• 제목/요약/키워드: 보안의식

검색결과 136건 처리시간 0.023초

Factors Affecting the Security Ability of Port Logistics Organization Members (항만물류조직구성원들의 보안능력에 영향을 미치는 요인)

  • Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • 제43권3호
    • /
    • pp.179-185
    • /
    • 2019
  • Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • 제21권3호
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

Video Surveillance System (영상을 이용한 감시 시스템)

  • Kim, Sung-Mo;Cho, Ji-Man;Jin, Min-Sik;Jeong, Eui-Hoon;Choi, Jin-Ku
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2007년도 가을 학술발표논문집 Vol.34 No.2 (C)
    • /
    • pp.447-450
    • /
    • 2007
  • 최근 인터넷과 통신이 널리 사용되면서 보안에 대한 의식과 관심은 점차 높아지는 추세이다. 기존의 보안 프로그램은 비싼 가격과 복잡한 장비를 요구하기 때문에 대중적으로 보급되는데 한계를 나타내고 있다. 따라서 널리 보급될 수 있는 보안 프로그램이 되기 위해서는 간단한 장비와 저렴한 가격으로 보안 프로그램의 설치, 운용이 가능해야 한다. 본 논문에서는 간단한 PC 카메라를 이용해서 기존의 프레임 비교의 비효율적인 방법을 개선하여 블록단위로 나눠서 필요한 일부분만의 비교를 통해 빠르고 간단하게 영상을 감지하는 알고리즘을 구현하고 감시 시스템을 개발하였다.

  • PDF

Research on Security problems of ubiquitous systems (유비쿼터스 시스템 보안 문제에 관한 연구)

  • Bae, Jin-Young;Son, Kwang-Ho;Kim, Kyung Tae;Youn, Hee-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 한국컴퓨터정보학회 2014년도 제49차 동계학술대회논문집 22권1호
    • /
    • pp.379-380
    • /
    • 2014
  • 최근 IT 기술 발전과 광대역 네트워크의 발달로 휴대성과 편의성뿐 아니라 시간과 장소에 구애를 받지 않고 네트워크에 접속할 수 있는 기술이 발전됨에 따라 유비쿼터스에 대한 다양한 연구가 진행되고 있다. 유비쿼터스는 사용자가 컴퓨터나 네트워크를 의식하지 않고 장소에 상관없이 자유롭게 네트워크에 접속할 수 있는 환경을 말한다. 이러한 유비쿼터스 시스템은 사용자가 원하는 정보와 서비스를 시간과 장소에 상관없이 다양한 서비스를 받을 수 있지만 이러한 네트워크시스템에서 개인프라이버시와 보안의 취약점이 존재하고, 이를 통하여 개인정보유출은 유비쿼터스 시스템의 신뢰도를 저하하고 있다. 본 논문에서는 이러한 유비쿼터스 시스템에 대해서 설명하고 유비쿼터스의 보안 및 RFID의 취약점에 대해서 논의하였다.

  • PDF

A study on the Extension of Information Ethics and Security Area of ISST - Forcused on a Information Teacher - (ISST 정보윤리.보안 영역 확장에 관한 연구 "교육정보담당교사를 중심으로\lrcorner$)

  • 권소화;안성진
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.167-172
    • /
    • 2004
  • In the process of presenting the additional criteria, ISST, developed to evaluate teachers' capacity of applying information, suggests the criteria without considering teacher's own task. Information Ethics and Security Model is made up of two parts. In one part, it deals with four areas concerning with Information Ethics evaluation to measure the sensibility of Information Ethics of Information Teacher In another part, it is divided Information Security Evaluation into three areas which estimate technical method to secure the information system tying in the environment of information-oriented education.

  • PDF

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • 제20권1호
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

Effect of Military Officer's Ethical Disposition and Perceived Work Environment on Organizational Security Policy Compliance (군장교의 윤리적 성향과 업무환경 지각이 조직의 보안정책준수에 미치는 영향)

  • Bora Kim;Kisoo Seong;Beomsoo Kim
    • Information Systems Review
    • /
    • 제22권3호
    • /
    • pp.31-58
    • /
    • 2020
  • Based on the social control theory, this study intends to find out the influential factors of organizational members' information security policy compliance (ISPC). Survey data from 195 military officers were analyzed to examine the effect of ethical disposition (morality, responsibility, the perceived value of ethical education) and perceived work environment (relationships with supervisors, overwork, and pay satisfaction) on ISPC attitude, ISPC intention, and turnover intention. The results of partial least squares structural equation modeling (PLS-SEM) show that ethical dispositions affect ISPC attitude and that work environments (except for pay satisfaction) affect turnover intention. In addition, ISPC attitude significantly mediates relations between ethical disposition and ISPC intention, between relationships with supervisors and ISPC intention, and between turnover intention and ISPC intention. These findings suggest that ethical disposition factors can predict an individual's security awareness level, and the ISPC attitude is a significant variable in the organizational security context.

A Study on E-trade Securities and Strategic Solutions (전자무역보안과 전략적 대응방안에 대한 소고)

  • Jung, Jo-Nam;Lee, Chun-Su;Kang, Jang-Mook
    • The KIPS Transactions:PartC
    • /
    • 제11C권5호
    • /
    • pp.577-584
    • /
    • 2004
  • Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurances and that of subjects have been researched through interdisciplinary evolution. Our research e-trade security on three part, First system attack, second is data attack and third is business attack. the attacks have theirs own solution, so e-trade company use this solution timely and powerfully. It is the most important thing to prepare the cracking with securities system. also manager should catch recent hacking technologies. The research results propose that e-trade firms should use information security policies and securities systems that including H/W and S/W. therefore manager's security mind is very important and also using electronic commerce securities device and should be considered exploiting solutions by each special usage according to e-trade company' environments.

Army Field Training and the Affect It Has On the Commissioning of Students Who Hope to Become NCOs (병영실습 훈련이 부사관과 학생들의 임관에 미치는 영향)

  • Jung, Jae-Keak
    • Convergence Security Journal
    • /
    • 제14권3_1호
    • /
    • pp.71-77
    • /
    • 2014
  • Students in the NCO department who have concluded the agreement with army headquarters, exercise camp education environment and the method on how to carry out the education. In order to raise awareness on NCOs and obtain pride as a future army NCO, army field training is held once a year. The stress on the education is the establishment of national security awareness, proficiency in basic army training, awareness of NCO pride, and basic posture as a soldier. The demand for commissioning only those with satisfactory army field training results is becoming stronger. The satisfaction of the education states a clear goal as a future NCO. This army field training has a meaning when the demands and expectations of the trainee leads to a form of commissioning.

An Improvement of Security for the National Assembly (국회시설보안 향상방안)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • 제9권3호
    • /
    • pp.290-299
    • /
    • 2013
  • This study is to present an improvement of security for the National Assembly by survey of persons who use the National Assembly facilities. Most of respondent said that their security consciousness level is above average, and they know National Assembly building is National Major Facility First class but they did not know well what the Major Facility First class is. Many of respondents thought security design of National Assembly building is inadequate, so reinforcement of access control management is necessary. For reinforcement of access control management, security gate and preparing of some obstacles are required. They said that they could put up with inconveniences incurred as a result of reinforcement of access control management, that could be affected positively for the reinforcement. The recognition on the necessity of security education is high, but there is no proper security education program. For practical security education, contents and different method followed by different facilities user should be considered.