• Title/Summary/Keyword: 정보보호자신감

Search Result 8, Processing Time 0.024 seconds

Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness (금융회사의 정보보호활동이 정보보호의식 및 정보보호자신감에 미치는 영향 : 정보보호의식의 매개효과를 중심으로)

  • Soh, Hyeon-Chul;Kim, Jong Keun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.45-64
    • /
    • 2017
  • The Purpose of this Study is to find out the Implications of the Information Security Activities of Financial Companies on the Confidence of the Information Security Officers and to find Academic and Practical Implications to Supplement the Insufficiencies. As a Result, it was Confirmed that the Information Security Officer's Confidence in Information Security for Companies and the Level of Information Security Awareness of the Employees are Increased when Financial Companies Conduct Information Protection Activities Focusing on Information Security Education, Security Incident Responses and In/Out Security.

A Study on the Care Giver's Awareness of Self-efficacy and Job Satisfaction at the Elderly Medical Welfare Facilities (노인의료복지시설 요양보호사의 자기효능감과 직무만족의 인식에 관한 연구)

  • Cho, Woo-Hong;Park, Chun-Gyu;Son, Myeong-Dong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.127-128
    • /
    • 2013
  • 이 연구는 노인의료복지시설 소속 요양보호사들을 대상으로 자기효능감과 직무만족에 대한 요양보호사들의 주관적 인식의 차이를 분석해 보고자 하였다. 분석결과 요양보호사들이 근무하는 노인의료복지시설 유형에 따른 인식의 차이는 없었지만 전체적으로 요양보호사들의 자기효능감과 직무만족의 충족이 노인의료서비스 제공에 있어서 중요하다는 것을 강조하였다. 따라서 노인의료복지시설 소속 요양보호사들이 노인들에게 의료서비스 등을 제공함에 있어서 직무만족과 동시에 지속적으로 높은 수준의 자기효능감을 유지할 수 있도록 하는 인적자원관리전략이 필요함을 시사하였다는데 그 의의가 있다.

  • PDF

A Class and Cosmetics of Make-up in Make-up Deisgn (메이크업 디자인에서 메이크업 종류)

  • Shin, Seong-Yoon;Shin, Kwang-Sung;Lee, Hyun-Chang;Jin, Chan-Yong;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.144-145
    • /
    • 2012
  • Make-up is the act of protecting the body and face, or a beautifully decorating by covering the shortcomings. In this paper, classification and type of makeup was newly organized to suit the present day. And the meaning of the new make-up were evaluated. Makeup helps protect skin from external changes. It gives the beauty function to hide defects of the skin and make it beautiful. Thus, it allows to have a social life actively and aggressively given the confidence to look.

  • PDF

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

A study on Model of Personal Information Protection based on Artificial Intelligence Technology or Service (인공지능 기술/서비스 기반의 개인정보 보호 모델에 대한 연구)

  • Lee, Won-Tae;Kang, JangMook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.1-6
    • /
    • 2016
  • A.I. has being developed from the technology for Big data analysis to the technology like a human being. The sensing technology of IOT will make A.I. have the more delicate sense than human's five senses. The computer resource is going to be able to support A.I. by clouding networking technology wherever and whenever. Like this A.I. is getting developed as a golden boy of the latest technologies At the same time, many experts have the anxiety and bleak outlook about A.I. Most of dystopian images of the future come out when the contemplative view is lost or it is not possible to view the phenomena objectively. Or it is because of the absence of confidence and ability to convert from the visions of technology development to the subject visions of human will. This study is not about the mass dismissal, unemployment or the end of mankind by machinery according to the development of A.I. technology and service, but more about the occurrent issue like the personal information invasion in daily life. Also the ethical and institutional models are considered to develop A.I. industry protecting the personal information.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.