• Title/Summary/Keyword: 보안실무

Search Result 132, Processing Time 0.023 seconds

A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment (기업의 BYOD 환경에서 정보보안이 모바일 오피스 서비스 만족과 지속적 사용에 미치는 영향에 관한 연구)

  • Park, Byoung-Woo;Jang, Seok-Eun;Lee, Eun-Kyoung;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.929-939
    • /
    • 2018
  • The mobile office, which was expected to be a key strategy for business operation through business innovation, was slow to spread from the BYOD environment to information security issues. This study analyzes mobile office information security and analyzes countermeasures against mobile information security threats to analyze the influence of information security factors on corporate satisfaction and continuous use of mobile office service. The results of the study were identified through the research model and hypothesis, quantitative empirical analysis based on the questionnaire and qualitative empirical analysis based on the expert interview. Through this study, practical implications and future directions for mobile office service satisfaction and continuous use are suggested.

Exploring the Moderating Effect of Security Awareness on Trust and Service Value in Website (품질 관점에서 웹사이트의 신뢰와 서비스가치, 그리고 보안인식의 조절효과)

  • Park, Jun-Gi;Lee, Hyejung;Kim, Gibum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1217-1232
    • /
    • 2017
  • Because websites contain personal information such as address, contact information, etc., Attention about website security is required. This research is a study to examine that user's security awareness has a moderating effect on the relationship between website quality factors and trust, information and service value on websites holding personal information. As a result of questionnaire survey of the secondary school students and parents 635 people, website quality factors excluding usability positively affected trust of the website. Information quality on the website had a positive influence on service value and service value also affected trust. User's security awareness about the website has a moderating effect on the relationship between information and service value. The result of this research means that users are not continuously using websites with a low security level. Based on the results of this research, we presented theoretical and practical suggestions for the stakeholders of websites.

A Study on Control System Cyber Security Education & Training Method (제어시스템 사이버 보안 교육훈련 방안 연구)

  • Kim, Kyeong-Ho;Maeng, YounJae;Jang, MoonSu;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.645-656
    • /
    • 2019
  • As the number of cyber threats to control systems increases, the need for control system cyber security is also increasing. Currently, various cyber security related education and control system education are being conducted. However, it does not fully reflect the characteristics of the control system and the characteristics of the participants. In this paper, we propose a training system and technique to enhance the control system cyber security capability. To this end, we analyze the limitations of existing security education. Based on the results, we develop a control system training environment model based on the IEC62443 Standard and develop an ARCH based training method.

The Influence of Competitive Psychological Climate and IS Related Anxiety: The Role of IS Related Value Dissimilarity (경쟁적 심리 분위기와 정보보안 걱정의 영향: 정보보안 가치 차이의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.649-660
    • /
    • 2023
  • The study aims to identify the complex effects of information security (IS) environments and individuals' IS-related perceptions and value dissimilarity that negatively affect insiders' IS compliance activities. In detail, the study aimed to confirm the roles of prospective and inhibitory anxiety, and value dissimilarity in the process in which a competitive psychological climate negatively affects IS compliance intentions. The study obtained 387 samples from the firm's workers with IS-related regulations and verified the research hypotheses established using the AMOS 22.0 and Process 3.1 tools. As a result, the competitive psychological climate negatively affected IS compliance intention by increasing individual's IS-related prospective and inhibitory anxiety. In addition, IS-related value dissimilarity had an interactive effect with prospective and inhibitory anxiety and had a negative effect on IS compliance intention. This study has practical implications in terms of presenting information and values to be provided to employees to achieve internal IS goals and has academic implications in terms of applying the complex effects of IS-related anxiety and value dissimilarity.

A Comparison of IT Majors' Perceptions of Employment before and after Employment (IT전공자들의 취업 전후의 취업 인식 비교)

  • You Jung Ahn;Kyong Ah Kim;Ji Sim Kim;Suk Oh;Myung Sook Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.443-444
    • /
    • 2024
  • 최근 취업에 청신호가 켜진 IT분야에서 전공자들이 취업을 준비할 때, 선 취업 후 실무 역량을 강화해야 할지 또는 실무 역량을 충분히 갖추고 난후 취업해야 할지는 직무 역량에 따라 차이가 있을 것이다. 그러나 열심히 취업을 준비해온 학생들은 좀 더 자신감을 가지고 적극적으로 취업 지원을 할 필요가 있다. 학생들에게 취업 지도를 하는 교수자로서 자신이 가진 역량에 비해 자신감이 없는 학생들을 보면 안타까울 때가 많다. 본 연구에서는 IT분야 기 취업자들에게 취업 시 필요한 역량에 대한 설문을 실시함으로써, 취업을 준비하는 학생들에게 실제 취업에 성공한 취업자들의 의견을 통해 보다 자신감을 가지고 취업 지원을 하는데 도움이 되고자 한다.

  • PDF

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

CTD-Edu: Cell-Based Three-Dimensional Education Model for Information Security Education (실무중심 정보보안 교육을 위한 셀 기반 입체교육 모델)

  • Choi, Sang-Yong;Kim, Jeong-Sahm;Lee, Kyu-Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1031-1043
    • /
    • 2021
  • Recently, the importance of information security has become greater. For this reason, the number of departments related to information security at universities and professional educational institutions is increasing. It is analyzed that the curriculum of such educational institutions has a lot to do with the job competency mentioned in NCS in relation to major subjects. This has the advantage of providing a standardized level of education for each job competency. However from the perspective of students there may be limitations on duplicate curriculum quality of education according to the level of teachers and timely acquisition of necessary elemental skills. In this paper we analyze the curriculum of universities and professional educational institutions and propose a cell-based three-dimensional education model to address the limitations of students. We verified based on the college curriculum that the proposed model can effectively improve its limitations.

A Study on the Importance Analysis of Reliability, Security, Economic Efficiency Factors that Companies Should Determine When Adopting Cloud Computing Services (클라우드 컴퓨팅 서비스 채택 시 기업이 판단해야 하는 신뢰성, 보안성, 경제성 요인의 중요도 분석)

  • Kang, Da-Yeon
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.75-81
    • /
    • 2021
  • The purpose of this research is to derive and evaluate priorities for critical factors that must be determined before an enterprise adopts a cloud computing service. AHP analysis techniques were used to reflect decisions made by experts as research methods. AHP is a decision-making technique that expresses complex decision-making problems hierarchically and derives the best alternatives through pairwise comparison between the items of the hierarchy. Compared to the existing statistical decision making techniques, the decision making process is systematic and simple, making it easy to understand. In addition, the procedure is also reasonable by providing an indicator to determine the consistency of the decision maker in the analysis process. The analysis results of this research showed that security was the first priority, reliability was the second priority, and economic efficiency was the third priority. Among the factors in the first-priority security items, the access control rights and the safety factors of external threats are the most important factors. Research results can be used as a guideline in future practice, and it is necessary to evaluate, compare and analyze the satisfaction of companies that have adopted cloud computing services in the future.

The Effect of Information Privacy Concerns on E-Trust and E-Loyalty : The Moderating Role of Switching Cost (정보보안우려감이 e-신뢰도와 e-충성도에 미치는 영향: 전환비용의 조절효과를 중심으로)

  • Moon, Yun Ji;Choi, Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.131-134
    • /
    • 2014
  • The Internet allows firms to serve customers more effectively than ever before. In the B2C context, we examine the interrelationships among information privacy concerns, e-trust, and e-loyalty. The authors extend prior research by incorporating constructs of information privacy concerns into a more holistic conceptual framework. This study answers three research questions: Will the three components of information privacy concerns have a significant effect on e-loyalty through e-trust?, Does e-trust mediate e-loyalty?, Finally, do switching costs have a moderation effect between e-trust and e-loyalty?, The authors examine data from customers who have booked hotel accommodations online. The results support our hypotheses and confirm both the mediation role of e-trust and the moderation role of switching costs. Conceptually, this study provides an empirical validation of information privacy concerns, e-trust, and loyalty linkage. On the managerial level, this research provides insights into critical drivers of loyalty in the emerging online marketplace.

  • PDF

Study on Changes in Military Negotiations under the Kim Jeong-eun Regime through Working-Level Talks for Gaeseong Industrial Complex (김정은시대 개성공단 실무회담 분석을 통한 군사협상 변화 연구)

  • Lee, Sung Choon
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.3-10
    • /
    • 2013
  • This study is trying to suggest the continuity and changes that would be made in inter-Korean military negotiations in the future under the Kim Jeong-eun regime by analyzing the recent inter-Korean Working-Level Talks for Gaeseong Industrial Complex based on 'anti-Japanese guerilla style negotiation model, the military negotiation model under Kim Jeong-il era. Especially, through analysis of the inter-Korean Working-Level Talks for Gaeseong Industrial Complex, it is verified that behavior similar to that in the military talks in the past is found even in the economic negotiations. Such analysis leads to an assumption that negotiations under the Kim Jeong-eun regime would be made within the category of the military negotiations under the Kim Jeong-il era. Fundamentally North Korea will change but try to achieve its objectives in the military talks within the existing frame of strategic culture rather than changing it. Such phenomenon will continue for some time. In the future inter-Korean military talks, however, North Korea will try to change its behavior to cope with its financial difficulties. Accordingly, the South Korea's government will have to have paradigm shift toward inter-Korean military negotiations. Especially, Kim Jeong-eun's studying abroad in the past will make him change in the negotiations. At this moment, the South Korean government must make continuous efforts to induce dialogue and negotiation. In order to induce the North Korea to change, the development of economic norm logic with the united front applied in the strategic culture of military negotiation and the formation of a value system in the North Korea's military negotiation policy makers will lead to the creation of a new military negotiation framework.