• Title/Summary/Keyword: 정보보안 기술과부하

Search Result 14, Processing Time 0.021 seconds

The Influence of Information Security Techno-stress and Organizational Justice on Compliance Intention: Focusing on the Theory of Planned Behavior (정보보안 기술 스트레스와 조직 공정성이 준수 의도에 미치는 영향: 계획된 행동이론을 중심으로)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.4
    • /
    • pp.741-752
    • /
    • 2024
  • Organizations amplify their information security (IS) technical investments as the demand for IS escalates. This research suggests conditions for enhancing insider compliance with IS, focusing on the potential for behavior modification through techno-stress and organizational justice, based on the theory of planned behavior. To test the proposed hypothesis, this study utilized a survey methodology on 383 employees from companies with implemented IS. The test results showed that IS techno-stress (overload and uncertainty) caused by reduced attitudes of employees, and organizational justice increased subjective norms, influencing IS compliance intentions along with self-efficacy. Additionally, organizational justice has been found to alleviate the adverse effects of IS overload and uncertainty on attitudes. The findings are expected to help clarify measures for achieving IS performance within the organization by proposing organizational justice conditions to improve the negative IS environment of the organization.

The Influence on the Information Security Techno-stress on Security Policy Resistance Through Strain: Focusing on the Moderation of Task Technology Fit (정보보안 기술스트레스가 스트레인을 통한 보안정책 저항에 미치는 영향: 업무기술 적합성의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.931-940
    • /
    • 2021
  • As information security(IS) is recognized as a critical success factor for organizational growth, organizations are increasing their investment in adopting and operating strict IS policies and technologies. However, when strict IS technology is adopted, IS-related techno-stress may occur in the employees who apply IS technology to their tasks. This study proposes the effect of IS-related techno-stress formed in individuals on IS policy resistance through IS strain and proves that task-technology fit mitigates the negative effect of techno-stress. Research models and hypotheses were presented through previous studies, and the secured samples were used, and structural equation modeling was applied to verify hypothesis. As a result of the study, it was confirmed that IS-related techno-stress (overload, complexity) affected IS policy resistance through IS strain (anxiety, fatigue), and that task-technology fit moderated the relationship between techno-stress and strain. This study suggests a strategic direction for improving the level of internal IS from the viewpoint of suggesting ways to mitigate the stress of employees that may occur when IS policies and technologies are adopted.

The Effect of Information Security Related Stress and Person-Organization Fit on Knowledge Sharing Behavior (정보보안 관련 스트레스와 개인조직 적합성이 정보보안 지식공유행동에 미치는 영향)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.247-258
    • /
    • 2021
  • Recently, organizations are demanding strict information security behavior from their employees. Strict information security policies and techniques can cause information security related stress. The purpose of this study is to present the negative effects of information security related techno stress and role stress that reduce knowledge sharing behavior and person-organization fit. The survey was conducted to people working in organizations with information security policies and system, and the research hypothesis was verified by structural equation modeling using 309 samples. As a result of the study, person-organization fit had a positive effect on knowledge sharing behavior, but role stress had a negative effect. And, techno-stress negatively affected the person-organization fit. Additionally, role ambiguity had a moderating effect between person-organization fit and knowledge sharing behavior. The implications of the study were to confirm the negative effects of information security related techno stress and role stress, and to suggest directions for minimizing negative behavior of insiders.

Effective Key Agreement Protocol on Zig-Bee Network (ZigBee 네트워크에서 효율적인 키 분배 프로토콜)

  • Han, Jae-Hong;Kim, Sang-Jin;Oh, Hee-Kuck
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.993-996
    • /
    • 2007
  • LR-WPAN의 대표적인 기술인 ZigBee는 저속 전송속도를 갖는 홈오토메이션 및 데이터 네트워크를 위해 IEEE 802.15.4 표준을 기반으로 상위 프로토콜과 응용을 규격화한 기술이다. 특히 개방된 무선 환경인 ZigBee 네트워크에서는 무엇보다 보안의 중요성이 대두되고 있으며, ZigBee Alliance 규격에도보안 계층이 포함되어 있다. 그러나 암호화에 사용되는 링크키를 생성하기 위해 신뢰성 있는 정보(마스터키)를 평문으로 전송하기 때문에 직접적으로 노출되는 위험성과 방문자 위치 추적 등 디바이스의 이동이 빈번한 환경에서 PAN 코디네이터의 과부하가 발생할 수 있는 등의 여러 가지 문제점이 존재하고 있다. 본 논문에서는 Du 등이 제안한 사전 키 분배 기법을 이용하여 ZigBee 네트워크에서의 효율적인 키 분배 프로토콜을 제안하였다. 제안된 프로토콜은 디바이스에게 임의의 행렬 열과 행 값을 송신하여 링크키를 생성함으로서 이전의 문제점을 해결하고 더욱 빠른 통신이 가능하도록 하였다.

A Design of Secure Group-Management Method on the Digital Content Delivery based on CDN (CDN 기반의 디지털콘텐트 전송에서 안전한 그룹별 관리 기법 설계)

  • 고일석;나윤지
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.269-274
    • /
    • 2004
  • 중앙집중 구조의 멀티미디어 콘텐트 서비스에서는 서버의 과부하 문제와 네트워크 트래픽의 급격한 증가 문제가 발생한다. 최근에는 이러한 문제점을 해결하기 위한 디지털콘텐트 전송기술로 CDN에 대한 연구가 활발히 진행되고 있다. 본 연구의 목적은 CDN을 통한 디지털콘텐트의 서비스에서 안전하고 효율적인 전송 성능을 지닌 시스템을 설계하는 것이다. 본 연구에서는 CDN을 기반으로 대규모의 디지털콘텐트의 전송 및 관리 시스템에서, 디지털콘텐트의 그룹별 관리를 통한 디지털콘텐트의 안전성과 전송성능을 개선한 시스템을 설계하였다.

  • PDF

Performance Enhancement of ECC Algorithm-based Mobile Web Service System (ECC 알고리즘 기반 모바일 웹 서비스 시스템의 성능 향상)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.699-704
    • /
    • 2008
  • By the dependence on Web from popularization of internet and increasing number of users, web services capability and security problem of communication is becoming a great issue. Existing web services technology decrease the capability of web application server by limiting the number of synchronous client, decreasing the processing load and increasing average response time. The encryption process to secure communication and the early expense of handshake decrease transmission speed and server capability by increasing the calculation time for connecting. Accordingly, this paper executes an encryption procedure by elliptical encryption algorithm to satisfy secure demands, improve the overload of server for web services and get reliability and security of web server architecture and proposes an improved mobile web sever which provides better ability and the techniques for deferred processing.

A Failover Method in CCTV Network Video Recording Environment (CCTV 네트워크 영상 녹화 환경에서 장애 조치 기법)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.1-6
    • /
    • 2019
  • CCTV video recording system is recognized as evidence value of video data, and is widely used in real life for the purpose of security of facilities or security control, and it is developing in order to process high-resolution and high-capacity data in real time through network. However, there is no description of redundancy to prevent the loss of image data due to defects of unexpected equipment or external attack, and even if the redundancy is implemented, a high-capacity video stream is transmitted through the network, network overload can not avoided. In this paper, we propose and verify a failover method based on rules that can operate the redundancy scheme without inducing network overload in CCTV network video recording environment.

SDCDS: A Secure Digital Content Delivery System with Improved Latency time (SDCDS: 지연시간을 개선한 디지털콘텐트 전송 시스템)

  • Na Yun Ji;Ko Il Seok
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.303-308
    • /
    • 2005
  • Generally, the overloaded server problem and the rapidly increased network traffic problem are happened in a center concentrated multimedia digital content service. Recently, a study about the CDN which is a digital content transmission technology to solve these problems are performed actively. In this study, we proposed the SDCDS which improved a process latency time and a security performance on a digital content delivery and management. The goal of the SDCDS is the digital content security and the improvement of the processing time. For that, we have to design the security and the caching method considering the architecture characteristics of the CDN. In the SDCDS, the public key encryption method is designed by considering the architecture characteristics of CDN. And we improved the processing latency time by improved the caching method which uses the grouped caching method on the encrypted DC and the general DC. And in the experiment, we veryfy the performance of the proposed system.

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.