http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A Study on SECURITY of Rational Human
Park Su-hyeon J-INSTITUTE 2016 Protection Convergence Vol.1 No.2
No other riddles make human beings as curious as human beings themselves. Among the riddles, security is taken as top priority. Security is directly associated with death which human beings fear the most and further-more represents the underlying principle behind the thoughts and ideas of human beings. Security is analogous to a double-edged sword that makes human lives more convenient and prosperous and at the same time im-perils human. Thus, it is of great importance to look into relationship between human beings and security based on questions with respect to human beings and security. However, human beings are not fully aware of security and have misconception towards security. The research issues in this study are related to the question, “Are human beings secure? In fact, we may al-ready know the answer to that question posed in this study. However, we can increase understanding of the relationship between human and security by ceaselessly asking the question “Are human beings secure?” and answering that question which needs to be resolved necessarily albeit difficult for human living in complicated world. The purpose of this study was to answer the question “Are human beings secure? while presenting new perspectives by making new assertions other than those made by scholars with regard to relationship between human and security. To answer the question, “Are human beings secure?, we should be aware of human, security, and risk. Hu-man beings tend to take secure course and avert risk or instability based on rational thinking driven by the de-sire for security. That represents rationality of human. Security generally refers to the situation or state free of concern about potential risks or accidents, and can be classified into real security and sensible security. Risks which encroach upon security tend to be universal, unpredictable, and infinite. Risk can be classified into three different categories, such as latent stage, perceptive stage, and behavioral stage, from the standpoint of epis-temology. First, the insecurity of human stems from the fact that every day’s life is biologically a step closer to death, the risk feared the most by human Second, human would be confronted with unlimited risk if all kinds of risks facing human can be quantified. The finite nature of time, money, and ability that can be leveraged to preclude such risks leads to presence of residual risks. As a result, the biological factor and presence of residual risks make human overshadowed by the feeling of insecurity. However, human pursues security all the time, driven by the desire for safety and rationality, although secu-rity is a tantalizing but remote possibility for human. It is an endless loop. This loop cannot be broken, unless the history of human ends. However, this researcher hopes that the results of this study would provide a useful basis for increasing understanding of human and security and subsequently delving into the long and endless exploration of human security which began in early part of human history.
김태민 한국범죄심리학회 2020 한국범죄심리연구 Vol.16 No.4
In contemporary society, crime and terrorism have become routine occurrences, causing people to feel intimidated psychologically in an unsafe and dangerous society. Crimes have tended to become increasingly inhuman, ferocious, atrocious, and borders between nations are breaking down, while threats of terrorist attacks are spreading. In response to that, the security industry is making strides to meet human desire for psychological safety, and the academic research and exploration by the security science should be conducted more profoundly. Psychology represents the study of the science investigating the state of mind and behavior, and has influenced and contributed significantly to overall academic fields of studies. Security Psychology is a type of study that aims to increase understanding of complex state of mind of the security guards, persons protected by security guards, perpetrators, and the crowd, the elements of security, based on the pattern of their behaviors. In a narrow sense, the Security Psychology can be defined as empirical science that scientifically investigates the behavior and psychological processes of security guards. In particular, the Security Psychology pays attention to the psychological factors that affect the security subjects and the measures for overcoming such psychological factors when security duties are performed. This study aimed to promote academic development of the Security Psychology through the approach based on convergence between Security Science and Psychology. Moreover, this study was intended to present the topics of psychology and research subjects that would need to be converged with the Security Psychology, the topics of lectures on the Security Psychology, and the challenges for development of the Security Psychology. This study is significantly meaningful in that it attempted the research converging the academic disciplines of Security Science and Psychology. Furthermore, the results of this study would contribute to academic advancement of the Security Psychology as a new study integrated into the curriculum for security-related departments. 현대사회에서는 범죄와 테러의 일상화로 국민들은 심리적으로 위축되고 불안전한 위험사회를 살아가고 있다. 범죄는 날로 비인간적이고 흉포화 되고 있으며, 국가 간 경계가 허물어지며 테러위협도 확산되고 있다. 여기에 맞서 인간의 심리적 안전욕구를 충족해 주기 위해 시큐리티 산업은 발전하고 있으며, 경호학의 학문적 연구와 고민도 심오해 져야 한다. 심리학은 마음과 행동에 관한 과학적 연구의 학문이며, 여러 학문분야 전반에 많은 영향을 끼치고 공헌을 해오고 있다. 경호심리학은 경호의 요소인 경호원, 경호대상자, 위해자, 군중 등의 행동을 통해 복잡한 마음 상태를 알아가는 학문이다. 좁은 의미에서는 경호원의 행동과 심리과정을 과학적으로 연구하는 경험과학으로 정의할 수 있다. 특히 경호심리학에서는 경호임무수행 시 경호주체에 미치는 심리요인과 극복 방안에 관하여 관심을 두고 있다. 이 연구에서는 경호학과 심리학의 융합적 접근을 통해 경호심리학의 학문적 발전을 도모하고자 하는데 연구의 목적으로 두었다. 또한 경호심리학에 융합해야 할 심리학의 주제와 연구대상, 경호심리학 강의의 주제, 그리고 경호심리학의 발전과제를 제시하고자 하였다. 이 연구는 경호학과 심리학이라는 학문 간 융합적 연구로서 큰 의미를 가진다. 더불어 경호 관련 학과 교과목으로 편성되고 있는 신생 학문으로서 경호심리학의 학문적 발전에도 기여를 할 수 있을 것으로 판단된다.
Revisiting Software Security: Durability Perspective
Rajeev Kumar,Suhel Ahmad Khan,Raees Ahmad Khan 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.2
Security is a peak significant quality element in the pitch of software engineering. Software security improvement is easily done with the support of factors, models and metrics of security. Software security should be analyzed with the help of its security factors. Security dimension is the main attribute in evaluation, executing, and calculating security in the way to organize and develop quality of software. It is to be identified that qualifications of security factors increased through inspecting damages, discriminating susceptibility and attacks in design development process. This review is discussing the description and categorization of accessible security properties. Durability is an attribute of security that refers to the capability of software to conclude of a creation on time. Software security is affected with security attributes as well as durability. A stable state of the secure software enhances additional security.
Yun Il-hyun J-INSTITUTE 2016 Protection Convergence Vol.1 No.1
Social workers are based, including the professional skills and experience they have. The professionals who are professionally addressed with respect to interact with individuals, families and communities with life on the difficulty or problem.Social workers and ensure a comprehensive and professional information about them. Information with a social worker it is very important to the individual level, family level there, the group level, the community level. And are resources that can give serious damage. It is very important to ensure profes-sionalism and ethics professional knowledge about information security as a prerequisite. Social workers should learn the professional knowledge and skills in social work practice based on high ethical. This learning can be made from the University of Social Welfare Training begins. Therefore, the information security training for social workers shall be made from the university. The purpose of this study is to provide basic information for information security training of social workers. An Empirical Study on Republic of Korea Information Security Convergence-type Latent means Analysis of Social Welfare average presence and gender differences. Information security configuration parameters are information security act, information security education, information security behavior.Personal information is information security behavior is not experienced, optimis-tic bias in information security, technical understanding of information security, and understanding of infor-mation security threats. The study is the welfare of students majoring in Gwangju University students and Non - Major Students. The samples of this study were carried out three weeks from March 05, 2016 using a non-probability sampling methods. Self-report questionnaire was used to survey. 317 people were targets except one respondent insincere. Target of the lion male 106 people (33.4%) were female students, 211 people (66.6%). Social work majors are 149 people (47.0%), Non - Major Students was 53.0%). This study applies the correlation analysis, multi-group analysis and latent mean analysis. The results of this study were as follows. First, personal experience, optimistic bias, the difference between groups for the presence gender and social groups majoring in structural relationships of technical understanding, understanding of threats, information security education, information security and information security for the action showed that. The difference was not great. Second, women s groups and major groups personal experience in information security, optimism bias, higher education technological understanding is increasing security information, and information security In-formation security is high, the action showed that high. Third, it was a personal experience, optimistic bias, technical understanding, and understanding of information security threats education, the difference between groups according to the presence or absence Gender and Social Welfare in the structure of the relationship between information security acts on information security. Fourth, the need for women and social welfare groups in major information security education was relative-ly high. Many women relative to men majors than social welfare, information security education is very im-portant when considering the proportion of women in the social welfare field. Therefore, the information secu-rity courses shall be established on social welfare majors. In addition, you should enable information security education based on ethics for social welfare information security and personal security.
미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계
나원철,이효직,성소영,장항배 한국전자거래학회 2015 한국전자거래학회지 Vol.20 No.3
Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.
김유천,이송이 한국해양안보포럼 2020 한국해양안보논총 Vol.3 No.2
The purpose of this study is to propose a new security leadership through consideration of changes in the security leadership. To this end, we discussed what is security and leadership. In order to examine the changes in the security leadership paradigm, we have discussed what is the existing security leadership, and looked at the background of the new security leadership. Finally, we tried to suggest what the new security leadership is through consideration of changes in leadership. As a result of the study, it was concluded that “integrated security leadership” is needed as a new security leadership. “Integrated Security Leadership” has the following characteristics. First, it is leadership beyond comprehensive security leadership, which means simple summation. Second, the individual and overall aspects of security are considered and interacted simultaneously. Third, it is an integrated security leadership that can exert synergy effects of security leadership for various security and comprehensive security. The academic contributions related to security leadership through this study are as follows. First, in relation to security, a integrated perspective was provided in addition to basic research on existing and new security. Second, through the analysis of the concept and changes of “security leadership”, a basic framework was suggested for preparing the security leadership competency of society. Third, by providing a new paradigm of “Integrated Security Leadership,” it provided the basis for future research.
성영조,박병식 경기연구원 2010 위탁연구 Vol.2010 No.1
우리나라 반도체ㆍ이동통신ㆍ자동차ㆍ조선ㆍ철강 등 주력산업의 첨단기술이 기술경쟁국의 표적이 됨에 따라 최근 첨단산업기술의 유출사고가 급증하고 있다. 정부는 「산업기술 유출방지 및 보호에 관한 법률」을 제정ㆍ시행하고, 제도적 보안장치를 마련하여 첨단산업기술 유출 예방에 주력하고 있다. 정부(지식경제부)는 보안산업 세계시장 규모가 1,800억 달러('07)에서 3,680억 달러('13)로 크게 성장할 것으로 전망하고 “Securing Knowledge Korea 2013”장 동력 산업 육성 전략(2008.12.15) 발표를 통하여 보안산업의 국제경쟁력 강화, 보안산업 기술보호 설비 구축, 보안산업기술개발 지원, 보안산업 전문인력 양성 등 추진 방안을 구체화하였다. 특히 경기도는 'u경기 비전'을 선포하고 기업하기 좋은 환경, 안전하고 편리한 생활공간을 만드는 것을 목표로 2010년까지 55개의 벤처집적단지 조성, 100억원 매출기업 1000개 육성계획을 추진하여 왔고, 권역별 특화산업 혁신거점을 구축하고 있다. 경기도가 『한국보안산업의 중심 메카』 역할을 수행할 수 있도록 판교-광교-흥덕을 잇는 수도권 남부 산업단지와 경기대-아주대-수원대-성균관대를 거점으로 한 산ㆍ학ㆍ연ㆍ관 협력 보안산업밸리 조성의 타당성을 조사하였다. 타당성조사를 위해 보안산업밸리의 중심적 역할을 수행할 집적센터의 위치를 광교, 판교, 동탄의 세 개 지역을 대상으로 종합적 입지선정기준을 가지고서 조사한 결과 광교 3.85, 판교 3.57, 동탄 3.025 순위로 나타난다. 보안산업집적센터의 구체적인 입지장소를 선정하기 위해 광교의 4개 지역과 판교의 2개 지역을 선정하여 분석한 결과 가장 적합한 입지는 광교테크노밸리 내 커뮤니티부지와 광교 첨단 R&D단지 내 장기바이오생산시설예정지인 것으로 분석되었다. 보안산업집적센터의 건립시 보안업체들의 입주수요를 조사한 결과 서울지역 대상업체들의 20%, 경기지역 대상업체들의 38.1%가 입주할 의사를 표명하여 서울과 경기지역에서 총 85개 업체가 입주할 것으로 조사되었다. 실제입주수요를 보수적으로 가정하여 35%로 잡을 때 실제 입주할 업체는 최소한 30개 업체로 파악되었다. 30개 업체를 수용할 수 있는 시설규모를 추정할 때 건축연면적 6,612㎡ (2000평)이 소요되며 광교지역의 건폐율 60%, 용적률 200%을 기준으로 할 때 확보할 부지는 3,306㎡(약 1000평)이다. 이 시설규모를 바탕으로 보안산업집적센터의 건립타당성을 분석한 결과 B/C Ratio가 1.2이상으로 타당성이 있는 것으로 나타났다. 경기도는 보안산업집적센터를 중심으로 경기대 산업보안특화센터, 성균관대 인터넷보안연구실, 아주대 차세대보안센터, 수원대 u-시티 보안관리 연구센터 등과 산학연기반을 구축하고, 차세대융합기술연구원, 나노소자특화팹센터, 경기바이오센터, 경기중소기업지원센터 등의 과학기술기반 혁신클러스터와 연계시켜 보안산업벨리를 조성해 나갈 수 있다. 이를 통해 기존의 첨단기술 제조업에 대한 물리/정보보안을 제고할 수 있을 뿐만 아니라, 더 나아가고부가가치의 융합보안으로 경쟁력을 강화시켜 나갈 수 있을 것이다. Korea's high-technologies become the target from techcompetitors of main industries in the field of semiconductor, mobile telecommunication, car, ship-building and the steel industry, etc. The government provides an institutional strategy on preventing the leaking accident of high-tech industry. Recently, the government put into enacting a law of Protection and Prevention for Industry Technology and is concentrating its energy on preventing the leaking accident of high-tech industry. The government (Ministry of Knowledge Economy) announced the promotional strategy of "Securing Knowledge Korea 2013" for preparing that global market size of security industry will increase from 180,000 million dollar in 2007 to 368,000 million dollar in 2013. On the report, the government built up the practical plan for a enforcement of international competitiveness, establishment for equipment of technology protection, R&D supporting, fostering of professional human power in Security Industry in detail. Meanwhile, Gyeonggi province made a plan to create specialized industry complexes in region and establish a number of 1000 companies. On the basis of this plan, Gyeonggi Province declares "u-Gyeonggi Vision" which makes in good entrepreneur environments and wholesome life space through achievement of the target. This research surveys the possibility of "Security Industry Valley (SIV)" in Gyeonggi province and analyzes the feasibility for constructing "Security Industry Complex (SIC)" in southern metropolitan area so as to take a role of the Mecca in Korean Security Industry. The results of SIC location analysis show that the best area of SIC is Kwangkyo town according to the score of specialist survey that Kwangkyo is 3.85, Pankyo is 3.57, Dongtan is 3.025, and that the best location of SIC is the Community Area or the alternative area of Bio-production in Kwangkyo Technology Valley. The demand survey of security firms shows that the 20% of security firms in Seoul Metropolitan area and the 38.1% of security firms in Gyeonggi province have an opinion to move into the SIC. But this research hypothesizes that about 30 security firms move be moved into SIC as conservative as possible. For holding the 30 security firms, the building size of SIC should be at least 6,612㎡, and its land size should be at least 3,306㎡. For analyzing the feasibility of SIC construction, this research analyzes the effect of the benefit of leakage prevention, the increase of local property tax, the money of allowance for repairs and maintenance, the construction cost, and land cost, etc, Analyzing the cost and benefit effects of SIC construction, this research finds that the B/C ratio of SIC construction is over 1.2 ratio. This research finds that the SIC construction project is desirable. For building SIV, Gyeonggi Province has to connect SIC with 'Industrial Security Center' in Gyeonggi University, 'Internet Security R&D Room' in SKK University, 'Advanced Security Center' in A-Ju University and 'U-City Security Management Research Center' in Suwon University for cooperating between security research centers and security firms. Also Gyeonggi province has to make that the innovation cluster on science technology such as Korea advanced Nano Fab Center, Gyeonggi Small and Medium Business Center, Gyeonggi Bio Center, and Advanced Institute of Convergence Technology can support the firms in the SIC. Gyeonggi province can strengthen the competitiveness of SIC and pass down the existing high-technology in 'physics/information security' field to 'convergence security' manufacturers.
脫냉전 이후 비국가행위자의 안보위협과 국가정보 활동방향
함중영 한국국가정보학회 2022 국가정보연구 Vol.15 No.1
Factors that threaten national security have been constantly changed. The structure of the East-West Cold War has been broken down as a turning point in 1991, and the changes were clearly shown before and after the year of 1991, in terms of security threats and counter activities. When considering the timing, before the post-Cold War period is classified as traditional security, and after that is classified as non-traditional security. As a new security concept that emerges after the post-Cold War, "human security" introduced by the UNDP in 1994 was appeared, and the concept of "comprehensive security" was introduced by European scholars in 1998. Meanwhile, some scholars in Korea also use the concept of 'new security' mainly studying specific factors of non-traditional security concepts, which is not the same as the concept of ‘emerging security’. Threats dealt with in traditional security were war and physical conflicts between countries. Security threats in the non-traditional security period are the intersection of threats identified in the new security dimension and threats listed in the human security dimension, such as poverty, famine, infectious diseases, environmental problems, violence and crime. On the other hand, while the traditional security actor is a state-actor, the activities of non-state actors have emerged as a huge security threat since the introduction of the non-traditional security concept, as seen in the September 11 attacks in 2001. Among the threats derived from the intersection of new security and human security threats, the main threats posed by non-state actors appear as terrorism, transnational organized crime, terrorist-TOC combined groups, cyber attacks, and abuse of new technologies. Korea's national intelligence agencies have made efforts to appropriately respond to the security threats of non-state actors listed above while responding to changes in the international environment. In particular, it is encouraging to expand national espionage activities, enact anti-terrorism laws for efficient counter-terrorism activities, and international cooperation activities to respond to cyberattacks. However, non-systematic expansion and ambiguity of national counterintelligence activities, errors in anti-terrorism laws, and lack of a security response system for new technologies are pointed out as problems to be improved quickly. 국가안보를 위협하는 요인은 지속적으로 변화해왔으며, 동서 냉전의 구도가 와해되는 1991년을 분깃점으로 삼아, 전후로 구분하여 안보위협 환경 변화와 대응활동의 커다란 차이를 나누어 볼 수 있다. 시기적으로 고찰해 볼 때, 탈냉전 시기 이전을 전통적 안보, 이후를 비전통적 안보라고 구분한다. 이어 탈냉전 이후 출현하는 새로운 안보 개념으로, 1994년 UNDP에서 소개한 ‘인간안보’가 소개되었고, 1998년 유럽 학자들을 중심으로 ‘포괄적 안보’ 개념이 소개되면서 작금 국제관계학의 주류 용어로 자리잡고 있다. 한편, 국내 일부 학자들은 비전통적 안보개념의 구체적 요인들을 대상으로 연구하면서 ‘신안보’라는 개념도 활용하는데, 신흥안보 또는 Emerging Security 등 다양하게 소개되는 새로운 안보개념과의 비교 구분도 요구된다. 전통적 안보에서 다루어진 위협요인은 국가 간 전쟁과 갈등관계였다. 비전통적 안보 시기의 안보위협은 신안보 차원에서 파악한 위협의 요인과 인간안보 차원에서 열거된 위협들의 교집합이라고 할 수 있는데, 현재와 미래에서 다루어져야 할 위협으로서, 빈곤, 기근, 감염병, 환경문제, 폭력과 범죄 등이다. 한편, 전통적 안보의 행위자(actor)는 국가인데 비해, 2001년 9.11 테러에서 보듯이 비전통적 안보개념이 도입되는 시점부터 비국가행위자의 활동이 엄청난 안보위협으로 대두되고 있다. 신안보위협과 인간안보 위협들의 교집합에서 도출한 위협요인 중 비국가행위자에 의해 자행되는 대표적 위협은 테러리즘, 초국가적조직범죄, 테러조직과 조직범죄집단의 연계활동, 사이버공격, 신기술의 악용 등으로 나타난다. 우리나라 국가정보기관은 국제환경의 변화에 대응하면서 위에서 열거한 비국가행위자의 안보 위협요인에 적절히 대처하는 노력을 전개해왔다. 특히, 국가방첩활동의 확대와 효율적인 대테러 활동을 위한 테러방지법 제정, 사이버공격에 대응하기 위한 국제협력 활동 등이 고무적이다. 그러나, 국가방첩활동의 비체계적 확장과 모호성, 테러방지법의 오류, 신기술에 대한 안보 대응체계 미흡 등은 신속히 개선되어야 할 문제점으로 지적된다.
Security Knowledge Classification Framework for Future Intelligent Environment
Onechul Na(나원철),Hyojik Lee(이효직),Soyung Sung(성소영),Hangbae Chang(장항배) 한국전자거래학회 2015 한국전자거래학회지 Vol.20 No.3
근래에 들어 정보보안 환경이 ICT와 융합됨에 따라 새로운 취약성 지속적으로 증가하고 있다. 이에 따라 새로운 유형의 사이버범죄가 대두되고 있으며 사이버 공격, 내부자 유출 등 보안문제로 인하여 보안사고 사례가 급증하고 있다. 또한 기존의 기술적인 보안위협처럼 취약점을 악용한 외부의 해킹이 아닌 내부직원에 의한 정보유출 등의 신종 보안위협이 등장하고 있으며 산업과 기술이 융합되는 새로운 환경으로 발전함에 따라 그 위협은 더욱 증가하고 있는 실정이다. 따라서, 본 논문에서는 고도화된 정보위협에 능동적으로 대처하기 위한 전문보안관리 인재를 양성하기 위해 균형있는 정보보호 교과목을 설계하여 정보보호 교과목 분류체계를 도출하고자 하였다. 이를 위해 선행연구조사 분석과 전문가 자문위원회의 회의를 통해 기술적인 교육과 경영·관리적인 교육이 적절히 배분된 정보보호 교과목을 도출하고 국내 실정에 적합한 형태로 분류된 정보보호 직업분류체계와의 연결을 통해 균형감있는 정보보호교과목 분류체계를 도출하였다. 본 연구결과는 미래 산업융합 환경의 신종 보안위협을 막아낼 수 있는 지능형 보안인재를 양성하는데 긍정적인 효과를 미칠 것으로 기대된다. Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.
강태성 한국민사법학회 2005 民事法學 Vol.29 No.-
The security-elimination contract is what can eliminates the security being existed. Namely, It means what can eliminates the performance- method of this security. But, in korea this term of security-elimination contract is scarcely in use. The term of pledge-elimination contract and mortgage-elimination contract are only in use. In this study, I admit the term of the security-elimination contract, discourse upon this contract in detail. And, I debate many issue-points on several security-elimination contract. In the following sentences, the security-elimination contract shall be called s-e-contract. Ⅰ. The Compass of S-E-Contract I give a example which belong to this contract, does not belong to this contract. Ⅱ. The Relation between S-E-Contract and Security Creation Contract 1. S-e-contract is not the accessory of the contract that creates a security real right. S-e-contract is independent. 2. In case s-e-contract is invalid, is the security-creation-contract also invalid? my point of view is negative. Ⅲ. Performance Based on S-E-Contract 1. Is this performance the performance of security real right? Common views and judical precedents are negative, but my point of view is negative. 2. The security real right is not lapsed by the performance based on s-e-contract. Ⅳ. Form and lapse of the Security-Elimination Right The security-elimination right is formed by the s-e-contract and this contract is formed by mutual agreement. The security-elimination right does not lapse by lapse of the security right. Ⅴ. Several S-E Contracts I debate issue-points on several security-elimination contract. Namely, pledge-elimination contract, mortgage-elimination contract, contract that can eliminates provisional-registration-security, contract that can eliminates transfer for security, chonsegwon-elimination contract.