• Title/Summary/Keyword: 보안실무

Search Result 132, Processing Time 0.024 seconds

A Study to Propose Future Directions on AEO Invigoration through a Close Analysis of the Past Studies (국내 AEO제도의 연구 동향 분석과 제도 활성화를 위한 연구방향 제시에 관한 연구)

  • Kim, Jin-Su;Song, Chang-Seok
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.45-68
    • /
    • 2014
  • Since the introduction of AEO certification in South Korea in 2008, 516 areas have been AEO certified based on a report dated December 31st, 2013. The number is expected to increase drastically as more and more companies strive to obtain the AEO certification. In this regards, this study is designed to contribute to the further invigoration of the AEO certification system as well as to propose directions to improve companies' performance in a practical point of view. To do so, the writer reviewed the past studies done in the relevant subjects in order to 1) grasp the principal subject, 2) catch the areas with insufficient information/lacking points, and to 3) get a focus on future directions on how additional research should be conducted. An analysis of the past studies proved that prior to the introduction of the AEO certification, the focus of the studies were to present the reasons as to why AEO should be introduced, the benefits of AEO, and a comparative analysis of countries already in wide usage of the AEO system. Studies done after the introduction of AEO (that is, after 2008) focused mainly on invigorating the system into the market. Compared to the previous studies, this study will present a distinct conclusion by breaking down the major points of each study on a year-by-year basis and studying them in total in order to provide an even more practical direction in the future of AEO in South Korea.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Research on the Effect of Perceived Characteristics of RPA on Intention of Adoption (RPA의 지각된 특성이 수용의도에 미치는 영향에 대한 연구)

  • Song, Sun Jung;Lee, Hyoung-Yong
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.283-301
    • /
    • 2021
  • RPA (Robotic Process Automation) technology has recently been spotlighted to preemptively respond to the 4th industrial revolution without spending a lot of time and money to improve various existing business and IT processes. In this study, variables affecting intention to use RPA technology were representatively identified into three positive factors and three negative factors, and the causal relationship between the effects of these variables on actual RPA acceptance intention was examined. After conducting an email survey for general office workers, structural equation analysis (SEM) was performed using SPSS 27.0 and SmartPLS 3.3.5. The second order factor of a positive perception consisting of security, accuracy, and efficiency, and the second order factor of a negative perception consisting of job security, execution error, and fear of introduction failure. The positive perception affected the intention to use RPA through perceived usefulness and perceived ease. It was confirmed that the negative perception has a mediating effect on the intention to use RPA through acceptance conflict. In addition, it was confirmed that the presence or absence of experience in using RPA interacts with perceived ease and has a moderating effect on intention to use RPA. It can be said that there is practical and theoretical implications from the point of view of knowledge management in that it allows companies to recognize and respond to which factors are important from the point of view of companies that want to use RPA.

A Study on Primary Control Area for Information Security Management System (ISMS): Focusing on the Domestic Three Industries (정보보호 관리체계를 위한 주요 통제영역에 대한 연구: 국내 3개 산업을 중심으로)

  • Kang, Youn-Chul;Ahn, Jong-Chang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.140-149
    • /
    • 2021
  • Most industries have introduced and operate an information security management system (ISMS) or a personal information security management system (PIMS) to suitably protect and maintain customer's information and company trade secrets. This study starts with the premise that it is desirable for every industry considering information security to maintain an ISMS. ISMS can be of different types among various organizations, taking into consideration culture, practical work procedures, and guidelines for information security. This study intends to derive primary control areas of an ISMS for each industry based on organizational size and audit type by analyzing non-conformity trends and control factors according to certification audits for organizations introduced for international ISMS under ISO27001. This study analyzed improvement effects of ISMS through case analyses. It is meaningful as exploratory research, although it was difficult to acquire data for empirical study because few organizations maintain certification in major industrial sectors. The requirements presented the highest frequency of non-conformity for each type from the 2013-initiated ISO27001; the years 2013 to 2020 were extracted as the primary control area. The study found that for primary control areas of ISMS for each of three industries, organizational size and audit type had differences.

A Redesign of the Military Education Structure of General Universities based on Defense Innovation 4.0 -Focused on Capabilities of Tech-Intensive Junior Officers based on Advanced S&T- (국방혁신4.0 기반의 일반대학의 군사학 교육체계 재설계 방안 -첨단과학기술 기반의 기술집약형 초급 간부 역량 중심으로-)

  • Jung-Ho Eom;Keun-Seog Park;Sang-Pil Chun
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.35-44
    • /
    • 2022
  • Among the five promotion strategies of Defense Innovation 4.0(DI 4.0), the military structure/operation optimization strategy aims to innovate the military structure based on advanced science&technology(S&T), and to integrate advanced S&T in the field of defense operation such as education&training and human resource development. As the future battlefield expands to AI-based unmanned/robot combat systems, space, cyberspace, and electromagnetic fields, it is necessary to train officers with the capabilities required in these battlefields. It is necessary to develop capabilities from junior officers who will lead the future battlefield to operating core advanced power based on the 4th industrial revolution S&T. We review the education system of the military in universities and propose a method of redesigning the education system that is compatible with DI 4.0 and can develop technology-intensive capabilities based on advanced S&T. We propose a operation plan of major and extra-programs that can develop the capabilities of junior officers required for the future battlefield, and also suggest ways to support the army's practical training.

A Study on intent to use AI-enhanced development tools (AI 증강 개발 도구 사용의도에 관한 연구)

  • Hyun Ji Eun;Lee Seung Hwan;Gim Gwang Yong
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.89-104
    • /
    • 2024
  • This study is an empirical study to examine the factors that influence the intention to use artificial intelligence (AI) technology for SW engineering-related tasks, and the purpose of the study is to understand the key factors that influence the use in terms of AI augmentation characteristics and interactive UI/UX characteristics. For this purpose, a survey was conducted among information and communication workers who have experience in using AI-related technologies and the collected data was analyzed. The results of the empirical analysis showed that perceived usefulness was positively influenced by the factors of expertise, interestingness, realism, aesthetics, efficiency, and flexibility, and perceived ease of use was positively influenced by the factors of expertise, interestingness, realism, aesthetics, and flexibility. Variety had no effect on both perceived ease of use and perceived usefulness. Perceived ease of use had a significant effect on perceived immersion, which positively influenced intention to use. These findings are significant in that they provide an academic understanding of the factors that influence the use of AI-enhanced tools in SW engineering-related tasks such as application design, development, testing, and process automation, as well as practical directions for the creators of tools that provide AI-enhanced development services to develop user acquisition strategies.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

A Study of the Factors Influencing Acceptance of Virtual Currency: Focused on Technology Acceptance Model (가상화폐의 수용에 영향을 미치는 요인 연구: TAM을 중심으로)

  • Gu, Seung Hwan;Wang, Ping;Sun, Tingting
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4122-4131
    • /
    • 2014
  • The purpose of this study was to explore the features of virtual currency, which has become a hot topic recently. The characteristics of virtual currency were examined in terms of the effect on consumer acceptance. Therefore, when using the accepted model of the technology, the derived results should be analyzed by SEM. The research results showed that versatility and reliability affect the ease of use and safety is not have an effect. The utility did not have a direct effect on the attitudes and satisfaction, and the ease of use directly affects the ease of use, attitude and satisfaction. Finally, satisfaction with the attitude had a positive impact on the time of use. Effective strategies to manage the effect of the virtual currency will be possible to formulate from the results of this study.

A Study on the Customer Satisfaction and Re-Purchase Intention on Characteristics of Social Shopping (소셜쇼핑의 특징이 고객만족 및 재구매의도에 미치는 영향)

  • Gu, Seung-Hwan;Wang, Ping;Jang, Seong Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.2048-2061
    • /
    • 2014
  • This paper redefines the concept of social shopping as the part of social commerce and identifies the significant factors to the customer satisfaction and repurchase intention for the social shopping using the factor analysis based on the selected elements from the previous research results. Structural equation modeling(SEM) result shows that 3 significant factors to the customer satisfaction are price, convenience of web site use and fun. But Security, reliability, diversity did not affect significantly satisfactorily. From the resulting factors to the customer satisfaction, users of social shopping seems to be satisfied with site entertainment like looking around and comparison shopping. The main purpose of visiting social shopping sites is considered as not only purchase of goods or services but also entertainment in the community and cyberspace. The results of this study, it provides an indication of the aspects of marketing that can be used in social shopping practice.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.