• Title/Summary/Keyword: 보안요인

Search Result 750, Processing Time 0.024 seconds

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.

ITU-T 사이버물리시스템(CPS) 보안 표준화 동향

  • Lee, Gunhee
    • Review of KIISC
    • /
    • v.29 no.2
    • /
    • pp.16-22
    • /
    • 2019
  • ICT 기술을 이용하여 업무 공정의 효율성을 높이기 위한 사이버물리시스템(CPS)은 구성요소 간 연결성 강화로 인한 사이버 공격 요인이 증가하고 있으며, 이에 따른 보안대책 수립이 CPS 구축 단계에서부터 고려되어야 한다. 본 논문에서는 CPS를 위한 보안대책의 온전한 수립을 위한 국제표준 동향을 ITU-T SG17의 표준화 활동을 중심을 살펴보고자 한다. ITU-T SG17에서 진행되고 있는 IoT 보안 표준, 스마트그리드 보안 표준, ITS 보안 표준 등 CPS 관련 보안 표준화 동향을 기술하고, 향후 표준화 추진 방향에 대해서도 다룬다.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

An Empirical Research on Human Factor Management Indicators for Information Security (정보보호를 위한 인적자산 관리지표 실증 연구)

  • Cha, In-Hwan;Kim, Jung-Duk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.153-160
    • /
    • 2009
  • This study is to develop a human resource (HR) security framework, and related HR security indicators in the context of information security. The HR security framework consists of three constructs, personnel assurance, personnel competence, and personnel security control. Based on the framework, HR security management indicators are derived as 26 indicators in 9 items out of 3 categories. An empirical research has been performed to verify the relevance and consistency between the indicators by conducting a questionnaire-based survey. Also, interrelationships between the proposed indicators and HR related security level were analyzed by the multiple regression analysis. As a result, the proposed hypothesis were mostly accepted, showing the significant relationships between the indicators and security level.

AMI 보안 취약점 점검 항목에 관한 연구

  • Kim, Sin-Kyu;Jeon, Yu-Seok;Seo, Jung-Taek
    • Review of KIISC
    • /
    • v.22 no.5
    • /
    • pp.73-78
    • /
    • 2012
  • 스마트그리드는 기존 전력망에 IT 기술을 융합한 차세대 전력망이다. 전력망에 IT 기술을 도입함으로써 운영효율이 증가하고 다양한 부가서비스가 창출되지만 반대로 사이버 보안위협은 증가하게 된다. 사이버 보안위협의 기술적 증가요인으로는 신재생에너지의 보급으로 인한 전력망 연결 접점 증가와 실시간 양방향 통신으로 인한 스마트그리드 기기 공격, 양방향 통신 프로토콜 공격 가능성 존재 등이 있다. 또한, 환경적 증가요인으로는 스마트그리드는 전력망 특성상 사고 발생시 피해 규모가 크므로, 상대국 및 테러집단에 의한 주요 공격대상이 되고 있다는 점이다. 본 논문에서는 이러한 스마트 그리드 사이버 보안위협을 사전에 차단하기 위해, 스마트그리드의 핵심 기술이라 할 수 있는 AMI의 보안 취약점을 발견할 수 있는 현실적인 취약점 점검 항목을 제시한다.

A Study on the Effects of Complication Level of Information Security Professional in the Public Entity on Job Satisfaction and Job Withdrawal Intention (조직내 정보보안 종사자의 갈등수준과 직무만족 및 직무변경의도에 관한 연구)

  • Shim, Mina
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.387-406
    • /
    • 2014
  • The purpose of study is desirable and effective conflict management plan and professionally, to promote sustainable job skills beyond. Therefore, the public agency information security professionals to find the causes of conflict and the level of suffering, the relationship, says the help of a job withdrawal intention and job satisfaction relationship further. The results indicated that there are differences in the factors of job withdrawal intention, conflict levels, job satisfaction, according to socio-demographic characteristics. Awareness of conflict factor increases the higher level of conflict. Job satisfaction, negative impact on the job withdrawal intention. We expect to contribute to the field of information security training key personnel in the future as a result, leaving the job to conflict prevention and mitigation, and minimized by applying the improved policies and institutions.

Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior (경영진 역할과 보호동기 요인이 정보보안정책 준수 의지에 미치는 영향: 계획행동이론을 기반으로)

  • Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.69-84
    • /
    • 2018
  • This study examines antecedents of the intention of compliance with information security policies based on Ajzen's Theory of Planned Behavior. The study conducted the following: Verification of casual relations between role of management and protection motivation and the antecedents of planned behavior as parameters to determine the effect on the intention of compliance with information security policy, and comparative analysis between the research model and a competition model. The result of the study disclosed that, in the research model, attitude and subjective norm took an intermediary role on management beliefs, response efficacy, response cost, self-efficacy, and compliance intention, and perceived behavior control on management beliefs, self-efficacy and compliance intention.

  • PDF

A Research on Activating Factor for Cultivating a Proactive Organizational Security Culture (조직의 능동적 보안문화 형성을 위한 활성화 요인에 관한 연구)

  • Ahn, Byunggoo;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.3-13
    • /
    • 2020
  • Organizations are facing a new, diverse security threat as ICT based industrial environment arises. As a way of effective countermeasure for security threat, organizations are making an effort to establish internalization of security culture, targeting a organizational members. However, members' awareness toward security receptiveness is low as inconvenience exists in business process and existing security culture focuses on controlling and regulating. Accordingly, this research desires to develop a participatory security culture which can higher the efficiency of security work process and induce members' voluntary participation. A comparative analysis on security culture related prior researches is conducted and based on a drawn components, statistical verification is accomplished. It is expected to contribute on future research on measuring a security culture level.

An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise (보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.69-81
    • /
    • 2018
  • The ultimate intention of this research is to identify the factors that have a significant effect on the perceived importance of information security as the antecedent of intention to information security policy compliance. We found that the effectiveness of information security training program did not have statistically significant effect on the perceived cost of policy compliance. Second, the effectiveness of information security policy has significant influence on the perceived cost of policy compliance. Third, perceived vulnerability has a significant effect on the perceived cost of policy compliance. Fourth, perceived cost of policy compliance has a significant effect on perceived importance of information security. Fifth, supervisor's attitude toward information security silence has a significant effect on employee silent behavior towards information security. Sixth, communication opportunities towards information security has a significant influence on employee silent behavior towards information security. Finally, it was shown that employee silent behavior towards information security had a significant influence on the perceived importance of information security.