• Title/Summary/Keyword: 보안관리 모형

Search Result 93, Processing Time 0.022 seconds

The Impact of Perceived Security Control on the Acceptance of Internet Banking (인지된 보안통제가 고객의 인터넷 뱅킹 수용에 미치는 영향)

  • Suh, Bo-Mil
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.25-52
    • /
    • 2006
  • This study focuses on customer perception of security control under Internet banking environment Internet banking customers' understanding of security control is insufficient. They are not fully aware of security technologies for Internet banking. Moreover, they cannot know which control is implemented and maintained on an Internet banking site when visiting the site. This study, therefore, attempts to find the impact of customer perception of security control on Internet banking acceptance. The research model is based on the TAM (Technology Acceptance Model), and introduces trust as an additional belief. Trust has been investigated in the marketing area, and begins to be focused in e-business area. A Web survey of Internet banking users collected 845 cases. Statistical analyses, using SEM (Structural Equation Modeling), partially supported the hypotheses that perceived strength of security control has an impact on three beliefs: trust, perceived usefulness, and perceived ease of use. We also verified the impact of these beliefs on attitude toward using, on behavioral intention to use, and on actual use. It is, therefore, verified that perceived strength of security control is a determinant of Internet banking acceptance.

  • PDF

A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers (정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구)

  • Kim, Geunhye;Park, Kyudong;Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.451-463
    • /
    • 2019
  • The purpose of this study is to identify the effects of organizational conflict stages and job withdrawal intention of information security organizations. We applied Pondy's conflict theory and analyzed the case of information security workers in public enterprises. We found that the more information security workers emotionally accept the potential factors of organizational conflict, the higher the intention of job change of information security practitioner. On the other hand, the perception mechanism has a moderating effect of lowering the job change-out probability. The result of this study is expected that the manager of the organization will be able to utilize the conflict in the organizational direction.

A Study on Development of Application Model for Prevention and Management of Obesity in Children with Disabilities (장애아동 비만 예방·관리를 위한 애플리케이션 모형 개발에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.85-90
    • /
    • 2020
  • The purpose of this study was to provide information necessary for development of the applications that could facilitate the prevention and management of obesity in children with intellectual disabilities and to present improvement measure for development of practical applications. Mobile applications for prevention and management of obesity for children with intellectual disabilities need to be configured to enable effective flow of information and services delivered between parents and children with disabilities through applications. This configuration is expected to allow effective obesity control to be derived through parental involvement in the process of motivation.. The composition of contents consists of three parts: nutrition, exercise(physical activity), and lifestyle. It is desirable for each content to be applied in a simple but easy-to-understand method, reflecting the characteristics of an intellectually disabled child. In addition, this study presented the user expansion and their continuous involvement through interface simplification, alert function, reward, voice recognition and subtitle support strategies in consideration of the characteristics of the children with intellectual disabilities.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

Application of QUAL2K Model in the Yeongsan River Basin for the Water Quality Prediction (영산강 유역의 수질예측을 위한 QUAL2K 적용)

  • Park, Sung-Cheon;Jin, Young-Hoon;Kim, Yong-Gu;Bang, Jae-Pil;Moon, Byoung-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.986-990
    • /
    • 2010
  • 본 연구에서는 영산강수계의 수질이 미래에 어떠한 양상으로 변화하는지 예측하여 파악하고자 하였다. 적용모형은 각종 수질관리에 적용되어 수질예측 결과의 신뢰도가 높은 US EPA에서 개발한 QUAL2E 모형의 단점을 보안하고 사용자가 보다 사용하기 쉽게 개발된 후속모형인 QUAL2K를 이용하였다. 영산강유역의 수질모형을 구축하고 실측 자료를 이용하여 보정하였으며, 목표연도는 2015년으로 선정하여 환경기초시설에 의한 오염물질 삭감량에 따른 하천수의 수질 변화를 예측하였다. 수질모의 항목은 실측자료를 바탕으로 하여 하천특성과 종합적인 부하량 산정이 가능한 BOD와 부영양화의 물질인 T-N과 T-P를 선정하여 모의하였다.

  • PDF

The Study for Comparative Analysis of Software Failure Time Using EWMA Control Chart (지수 가중 이동 평균 관리도를 이용한 소프트웨어 고장 시간 비교분석에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2008
  • Software failure time presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing. For data analysis of software reliability model, data scale tools of trend analysis are developed. The methods of trend analysis are arithmetic mean test and Laplace trend test. Trend analysis only offer information of outline content. In this paper, we discuss exponentially weighted moving average chart, in measuring failure time. In control, exponentially weighted moving average chart's uses are efficiency case of analysis with knowing information, Using real software failure time, we are proposed to use exponentially weighted moving average chart and comparative analysis of software failure time.

  • PDF

The Comparative Study for Property of Learning Effect based on Software Reliability Model using Doubly Bounded Power Law Distribution (이중 결합 파우어 분포 특성을 이용한 유한고장 NHPP모형에 근거한 소프트웨어 학습효과 비교 연구)

  • Kim, Hee Cheul;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.71-78
    • /
    • 2013
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The doubly bounded power law distribution model makeup Weibull distribution applied to distribution was based on finite failure NHPP. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than automatic error that is generally efficient model could be confirmed. This paper, a numerical example of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and $R^2$.

The Comparative Study for NHPP Software Reliability Model based on the Property of Learning Effect of Log Linear Shaped Hazard Function (대수 선형 위험함수 학습효과에 근거한 NHPP 신뢰성장 소프트웨어 모형에 관한 비교 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.19-26
    • /
    • 2012
  • In this study, software products developed in the course of testing, software managers in the process of testing software and tools for effective learning effects perspective has been studied using the NHPP software. The log type hazard function applied to distribution was based on finite failure NHPP. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than autonomous errors-detected factor that is generally efficient model could be confirmed. This paper, a failure data analysis of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and $R^2$(coefficient of determination).

Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector (금융권 정보보호 관리 효율을 제고하기 위한 인증모형 개선방안)

  • Oh, Eun;Kim, Tae-Sung;Cho, Tae-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.541-550
    • /
    • 2016
  • Considering the results of the 3.20 Cyber Attack, leaks of personal information by card companies, and so on, convenience and efficiency cannot be guaranteed without security as a prerequisite. In addition, it is more likely that customers' interests seem to be interfered with in financial institutions than in any other industry. Therefore, when a security accident occurs, users may suffer mental damage and monetary loss, leading to class action, customer defection, loss of reputation, and falloff in international credibility, which all may have a significant effect on the business continuity of corporations. This study integrates the representative information security certification systems in order to improve the efficiency of information security management and demonstrate the necessity of information security management system certification for the financial sector. If the certification is needed, we would like to recommend the desirable development direction.