메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
저널정보
한국사회안전학회 한국사회안전학회지 韓國安全敎育學會誌 제6권 제1호
발행연도
2003.12
수록면
5 - 21 (17page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
This thesis explains the basics of the security activity in general and proposes alternate methods that can meet the needs in the changing world of terrorist activities through various examples.
The analysis process does not put emphasis on the detailed professional security measure but rather on the basic conduct. Also, it has it's reference on the foreign security system rather than the local.
According to the analysis of security methods so far comes to the following summary.
First, the security information activity program should be promoted actively to gather and analyze before the incident occurs. This gathered information then should be shared among relevant groups. When gathering security data from other information institutes the security data gathered should be carefully inspected for authorization before use.
Secondly, the security activities must include the enclosure of the client's itinerary.
Most terrorism activities occur when this information has leaked out. And for the antagonist, this information becomes most important. Thus in the case of public events the schedule of the client has to be enclosed as much as possible and for the disclosed information already out, necessary precautions should be maintained ahead of time.
Thirdly, preventive measures should be enforced to enhance protection of relevant information, security and safety measures for prevention of catastrophe. It is also important to discover weak spots in the security region.
Fourth, in the case of close protection of the client the guard should be taken in all directions and in the case of an emergency protection should be prepared in advance in form of tentative reflex as guiding the client to a safe area first aid.
In conclusion, the protecting party should always be aware that even though there may be a heavily enforced security program set, the client will always be enclosed to danger thus always tense. The antagonist always thrives for the weakest spot and searches for the easiest way to approach the victim that is why the above becomes very important.
Also, even though the client has been protected security institutes still holds fault for letting the incident happen. The method of security studies will be bettered once the protection program evolves as the years progresses and thus in the future a more developed method will be introduced

목차

ABSTRACT
Ⅰ. 서론
Ⅱ. 경호의 기본이론
Ⅲ. 국내 요인 위해사건 사례
Ⅳ. 경호활동의 문제점
Ⅴ. 경호활동의 개선방안
Ⅵ. 결론
참고문헌

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2010-530-002370038