimistic bias, technical understanding, and understanding of information security threats education, the difference between groups according to the presence or absence Gender and Social Welfare in the structure of the relationship between information security acts on information security. Fourth, the need for women and social welfare groups in major information security education was relative-ly high. Many women relative to men majors than social welfare, information security education is very im-portant when considering the proportion of women in the social welfare field. Therefore, the information secu-rity courses shall be established on social welfare majors. In addition, you should enable information security education based on ethics for social welfare information security and personal security.

      • Characteristics of Legal System Related to SECURITY in Republic of KOREA

        Kim Tae-min,Park Heon-young J-INSTITUTE 2017 Protection Convergence Vol.2 No.1

        In particular, terrorists are recently instilling fear in people with their indiscriminate attacks on unspecified number of targets who are soft targets, as well as hard targets, which suggests that we are living in an era of new terrorism. Furthermore, crimes are becoming more and more violent, intelligent, broadening, and interna-tionalized. Korea has also witnessed a rise in crimes each year. In Korea, public law enforcement organizations and private security industry operate in harmony with each other to maintain crime prevention and security. The purpose of this study was to compressively analyze and introduce the characteristics of legal system related to public law enforcement and private security, the twin pillars of security services in Korea who were responsible for security of the society and safety of citizens. In a word, Korea’s security-related legal system is characterized by dualized operation system. The legal system of public law enforcement in Korea and its characteristics are as follows. First, public law enforcement organizations in Korea operate the National Police Agency under the supervision of the Minister of Government Administration and Home Affairs to take charge of security-related works pursu-ant to the 「Government Organization Act」. In addition, Presidential Security Service was organized which undertake security duties for President, etc. Second, major laws related to the police include 「Act on the Performance of Duties by Police Officers」, 「Police Officers Act」, 「Police Act」, etc. Third, public security organizations in Korea are operated under the dualized system in which Presidential Security Service is responsible for Presidential security and police security organization taking charge of security for important personnel of the nation such as Prime Minister, etc. The legal system related to private security in Korea and its characteristics are as follows. First, legal system related to private security is dualized. Private security in Korea is operated by dualized system where registered security guards and security guards carry out security duties as prescribed in 「Registered Security Guard Act」(enacted in 1962) and 「Security Services Industry Act」(enacted in 1976), respectively. Second, security for important national facilities is dualized. Third, efforts have been made to expand 5 types of security services provided as prescribed in the 「Security Services Industry Act」 and to broaden the scope of such security services. Recently, there has been discussions on expanding the scope of security service to include private investigation service, traffic direction security service, civilian military service, etc. Fourth, security guards, stipulated in the 「Security Services Industry Act」 are operated under the dualized system where ordinary security guards are performing the duties of facility security, escort security, personal security, and machinery security and special security guards are carrying out the duties of special security services.

      • KCI등재

        보안산업 육성을 위한 법률 제명 개정에 관한 논의 : 「경비업법」의 개정

        김태민,신상민 한국융합보안학회 2016 융합보안 논문지 Vol.16 No.1

        선진국들은 사회안전 확보와 경찰 등 공경비와의 협력치안, 그리고 자국 내 보안산업의 육성과 경제발전 차원에서민간경비를 발전시켜 오고 있다. 국내에서도 1976년 「용역경비업법(현재, 경비업법)」이 제정되면서 제도적으로 급성장할 수 있는 계기를 마련하여 현재에 이르고 있다. 그럼에도 불구하고 현행 「경비업법」의 법률 제명에 대해서는 학자들과 업계로부터 개정논의가 꾸준하게 이루어져 오고 있다. 특히 2012년에는 「민간보안산업에 관한 법률」로 법률의 제명을 변경하자는 ‘경비업법 전부개정법률안(의안번호: 2389)’이 발의되기도 하였다. 본 연구에서는 이러한 실정에서 경호학자들의 의견수렴을 통하여 보안산업 육성을 위한 법률 제명 제안 및 개정에 관하여 논의하고자 하였다. 법률제명은 개정되는 것이 당연하고, 법률 제명의 개정은 보안산업 육성을 위해 여러 가지 측면에서 긍정적인 요인으로 작용할 수 있어 시급히 개정될 필요성이 있다. 연구결과 경호학자들은 「경비업법」의 개정안으로 첫째 「경호보안산업법」으로 개정되기를 희망하고 있으며, 다음으로는「보안산업에 관한 법률」로 개정되기를 희망하고 있었다. 법률의 제명 개정에 따라 후속조치로 법령 조문들 또한 많은 부분 개정되어야 할 것이다. Developed countries have been taking their private security industry to the next advanced level to maintain safety of society, promote cooperative security in conjunction with public security such as the police, cultivate domestic security industry, and spur economic growth. In Korea, Service Security Business Act(currently, Security Business Act) enacted in 1976 laid groundwork for rapid institutional development. Nonetheless, the need to rename current title of Security Business Act has been discussed continuously among scholars and industry. Particularly, a bill(bill no.: 2389) was proposed in 2012 to rename ‘Security Business Act’ completely to ‘Private Security Industry Act’. Under those circumstances, this study was intended to discuss proposals that had been made to rename the Act for underpinning development of security industry, along with its amendment, by gathering opinions from scholars in the field of security. It is undeniable that there is need for renaming the Act. As the renaming of the Act can have positive impact in many aspects for promotion of security industry, the urgency to rename the Act is indisputable. The results suggested that scholars specializing in security hoped the Security Business Act to be renamed primarily to Guard and Security Industry, and if not, to be renamed to Security Industry Act. The renaming of the Act will give rise to the need to amend many parts of provisions contained therein as follow-up action.

      • KCI등재

        안보담론과 국제정치

        민병원(Byoung Won Min) 고려대학교 평화와민주주의연구소 2012 평화연구 Vol.20 No.2

        이 논문은 20세기의 지배적인 안보담론이 탈냉전기에 들어와 어떻게 바뀌었으며, 특히 21세기의 맥락에서 어떤 변화를 겪고 있는가를 이론적 맥락에서 관련 연구 리뷰를 통해 성찰한다. 이를 위해 안보개념이 고대와 중세, 그리고 근대에 걸쳐 어떻게 형성되어왔는가를 추적하며, 이것이 개인과 국가라는 서로 다른 분석수준, 그리고 전략, 평화, 안보라는 대립적이면서도 보완적인 핵심개념을 통해 정교하게 발전되어왔다는 점을 부각시키고 있다. 냉전의 종식과 더불어 안보개념은 코펜하겐학파의 주도 하에 확대된 형태로 발전하게 되는데, 본 논문에서는 이러한 변화의 주요 내용은 무엇인지, 그리고 한계는 무엇인지 짚어본다. 특히 21세기에 들어와 비서구 안보담론들이 어떤 양상으로 발전하고 있는가를 논의한 후에 미래의 안보담론이 지향해야 할 몇 가지 목표를 제시한다. 특히 강대국 중심의 안보담론을 극복하고 국가 간비대칭성을 인식하며, 복잡한 상호관계를 인식하기 위한 네트워크안보의 개념을 중시하면서 동시에 전통적 안보개념과 비전통적 안보개념 사이의 균형을 강조한다. 이를 통하여 본 논문에서는 탈냉전기에 활발하게 전개되어온 안보개념의 확대가 보다 체계적인 틀 안에서 더욱 발전할 수 있는 가능성을 탐색하고자 한다. This paper reviews the change of mainstream security discourses in the twentieth century and the post-Cold War period. In particular, it investigates the concept of security in the context of the twenty-first century. The formation of the security concept from the ancient to medieval times and the modern period is traced in the paper. Also the paper focuses on the co-evolutionary relationship among a couple of contrasting and complementary notions of strategy, peace and security. As the Cold War ended, the concept of security has eventually developed as a comprehensive word. The paper discusses what are the contents of this conceptual change and their limitations. Non-Western discourses on security matters will also be introduced in the paper with their future orientations. Other points discussed in the paper include the asymmetric nature of mainstream discourse led by strong powers, the notion of network security in understanding complex interdependences, and the balance between traditional notion of security and non-traditional one. As such, the paper searches any further potentials for the extensive concept of security in the post-Cold War period with more systematic theoretical frameworks.

      • KCI등재

        CIA-Level 기반 보안내재화 개발 프레임워크

        강수영,김승주 한국정보보호학회 2020 정보보호학회논문지 Vol.30 No.5

        From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that “vulnerabilities are not found” is not equal to “product does not have any vulnerabilities”. So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding “security-by-design” concept from the 1980s. Security-by-design means reducing product’s complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC. 미국 정부는 1970년대 초반부터 모의해킹만으로는 제품의 보안 품질을 향상시킬 수 없다는 것을 인지하기 시작하였다. 모의해킹팀의 역량에 따라 찾을 수 있는 취약점이 달라지며, 취약점이 발견되지 않았다고 해서 해당 제품에취약점이 없는 것은 아니기 때문이다. 제품의 보안 품질을 향상시키기 위해서는 결국 개발 프로세스 자체가 체계적이고 엄격하게 관리되어야 함을 깨달은 미국 정부는 1980년대부터 보안내재화(Security by Design) 개발 방법론및 평가 조달 체계와 관련한 각종 표준을 발표하기 시작한다. 보안내재화란 제품의 요구사항 분석 및 설계 단계에서부터 일찍 보안을 고려함으로써 제품의 복잡도(complexity)를 감소시키고, 궁극적으로는 제품의 신뢰성(trustworthy)을 달성하는 것을 의미한다. 이후 이러한 보안내재화 철학은 Microsoft 및 IBM에 의해 SecureSDLC라는 이름으로 2002년부터 민간에 본격적으로 전파되기 시작하였으며, 현재는 자동차 및 첨단 무기 체계 등다양한 분야에서 활용되고 있다. 하지만 문제는 현재 공개되어 있는 Secure SDLC 관련 표준이나 가이드라인들이매우 일반적이고 선언적인 내용들만을 담고 있기 때문에 이를 실제 현장에서 구현하기란 쉽지 않다는 것이다. 따라서 본 논문에서 우리는 Secure SDLC를 기업체가 원하는 수준에 맞게 구체화시키는 방법론에 대해 제시한다. 우리가 제안하는 CIA(functional Correctness, safety Integrity, security Assurance)-Level 기반 보안내재화 프레임워크는 기존 Secure SDLC에 증거 기반 보안 방법론(evidence-based security approach)을 접목한것으로, 우리의 방법론을 이용할 경우 첫째 경쟁사와 자사간의 Secure SDLC 프로세스의 수준 차이를 정량적으로분석할 수 있으며, 둘째 원하는 수준의 Secure SDLC를 구축하는데 필요한 상세한 세부 활동 및 산출해야 할 문서 등을 쉽게 도출할 수 있으므로 실제 현장에서 Secure SDLC를 구축하고자 할 때 매우 유용하다.

      • KCI등재

        流擔保契約

        강태성 한국민사법학회 2005 民事法學 Vol.29 No.-

        The security-elimination contract is what can eliminates the security being existed. Namely, It means what can eliminates the performance- method of this security. But, in korea this term of security-elimination contract is scarcely in use. The term of pledge-elimination contract and mortgage-elimination contract are only in use. In this study, I admit the term of the security-elimination contract, discourse upon this contract in detail. And, I debate many issue-points on several security-elimination contract. In the following sentences, the security-elimination contract shall be called s-e-contract. Ⅰ. The Compass of S-E-Contract I give a example which belong to this contract, does not belong to this contract. Ⅱ. The Relation between S-E-Contract and Security Creation Contract 1. S-e-contract is not the accessory of the contract that creates a security real right. S-e-contract is independent. 2. In case s-e-contract is invalid, is the security-creation-contract also invalid? my point of view is negative. Ⅲ. Performance Based on S-E-Contract 1. Is this performance the performance of security real right? Common views and judical precedents are negative, but my point of view is negative. 2. The security real right is not lapsed by the performance based on s-e-contract. Ⅳ. Form and lapse of the Security-Elimination Right The security-elimination right is formed by the s-e-contract and this contract is formed by mutual agreement. The security-elimination right does not lapse by lapse of the security right. Ⅴ. Several S-E Contracts I debate issue-points on several security-elimination contract. Namely, pledge-elimination contract, mortgage-elimination contract, contract that can eliminates provisional-registration-security, contract that can eliminates transfer for security, chonsegwon-elimination contract.

      • Security technologies based on a home gateway for making smart homes secure

        Kim, Geon Woo,Lee, Deok Gyu,Han, Jong Wook,Lee, Seung Hyun,Kim, Sang Wook Emerald Group Publishing Limited 2009 INTERNET RESEARCH Vol.19 No.2

        <B>Purpose</B> - The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them. <B>Design/methodology/approach</B> - The research model is designed to support three functions: authentication, authorization, and security policy. Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly-designed script language, such as xHDL. <B>Findings</B> - The findings for "authentication" suggest that home network users can access services conveniently and securely. In addition, the findings for "security policy" suggest that security policy for home network requires specialized rather than general specification. <B>Practical implications</B> - The paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware-independent and beyond the physical transport layer; and security policy optimized for the home network environment. <B>Originality/value</B> - The paper focuses on an implementation-based security model for the home network. Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now. This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.

      • KCI등재

        군 구성원의 심리적 요인, 보안 스트레스, 보안행동의도 간 관계에 관한 연구

        박의천 미래군사학회 2022 한국군사학논총 Vol.11 No.2

        Recently, in order to respond to various security threats, the focus is on physical and technical security. However, security incidents are increasing. Accordingly, it is recognized that the root cause of the increase in security accidents is human 'psychology'. This study empirically analyzed how psychological factors of Planned Behavior Theory and Protection Motive Theory, which are social science theories dealing with human psychology, affect Security Behavior Intention. In addition, the stress control effect was investigated in their relationship. For this purpose, controlled regression analysis and continuous moderation effect analysis methods were used. Looking at the research results, First, it was found that Security Behavior Intention was significantly affected in the order of Security Belief, Security Severity, Perceived Norm, Security Efficiency, and Security Effectiveness. Second, it was found that Security Stress modulates the relationship between Perceived Norms, Security Vulnerabilities, and Security Behavioral Intentions. Through these conclusions, By extracting psychological factors that have a significant effect on compliance with security regulations, it provided an opportunity to secure the credibility of people centered approach to security accident prevention. It is also expected to provide a basis for expanding academic research models on security. 최근 각종 보안위협에 대응하기 위해 물리적이고 기술적인 보안에 주안점을 두고 있다. 그러나, 보안사고는 증가하고 있다. 이에, 보안사고가 증가하는 근본적인 원인이 인간의 ‘심리’라고 인식하게 된다. 인간의 심리를 다루는 사회과학이론인 계획행동이론과 보호동기이론의 심리적 요인이 보안행동의도에 어떠한 영향을 미치는지 실증 분석하였다. 또한, 이들의 관계에서 스트레스 조절효과를 규명하였다. 이를 위해 통제회귀분석과 연속형 조절효과 분석방법을 이용하였다. 연구결과를 살펴보면, 첫째, 보안신념, 보안심각성, 인지된 규범, 보안효율성, 보안효능감 순으로 보안행동의도에 유의미한 영향을 미치는 것으로 나타났다. 둘째, 보안 스트레스가 인지된 규범, 보안취약성과 보안행동의도 간의 관계를 조절하는 것으로 나타났다. 이러한 결론을 통해, 보안규정을 준수하는데 유의미한 영향을 주는 심리적 요인을 추출함으로써 보안사고 예방에 대한 인간 중심의 접근방법의 신뢰성을 확보하는 계기를 마련하였다. 또한, 보안에 대한 학술적인 연구모델을 확장하는데 기초를 제공할 것으로 기대한다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼