• Title/Summary/Keyword: 정보보호의식

Search Result 122, Processing Time 0.023 seconds

Proposal of ISMS-P-based outsourcing service management method through security control business relevance analysis (보안관제 업무 연관성 분석을 통한 ISMS-P 기반의 외주용역 관리 방법 제안)

  • Ko, Dokyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.582-590
    • /
    • 2022
  • As security threats caused by cyber attacks continue, security control is mainly operated in the form of a service business with expertise for rapid detection and response. Accordingly, a number of studies have been conducted on the operation of security control services. However, due to the research on the resulting management, indicators, and measurements, the work process has not been studied in detail, causing confusion in the field, making it difficult to respond to security accidents. This paper presents ISMS-P-based service management methods and proposes an easy outsourcing service management method for client by checklisting each item derived from the mapping of 64 items of ISMS-P protection requirements through business relevance analysis. In addition, it is expected to help implement periodic security compliance and acquire and renew ISMS-P in the mid- to long-term, and to contribute to enhancing security awareness of related personnel.

Developing a Consciousness of Copyright for Elementary School Students through the Customized Educational Program (맞춤형 교수-학습활동을 통한 초등학생 저작권 보호의식 함양)

  • Kim, Hyun-Bae;Lee, Yong-Sic
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.103-112
    • /
    • 2011
  • In Intellectual Subject the learning is applied individualization learning but In Computer Subject most teachers teach the curriculum with altogether lesson because of lack about understanding computer subject and the great gap of student's beforehand. The purpose of this paper is to suggest Customized Educational Program to help teachers apply in the classroom and to analyze the effect of educational using Personalized Learning model on the improvement of student's learning attitude and self-directed learning ability. For this study, after the Personalized Learning model class, measured learning attitude, student's class satisfaction and the expanding of self-directed learning ability by the self-assessment reports, a product, teacher's evaluation.

  • PDF

A Study on Factors Affecting the Reception Attitude toward Electronic Medical Record (전자의무기록 수용태도에 영향을 미치는 요인에 관한 연구)

  • Jin, Hye-Eun;Choi, Eun-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.279-286
    • /
    • 2012
  • The purpose of this study was identified the influence of introducing Electronic Medical Records (EMR) on reception attitude, based on literature investigation, the study converted utility and serviceability from Davis TAM Model into awareness of effects in computerized database except attitude variable. The electronic survey for doctors, nurses, medical technicians of a general hospital located in Gangwon-do was performed for 4 weeks from Nov, 11th, 2009 to Dec, 2nd and the collected data was computerized through SPSS 12.0. The factors influencing reception attitude were divided into 4 categories; basic characteristics of the individual, awareness of privacy protection, awareness of effects in computerized database, technological preparation and measured detailed specific variables. As the result of this, the factors influencing reception intention were different depending on recognizing the effectiveness caused by computerization of medical information. Especially, in terms of the difference between basic characteristics of the individual and awareness of privacy protection, there were significant distinctions among 3 sectors; general, transactional, online information management. The significant effects were identified from information management related to business or online information management depending on experiencing security education.

A Study on the Characteristics and Management Plan of Old Big Trees in the Sacred Natural Sites of Handan City, China (중국 한단시 자연성지 내 노거수의 특성과 관리방안)

  • Xi, Su-Ting;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.35-45
    • /
    • 2023
  • First, The spatial distribution characteristics of old big trees were analyzed using ArcGIS figures by combining basic information such as species and ages of old big trees in Handan City, which were compiled by the local bureau of landscaping. The types of species, distribution by ages of trees, ownership status, growth status, and diversity status were comprehensively analyzed. Statistically, Styphnolobium, Acacia, Gleditsia, and Albizia of Fabaceae accounted for the majority, of which Sophora japonica accounted for the highest proportion. Sophora japonica is widely and intensively distributed to each prefecture and district in Handan city. According to the age and distribution, the old big trees over 1000 years old were mainly Sophora japonica, Zelkova serrata, Juniperus chinensis, Morus australis Koidz., Dalbergia hupeana Hance, Ceratonia siliqua L., and Pistacia chinensis, and Platycladus orientalis. Second, as found in each type of old big tree status, various types of old big tree status were investigated, the protection management system, protection management process, and protection management benefits were studied, and the protection of old big tree was closely related to the growth environment. Currently, the main driving force behind the protection of old big trees is the worship of old big trees. By depositing its sacredness to the old big tree and sublimating the natural character that nature gave to the old big tree into a guiding consciousness of social activities, nature's "beauty" and personality's "goodness" are well combined. The protection state of the old big tree is closely related to the degree of interaction with the surrounding environment and the participation of various cultures and subjects. In the process of continuously interacting with the surrounding environment during the long-term growth of old big trees, it seems that a natural sanctuary was formed around old big trees in the process of voluntarily establishing a "natural-cultural-scape" system involving bottom-up and top-down cross-regions, multicultural and multi-subjects. Third, China focused on protecting and recovering old big trees, but the protection management system is poor due to a lack of comprehensive consideration of historical and cultural values, plant diversity significance, and social values of old big trees in the management process. Three indicators of space's regional characteristics, property and protection characteristics, and value characteristics can be found in the evaluation of the natural characteristics of old giant trees, which are highly valuable in terms of traditional consciousness management, resource protection practice, faith system construction, and realization of life community values. A systematic management system should be supported as to whether they can be protected and developed for a long time. Fourth, as the perception of protected areas is not yet mature in China, "natural sanctuary" should be treated as an important research content in the process of establishing a nature reserve system. The form of natural sanctuary management, which focuses on bottom-up community participation, is a strong supplement to the current type of top-down nature reserve management in China. Based on this, the protection of old giant trees should be included in the form of a nature reserve called a natural monument in the nature reserve system. In addition, residents of the area around the nature reserve should be one of the main agents of biodiversity conservation.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

A Study on Neutralization and Organizational Citizenship Behavior for Information Security Policy Compliance (직원의 정보보안 정책 준수에 대한 중화기술과 조직시민행동의 영향 연구)

  • Choi, Myeonggil;Choi, Hwayoung
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.65-76
    • /
    • 2015
  • This paper examines the influence of neutralization techniques and voluntary actions on intention to comply information security policy. Data were collected through an online survey and hypothesis results were all hypotheses were supported. The results of this study improve understanding on the voluntary nature of employee behavior for participating in the organization's policies and the rationalization of the employees trying weakening the organization's policy intentions. The organization shoud implement specific education and training in order to suppress the rationalization of employees and develop a plan to have a kinship with the employees of the organization.

Research on a Valuation Standard and the Actual Condition About Security Management in PACS (PACS에서 보안관리 평가기준 연구와 실태조사)

  • Jeong, Jae-Ho;Dong, Kyung-Rae;Kweon, Dae-Cheol;Son, Gi-Gyeong;Kim, Hyun-Soo;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.31 no.4
    • /
    • pp.347-353
    • /
    • 2008
  • This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  • PDF

A Study on Family Caregivers' Preferences for Utilization of Community-based Welfare and Health-care Services (요보호 노인 부양가족의 재가복지 및 재가보건 서비스 유형별 이용의향에 관한 연구 - 2002년도 서울시 노인복지 기초수요조사 자료 분석 -)

  • Kim, Hye-Kyung
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.123-147
    • /
    • 2004
  • The purposes of this study are, 1) to explore the factors related to the family caregivers' preferences for service utilization both of the community-based welfare and health-care services, and 2) to examine the reasons why not want to use services analyzing a survey data obtained from family caregivers(n=1,000). Anderson and Newman's Behavior model was employed to examine the factors related to the preferences for service utilization. The main results are as follows. 1) Logistic regression analyses demonstrated that predisposing factor(such as age and relations with frail elderly) and enabling factor(such as economic status, secondary caregiver, informal informational support provider, etc) were significant predictor for caregivers' preference for service utilization. Contrary to an expectation, needs factor was negatively related to the preference for service. More specifically, the more they have service needs, the less they show their willingness to use community-based service both in welfare and health-care services except for care education program. 2) Caregiver identified 'family caregiving consciousness'(family should take care of frail elderly, elderly dislike be taken care of) as an important reason not want to use community services next to financial factor. These findings have several implications for policy making especially for 'public long-term care insurance' which was planned to start in 2007.

  • PDF

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.