• Title/Summary/Keyword: 외주용역

Search Result 18, Processing Time 0.018 seconds

Proposal of ISMS-P-based outsourcing service management method through security control business relevance analysis (보안관제 업무 연관성 분석을 통한 ISMS-P 기반의 외주용역 관리 방법 제안)

  • Ko, Dokyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.582-590
    • /
    • 2022
  • As security threats caused by cyber attacks continue, security control is mainly operated in the form of a service business with expertise for rapid detection and response. Accordingly, a number of studies have been conducted on the operation of security control services. However, due to the research on the resulting management, indicators, and measurements, the work process has not been studied in detail, causing confusion in the field, making it difficult to respond to security accidents. This paper presents ISMS-P-based service management methods and proposes an easy outsourcing service management method for client by checklisting each item derived from the mapping of 64 items of ISMS-P protection requirements through business relevance analysis. In addition, it is expected to help implement periodic security compliance and acquire and renew ISMS-P in the mid- to long-term, and to contribute to enhancing security awareness of related personnel.

A Study on Enhancing Security Management of IT Outsourcing for Information System Establishment and Operation (정보시스템 구축·운영을 위한 IT 외주용역기반 보안관리 강화에 관한 연구)

  • Lee, Eun-Sub;Kim, Sin-Ryeong;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.27-34
    • /
    • 2017
  • In recent years, major security data such as research data and confidential documents have been leaked to the outside due to the carelessness of the companies and research institutes performing IT related services such as information technology projects and research and development of financial institutions, companies and public institutions is. Leakage cases are caused by leakage of personal information due to lack of security management of information system maintenance companies, such as unauthorized leakage or storage of related materials in outsourcing service process. In this paper, we analyzed the types and management status of service business through the environmental survey of corporate informatization business and analyzed the problems in development and maintenance using external service companies. Furthermore, in this paper, we provide an information system service that focuses on the business activities based on the items considered, and at the same time, it provides the informatization service for companies that can prevent infiltration of viruses and hacking from the outside. This paper presents a methodology for enhancing security for the system construction.

Comparison of Occupational Danger and Physical Health Problems of Workers according to the Form of Employment (고용형태에 따른 근로자의 위험 및 건강에 대한 비교)

  • Oh, Changseok;Jeon, Hui Won
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.1
    • /
    • pp.111-122
    • /
    • 2020
  • Objectives: The study aims to compare indirect form of employment with direct form of employment on the variables of occupational danger and physical health. Methods: I studied based on the data of 5th Korean Working Conditions Survey (KWCS) which was performed by Occupational Safety & Health Research Institute of Korea Occupational Safety and Health Agency in 2017. SAS 9.4 was used for statistical analysis of the final data. Results: Based on the verification result, the hazard is higher for direct employment than for dispatch or subcontract in case of exposure to risks in the health and social welfare industry. Based on cross tabulation, significant differences were found in the proportions of harmful and safe tasks in direct employment and those in outsourcing in the physical health industry. It was found that the risk of hazard is 2.18 times higher in outsourcing jobs than in direct employment. Conclusions: It is necessary to consider a dispatch and subcontract partner as a strategic partner and not simply hand over dangerous or hard tasks to them. Active and aggressive cooperation along with support from the employer enterprise built in the contract is necessary for the safety and health of dispatch or subcontract laborers.

업체탐방 / 진입장벽 높은 일본과 독일에서 수출 꿈 이뤄

  • Kim, Jin-Gyeong
    • Digital Contents
    • /
    • no.8 s.123
    • /
    • pp.22-23
    • /
    • 2003
  • 한국어 교육 콘텐츠 '스즈키가의 한국어 대모험' 일본 진출, PDA 전시가이드 솔루션 독일 괴테하우스 상용서비스 등 해외에서 더 인정받는 기업 멀티화인테크(www.mft.co.kr). "스즈키가의 한국어 대모험을 제작하기까지 8억원을 투자하는 등 기술 및 콘텐츠 개발에 투자를 아끼지 않고 보낸 5년이다. 투자비를 벌기 위해 EBS, 대한교과서, YMCA 등으로부터 의뢰받은 콘텐츠를 만들어야 했다. 60%는 외주용역 콘텐츠 제작에, 40%는 자체 브랜드 개발을 위한 개발에 밤샘을 마다하지 않았던 시간이다." 현재 동국대 영상제작과 교수이기도 한 멀티화인테크의 김재봉(42) 사장은 "비지니스보다 강단에서 학생들을 가르치는 것이 더 좋겠다고 생각한 적이 있는데, 투자에 대한 결과가 눈에 보이는 요즘은 시간이 어떻게 가는 줄 모르겠다"며 사업 재미에 푹 빠져 있다고 말한다.

  • PDF

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.