• Title/Summary/Keyword: 보안의식

Search Result 136, Processing Time 0.027 seconds

A Study on the Derivation of SME-based Evaluation Items in ISMS-P Authentication Systems (정보보호 및 개인정보보호 관리체계(ISMS-P) 인증 제도에서 중소기업 기반 평가항목 도출에 관한 연구)

  • Park, Hyuk Gyu;Kang, Wan Seok;Shin, Kwang Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.578-579
    • /
    • 2021
  • According to a survey on the infringement of SMEs, the level of technology protection capability is improving every year, but technology leaks and damage continue to occur. This shows that there is a need for a security management and supervision system that can strengthen the security awareness of SME executives and employees and maintain the security level continuously. The Personal Information & Information Security Management System(ISMS-P) authentication systems is the latest related standard, which has the problem of applying the same certification criteria without considering the types of certification target organizations such as ISPs, IDC, hospitals and schools, and SMEs.. In this paper, 73 evaluation items that can be specialized and applied to SMEs were derived by referring to ISMS-P certification and Personal Information Protection Management System (PIMS) certification. The results of the study show that the number of evaluation items decreased by 28.4% compared to the existing ISMS-P certification.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

The Effect of the Department Satisfaction of the College Students Majoring in Security on the Career Expectation Consciousness (경호전공대학생의 학과만족이 직업기대의식에 미치는 영향)

  • Kim, Jin-Hwan;Cho, Cheol-Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.59-69
    • /
    • 2014
  • The purpose of this study is to investigate an effect of the department satisfaction of college students majoring in security on the career expectation consciousness, and through this to propose basic data to help college students prepare positive school life and career and increase school life adaptation; doing this, it is to investigate the cause to promote not only their development but also school development. As of 2013, I set up a population targeting female and male college students majoring in security at Y University located in Y City, Gyeonggi Province, K University in G City, North Gyeongsang Province, and H University in C City, South Chungcheong Province and conducted study targeting the total 352 students using the random sampling method. The research tool was questionnaires, which I used by recomposing on the basis of the precedent studies at home and abroad. Regarding data processing, I used SPSS WIN 18.0 and carried out frequency analysis, one-way analysis of duncan variance, post hoc analysis, reliability analysis, factorial analysis, correlation analysis and multiple regression analysis. Through the above research methods and data analysis according to the procedures I drew conclusions as follows: First, the department satisfaction according to demographic characteristics of the college students majoring in security had a partially significant difference. Second, the career expectation according to demographic characteristics of the college students majoring in security had a partially significant difference. Third, the effect of the department satisfaction of the college students majoring in security on the career expectation consciousness was partial.

The attribution of the security guard failure and grope for efficient operational measures of security guard through the analysis of failures : propensity eduction of failure-factors of security guard and patterns of danger and injury (경호실패귀인과 실패사례 분석을 통한 효율적인 경호운용방안 모색 : 경호환경의 실패요인과 위해패턴 성향 도출)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.143-155
    • /
    • 2018
  • The purpose of this study is to extract the failure attributions to identify the failure factors of the security guards and to derive the risk factor factors through failure cases analysis. Failure attributions were prepared by using semi-structured questionnaires(17) and closed questionnaires(179) starting from the fully open questionnaires(8), and processed through SPSS 21.0 and AMOS 21.O statistical packages. As a result of summarizing the causal relationship between the failure attribution and the failure case (patrol failure pattern factor), In Park Jung-Hee's assassination, lack of experience(2), negative mind(1), lack of work ability(1), lack of experience(2), organizational non-system activeness(2), lack of awareness of mission(1) Failure(2), lack of consciousness(2), and 14 failure patterns were found. Aung-San National Cemetery explosion occurred in eight failure patterns including insecurity(1), negative mind(1), lack of work skills(2), lack of experience(2), individualism(1), There were eight failure patterns in the case of Mr. Yook Young-Su 's sniping, including insincerity(2), negative mind (1), lack of experience(2), lack of awareness of mission(2) and failure to share work(1).

  • PDF

Factors Influencing the Reuse Intention of Social Commerce Foodservice Product - Perceived Risk and Price Consciousness - (소셜커머스 외식상품 재이용의도의 영향요인 - 지각된 위험과 가격의식성을 중심으로 -)

  • Jeon, Hyeon-Mo;Kwon, Na-Kyung
    • Culinary science and hospitality research
    • /
    • v.22 no.4
    • /
    • pp.114-127
    • /
    • 2016
  • The study, focused on social commerce food service consumers, attempted to test the relationship between perceived risk and price consciousness, and suggested that perceived risk and price consciousness, the the degree to which price is considered when purchasing goods, affect reuse intention. Through such test results, the study aimed to provide useful practical implications for establishing marketing strategies of companies related to food service social commerce, and those looking into behavioral intentions of social commerce using food service consumers. The subjects of the study were male and female residents of Korea over 2-years of age who have had some experience purchasing a dining out item through social commerce. The social commerce company selected for sampling was Coupang, which was the number 1 shopping App in 2014 based on the number of yearly visitors. A questionnaire-based survey was conducted on respondents who had indicated that they had experience purchasing foodservice goods through Coupang. The results revealed that source risk, privacy risk, psychological risk, and time-loss risk had negative influences on reuse intention. However, social risk and financial risk did not exhibit any influences. Price consciousness had positive influences on reuse intention. The study explored perceived risk and price consciousness as elements to affect continuous use of social commerce of foodservice consumers.

The multidimensional influence of commitment on national security, job satisfaction, and job commitment on intent to leave (국가안보의식과 조직몰입도, 직업만족도가 특수경비원들의 이직의도에 미치는 영향에 관한 연구)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.63-86
    • /
    • 2013
  • Security officers' intent to leave their job would have devastating effects on national security related industries. That is because excessive turnover would result in wasting the money for recruiting and training for organizations as well as putting the level of national security at risk. Therefore, this study has a goal to investigate the factors influencing the intent of leave job among security staff working for one of public institution, airports(n=198). Specifically, this study has a focus on examining the effect of job satisfaction, job commitment and security staff's level of commitment on national security on their turnover intent. The results of the multivariate ordinary lest square regression analysis reveal that job satisfaction, job commitment, and the level of national security commitment directly influence turnover intent. Also, the job satisfaction and the level of national security commitment has indirect impact on the turnover intent via job commitment. However, the results indicate that gender, age, and educational level are not related with security staff's decision to leave their job. Policy implications and study contribution were discussed in this study.

  • PDF

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

A Study on the Effect of Job Satisfaction Factors and Service Delivery Perception of Aviation Security Screener Affecting Job Satisfaction (항공보안요원의 직무만족요인과 서비스 제공의식이 직무만족에 미치는 영향에 관한 연구)

  • Chung, Hwang Yong;Kim, Ki Woong;Kim, Ki Sung;Lee, Jong Sung;Yi, Yong Ki
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.4
    • /
    • pp.91-105
    • /
    • 2012
  • This study, the cause of an aviation security employees' job satisfaction and dissatisfaction will be understood and the data can be used as evidence to explain the position of the employees. Moreover, the results of this study shall be conducted to increase the level of service delivery and also to remove unsatisfactory factors. Thus, according to this research survey shows the understanding of the job satisfaction and service delivery influences on the overall job satisfaction of a secure enterprise's security screeners. As a results, by improving the job satisfaction of aviation security screeners, the world's most safe, convenient service and quick airport service delivery could be achieved. Therefore, in order to improve the level of Korea and the international competitiveness of airlines, the promotion of job satisfaction of employees would be very important. Moreover based on the results of this study, the advanced research on the recognition differences for service evaluation between the customers and security screeners are needed.

study about social issues according to the surveillance society time : benefit, controlled society? (감시사회의 도래에 따른 사회적 이슈에 관한 고찰: 혜택인가, 통제인가?)

  • Kim, Sang-Jin;Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.73-79
    • /
    • 2014
  • In the 21st century, the higher CCTV, hidden Camera, and surveillance and contra-surveillance in Cyber-space are, the higher the voices of concern about surveillance society nationally are. Nevertheless, phenomenon of panoptisme is becoming into general use. Actually, this watching system should be on the rise but this is the output playing up and advertising the positive effect of immediate convenience and offering safety that government and business made. Thus, this study wants to offer implication to warn the invasion of privacy and generalization controlled society as pointed out cause and problem of the surveillance society time according to the digital era.