• Title/Summary/Keyword: 보안업무

Search Result 776, Processing Time 0.024 seconds

A Study on Development of National Examination Security Service (국가시험 보안업무의 발전적 방안연구)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.75-95
    • /
    • 2018
  • The purpose of this study is to find the development of the examination security business plan based on the problem that guards are now aware of examination security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with five field related graduates and seven field specialists who are currently engaged in the examination for more than six years. The guard who perform national examination security service proposed a development plan of national examination security services as follows. First, the security guards at the national examination must complete an education program suitable for the nature of the workplace. Second, disaster and emergency response training should be added. Third, national examination security guards should be provided with mental training, search equipment and advanced equipment. Fourth, The National Examination Security Service should be specified in the Security Law so that laws and regulations can actively respond. Fifth, the related organization (contracting party) must raise the cost of service according to reality after realizing the property. Sixth, The national security service should ensure that security guards who have completed the security guards' training will be recruited.

The User's Requirement Analysis of SMS(SecureDocument Management System) using Use Case (쓰임새(Use Case)를 이용한 보안업무 관리 시스템의 사용자 요구사항 분석)

  • Kim, See-Jeong;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.409-412
    • /
    • 2001
  • 보안업무는 모든 군 업무를 최상위 수준에서 관할하는 업무이다. 하지만 지금까지 전산화를 이루지 못한 문제점을 갖고 있었다. 본 논문은 군 보안업무 전산화를 위해 개발 중인 보안업무 관리 시스템의 사용자 요구사항 분석과정을 다룬 것이다. 보안업무 관리 시스템의 요구사항 분석을 위해 객체 모델링의 쓰임새를 이용한 분석방법론을 적용하여, 사용자 요구사항 정의에서 시나리오 작성까지의 과정을 통해 적절히 요구사항을 분석함으로써, SMS의 시스템 모델을 제시하고 요구사항 분석에서 쓰임새 중심의 유효성을 증명하였다.

  • PDF

The Influence of Information Security Related Work Stress on Information Security Policy Resistance through Job Burnout (정보보안 관련 업무 스트레스가 직무 소진을 통해 정보보안 정책 저항에 미치는 영향)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.427-436
    • /
    • 2024
  • Recently, the importance of information security (IS) has been socially recognized, leading organizations to adopt IS policies, secure specialized personnel, and demand IS compliance from employees. However, the implementation of these policies can disrupt existing work processes, causing resistance among employees. This study aims to elucidate the mechanism linking work stress, caused by IS policies that do not consider the work system, to individual job burnout and IS policy resistance. We established a research model and hypotheses based on previous studies and utilized structural equation modeling with data collected from organization members of companies that have implemented IS policies. The results of the structural equation modeling confirmed that work ambiguity and work impediment are linked to IS policy resistance through job burnout, characterized by emotional exhaustion and disengagement. Our findings suggest that the swift implementation of IS policies can provoke a backlash from employees, with stress being the primary cause. This paradoxically indicates the need for the development of organization-specific IS policies.

Effect of Physical Security Level of Companies with National Core Technology on Security Performance and Work Efficiency (국가핵심기술을 보유한 기업의 물리보안수준이 보안성과와 업무효율성에 미치는 영향)

  • Ye-Jin Jang;Jeong-Il Choi
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.81-87
    • /
    • 2022
  • The purpose of this paper is to take a look the effect of the physical security level of companies possessing national core technology on security performance and work efficiency. To this end, a survey was set out for about 200 security officers for a month. In the survey, the independent variable was physical security level, the parameter was security performance, and the dependent variable was work efficiency. Reliability analysis, validity analysis, discriminant validity analysis, etc. were analyzed for causality through SPSS. As a result, "Physical Security Level ⇒ Security Performance, Security Performance ⇒ Work Efficiency" was adopted, but "Physical Security Level ⇒ Work Efficiency" was rejected. Therefore, it was found that the physical security level affects work efficiency through security performance, which is a parameter. However, it was found that the physical security level did not directly affect work efficiency. In order to improve work efficiency in the future, improving security performance should be a priority.

A Study on the Effects of Influencing Factors in the Security Environment of Military Organizational Members on Information Security Stress and Security Compliance Behavior Intention (군(軍) 조직구성원의 보안환경 영향요인이 보안 스트레스와 보안준수행동에 미치는 영향 연구)

  • Park, Eui Cheon;Jeon, Ki Seok
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.93-104
    • /
    • 2021
  • Today, due to the development of the 4th industrial revolution such as artificial intelligence, the security threat of the military organization is increasing. A study that can contribute to complying with military security is needed by studying the effects of influence factors occurring in this changing or newly emerging security environment on information security stress and security compliance behavior intention. In previous studies, task overload, task complexity, task uncertainty, and task conflict were extracted among environmental influencing factors that cause security stress. We empirically analyzed how these influencing factors affect security stress and whether they play a mediating role in security stress. As a result of the analysis, it was analyzed that the security stress was affected in the order of task overload, task conflict, and task uncertainty. Information security stress did not significantly affect security compliance behavior intention, but it was found to mediate the effect of task overload on security compliance behavior intention. This causes information security stress due to heavy security work in the military organization, which ultimately leads to lower security compliance behavior. Therefore, the security policy to manage this situation should be promoted first.

The study on the maturity measurement method of security management for ITSM System (ITSM적용을 위한 보안관리 성숙도 측정방법에 관한 연구)

  • Park, Jung-Oh;Kim, Sang-Geun;Choi, Byeong-Hun;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1182-1185
    • /
    • 2007
  • ITSM 시스템을 구축 시 서비스 지원(Service Support)영역과 서비스 공급(Service Delivery) 부분과 동일하게 보안관리 영역을 지원하기에 보안관리 업무의 성숙도를 효율적으로 측정하였다. 보안관리 영역의 성숙도측정은 업무담당자의 인터뷰를 거쳐 업무성숙도를 측정, 결과분석 및 To-Be모델을 계획하였다. 업무성숙도의 측정은 9개도메인과 63개의 세부항목으로 구성하였으며 각 세부항목별 가중치와 기준점수를 부여하여 각 조직구성원들 개인의 보안업무 비중도, 보안업무의 성숙도를 함께 측정하였다.

The Mitigation of Information Security Role Stress: The Role of Information Security Policy Goal Setting and Regulatory Focus (정보보안 업무 스트레스의 완화: 정보보안 정책 목표 설정 및 조절초점의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1177-1188
    • /
    • 2023
  • Socially, organizations are required to maintain strict management of their information resources and invest in the adoption of information security (IS) technologies and policies. However, the ongoing threat of information exposure by employees persists within the organization. This study aims to identify the role stress that employees may experience due to strict IS policies and propose methods for reducing its negative impact. Specifically, our study suggests a mechanism for mitigating role stress by incorporating factors related to IS policy goal setting and work regulatory focus. We conducted a survey among workers in the financial industry, where IS policies are rigorously enforced, and tested our research hypotheses using a sample of 309 participants. The results indicate that increasing the difficulty and specificity of IS policy goals reduces role stress (conflict and ambiguity) and positively influences employees' intention to comply with IS policies. Furthermore, individual work promotion focus moderated the relationship between role stress and IS compliance intention. These findings have important implications for organizations seeking to strengthen their IS compliance among employees and inform the development of effective IS strategies.

A Study on Mitigation of Information Security Related Work Stress (정보보안 관련 업무 스트레스 완화에 대한 연구)

  • Hwang, Inho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.123-135
    • /
    • 2020
  • Recently organizations are implementing strict security policies and technologies to minimize security incidents. However, strict information security can cause work stress of employees and can make it difficult to achieve security goals. The purpose of this study is to present the preconditions for mitigating the negative impact of security-related work stress. We conducted a questionnaire survey of employees working in the financial industry and secured a total of 266 samples. The test of the research hypothesis was carried out by structural equation modeling. As a result, work stress had a negative effect on compliance intention, and value congruence reduced work stress. Also, security feedback had a moderating effect on the relationship between research factors. The results have theoretical and practical implications for mitigating work stress of employees.

Security Analysis on Developing Web-based Business System for Teleworking User (원격근무를 위한 웹 기반 업무 시스템의 보안 요소 분석)

  • 남건우;김상천;박중길
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.91-96
    • /
    • 2003
  • 업무 편의성 요구 증가와 웹 서비스의 발전으로 웹 기반 원격근무 업무 시스템이 증가하고 있는 반면, 웹 취약점의 확산과 개방형 환경으로 인해 잠재적 위협이 증가되고 있다. 이러한 위협에 적절히 대응하기 위해서는 개발 단계 전반에서 보안 요소를 고려하여 안전한 업무 시스템을 구축해야 한다. 이를 위해 본 논문에서는 업무 시스템이 요구하는 보안 수준에 부합하는 보안 목표를 설정하고, 요구 보안 수준을 충족할 수 있도록 전체 개발 프로세스 상의 보안 관리 활동을 정의한다. 또한, 신원 인증 및 접근제어, 세션 관리, 이벤트 로깅, 데이터 검증, 알려진 취약점 대응, 그리고 프라이버시 보호와 같은 보안 요소들을 분석하여 시스템의 안전한 구축 방법을 제시한다.

  • PDF

A Practical Guideline toy Implementation of the Web Banking Security Systems (웹기반 은행업무를 위한 보안시스템 구축방안)

  • 김상균;임춘성
    • Proceedings of the CALSEC Conference
    • /
    • 1999.11a
    • /
    • pp.481-492
    • /
    • 1999
  • 연구배경 $\textbullet$ 인터넷 사용자 증대 및 웹기반 서비스 확산[Report, 1998] $\textbullet$ 웹기반 은행업우의 등장 [Arie, 1998] [임춘성, 1998] $\textbullet$ 인터넷 기반 보안 사고의 증대[임차식, 1998] $\textbullet$ 인 터넷 기반 시스템 침해 기법의 다양화[FIST, 1998] 연구필요성 $\textbullet$ 웹기반 은행 업무의 보안 위협에 대한 분석 필요 $\textbullet$ 보안 위협요소에 대한 보안 모델 수립 필요 $\textbullet$ 현존하는 보안 패키지 시스템의 웹기반 은행업무 적용방안 필요 (중략)

  • PDF