• Title/Summary/Keyword: 침해원인

Search Result 83, Processing Time 0.022 seconds

Moral Disengagement in Information Security Context: A Study of Antecedents and Outcomes (정보보안 상황에서의 도덕적 해방: 선행요인과 결과요인에 대한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.1-13
    • /
    • 2013
  • Every big online security breach seems to end in a big lecture. Thus, although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on technical issues. The purpose of this study is to explain why insiders breach security policy by applying the moral disengagement theory. There are no consistent, widely accepted theories or theoretical frameworks in the literatures as to why insiders breach of information security, and therefore no clear, effective guidance on what to do to prevent employees from violating information security policy in organization. To do this, we theorize that moral disengagement may play a mediating role connecting stable individual differences to intention to breach security policy, because of some of the individual differences. We found that policy awareness and perceived punishment have a negatively significant effect on moral disengagement. However, negative affectivity has a positively significant influence on moral disengagement. Furthermore, moral disengagement has a positive effect on intention to breach security policy. Conclusions and implications are discussed.

A Theoretical Comparative Study of Human Resource Security Based on Korean and Int'l Information Security Management Systems (국내·외 정보보호 관리체계기반의 인적보안의 이론적 비교연구)

  • Rha, Hyeon-Dae;Chung, Hyun-soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • In various ICBM (IoT, Bigdata, Cloud, Mobile) IT convergence environments, IT technologies have been evolved, new information security threats have been occurred. As information security incidents in major public agencies, financial institutions and companies occurred, it was emphasized that the importance of human security was disclosed. Thus, implementing of information security management system could protect hacks and security breaches and respond quickly to accidents so it minimized the sized of loss. In this paper, comparison of human security controls shown in ISO27001, COBIT, NIST 800-53, K-ISMS, Cyber Security Framework such as the main information security management systems was analyzed, and proposed of the security implications about effective controls of human resources security issues.

A Study on Risk Signal of Information Security and Organizational Learning Failure (정보보안 침해 위험신호의 조직학습 실패에 관한 시스템 다이나믹스적 연구)

  • 박성진
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.179-187
    • /
    • 2003
  • This study investigate the reasons of organizational failure in detection and appropriate response to risk signal. The Crisis does not come true suddenly, there is some risk signals in crisis. If Organization detect the risk signals the crisis is come true opportunities, if not the crisis is come true disastrous outcome. This is use the system dynamics approach. System Dynamics assume the system as a collection of causal feedback loop, so we understand the dynamics around the problems. This investigate suggest that, the focus on growth is the a kind of promotional pressure and the pressure drive the organization to less attention the risk signal, so the risk is underestimate In proportion to real risk. Ultimate, the organization entrap the promotional climate and insensible to security. This study is a kind of hypothesis-discovering research, in the further study, the discovered hypothesis will be empirically tested.

  • PDF

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

Exploring the Impact of Interaction Privacy Controls on Self-disclosure

  • Gimun, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.171-178
    • /
    • 2023
  • As the risk of privacy invasion due to self-disclosure increases in SNS environment, many studies have tried to discover the influencing factors of self-disclosure. This study is an extension of this research stream and pays attention to the role of interaction privacy controls(friend list and privacy settings) as a new influencing factor. Specifically, the study theorizes and test the logic that the ability to effectively control interactions between individuals using IPC(called IPC usefulness) satisfies the three psychological needs(autonomy, relationship, and competency needs) suggested by the Self-Determination Theory, and in turn increase the amount of self-disclosure. As a result of data analysis, it was found that IPC usefulness has a very strong influence on the satisfaction of psychological needs and is a major factor in increasing the degree of self-disclosure by users. Based on these findings, the study discusses the theoretical and practical implications as well as future research directions.

Research on the Effectiveness of Protecting Utility Model with China's Patent Evaluation Report (실용신안 권리보호에 대한 중국 특허권평가보고서제도의 유효성 연구)

  • Ho, Hyo-rim
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.1
    • /
    • pp.127-152
    • /
    • 2017
  • China's utility model as a supplement to the invention patent, has short application duration, fast authorized speed, and has the same exclusive rights with patents, so companies can quickly dominate the market. But the utility model does not need to carry out substantive examination, so has lower stability, high frequency of invalid to accepted, so compare with the invention patent, difficult to be protected. In order to actively encourage the small and medium-sized enterprises to promote their inventions, and protect domestic patents, China established a protection policy of patent evaluation report for the utility model rights, especially the patent evaluation report can be used as evidence in a patent infringement trial, to provide judicial remedies for utility model patentee and the party of patent disputes. Many experts believe that the establishment of patent evaluation report system can improve the stability of the utility model patent right, and when the defendant request for invalidation of the patent right in the defense period, if there is no novelty, creativity lost or no other reason has not led to the stability of patent right given in a patent evaluation report of the utility model patents, the court may not suspend the trial, without having to wait for the Patent Reexamination Board makes the patent invalid declaration decisions, can improve the efficiency of the judicial process, accelerate the patentee's time. However, in practical patent infringement, the patent evaluation report system and invalidation system are in conflict. In this paper, through the analysis of the current China utility model system and compared with the South Korean utility model system, review the role and character of the patent evaluation report system, and through the actual cases of the utility model patent infringement litigation, analysis possible variates from the decision of patent evaluation report, to find out the reason of the patent evaluation report system being in conflict with the invalidation system, and research on the effectiveness for protecting Utility Model with China's Patent Evaluation Report.

A Study on the Retransmission Consent and Arbitration for the Retransmission of Terrestrial Broadcasting Signal in Japan (지상파채널의 재전송 동의와 중재 기준에 관한 연구 - 일본의 사례분석을 중심으로)

  • Kim, Kyung-Hwan
    • Korean journal of communication and information
    • /
    • v.48
    • /
    • pp.46-62
    • /
    • 2009
  • The current study attempted to review the standards of retransmisison consent and arbitration for the terrestrial broadcasting signal. The standards are based upon the principles encouraged by the MIAC(Ministry of Internal Affairs and Communications). It has been criticized that the standards of judgement for the retransimission consent and arbitration are ambiguous and arbitrary in Japan. In 2009, MIAC announced five decisions regarding the retransmission of over-the-air. The result of the current study found that the regulations of compulsory over-the-air signal retransmission have been sustained until now. The retransmission policy of the Japan government based upon three principles; localism, proper cause and copyright act. The judgment is dependent on the intrepretation of MIAC's standard about these three principles.

  • PDF

A study on possibility of soft target terrorism by ISIS in South Korea (자국내 IS테러단체에 의한 소프트타깃 테러발생 가능성에 대한 연구)

  • Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.85-117
    • /
    • 2016
  • These days, ISIS terrorists have been expanding not only to european countries, but also to asian countries so South Korea is no longer safe from terrorists' attacks. Especially, 'soft target terrorism' makes many people maximizing fear of terrorism because it is caused by small groups - those who are armed with small arms and light weapons - and they are able to carry out hit and run attacks on civilian targets. It poses even more dangerous to kill massively. That is why November 2015 Paris attacks and January 2016 Jakarta attacks killed and injured many people because of 'soft target terrorism.' Therefore, the South Korea has also recognized the seriousness of terrorism by ISIS. The study has shown the precautionary measures about 'soft target terrorism' and how to defend against 'soft target terrorism' by looking through overseas examples. It is for the possibilities of 'soft terrorism' in South Korea because of the expansion of ISIS. As a result, 'soft target terrorism', caused by ISIS, could happen in South Korea. The counterplan is as in the following. First of all, 'soft target terrorism', which is collaborated with ISIS and domestic terrorists, could be caused by negative awareness of foreign residents and xenophobia so the public should change stereotypes about the foreign residents and there should be legislation about racial discrimination enacted by parliament and the government must practice the law. Second, the Korean anti-terrorism laws should be modified to minimize violations of human rights, related to the Korean citizens' personal information, and to stop the concentration of power into the hands of one law enforcement. Third, the government has to develop and to initiate the refuge&evacuation simulation, which prepares for 'soft target terrorism' and minimizes the damages if terrorists attack hot spots like central commercial areas or event halls.

  • PDF

The Obligation of Return Unjust Enrichment or Compensation for the Use of Flight Safety Zone -Seoul High Court Judgment 2018Na2034474, decided on 2018. 10. 11.- (비행안전구역의 사용에 대한 부당이득반환·손실 보상 의무의 존부 -서울고등법원 2018. 10. 11. 선고 2018나2034474 판결-)

  • Kwon, Chang-Young;Park, Soo-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.63-101
    • /
    • 2020
  • 'Flight safety zone' means a zone that the Minister of National Defense designates under Articles 4 and 6 of the Protection of Military Bases and Installations Act (hereinafter 'PMBIA') for the safety of flight during takeoff and landing of military aircrafts. The purpose of flight safety zone is to contribute to the national security by providing necessary measures for the protection of military bases and installations and smooth conduct of military operations. In this case, when the state set and used the flight safety zone, the landowner claimed restitution of unjust enrichment against the country. This article is an analysis based on the existing legal theory regarding the legitimacy of plaintiff's claim, and the summary of the discussion is as follows. A person who without any legal ground derives a benefit from the property or services of another and thereby causes loss to the latter shall be bound to return such benefit (Article 741 of the Civil Act). Since the subject matter is an infringing profit, the defendant must prove that he has a legitimate right to retain the profit. The State reserves the right to use over the land designated as a flight safety zone in accordance with legitimate procedures established by the PMBIA for the safe takeoff and landing of military aircrafts. Therefore, it cannot be said that the State gained an unjust enrichment equivalent to the rent over the land without legal cause. Expropriation, use or restriction of private property from public necessity and compensation therefor shall be governed by Act: provided, that in such a case, just compensation shall be paid (Article 23 (1) of the Constitution of The Republic of KOREA). Since there is not any provision in the PMBIA for loss compensation for the case where a flight safety zone is set over land as in this case, next question would be whether or not it is unconstitutional. Even if it is designated as a flight safety zone and the use and profits of the land are limited, the justification of the purpose of the flight safety zone system, the appropriateness of the means, the minimization of infringement, and the balance of legal interests are still recognized; thus just not having any loss compensation clause does not make the act unconstitutional. In conclusion, plaintiff's claim for loss compensation based on the 'Act on Acquisition of and Compensation for land, etc. for Public Works Projects', which has no provision for loss compensation due to public limits, is unjust.

An Effectiveness Analysis of Landscape Management for the Historic and Cultural Environment Preservation Area of the Pungnammun Gate, Jeonju, by Applying 3D Visual Exposure (3차원 시각노출도를 이용한 전주 풍남문 역사문화환경보존지역의 경관 관리 효과 분석)

  • Lee, Jae-Yong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.2
    • /
    • pp.30-37
    • /
    • 2018
  • The uniformed regulations for control of the height of buildings owned by individuals to protect landscape of cultural properties are causing serious social conflicts by limiting the development of landowners. It is urgent need of introducing indicators that can resolve such conflicts and evaluate the regulations of buildings, which can satisfy urban development as well as landscape management of cultural properties. Therefore, the purpose of this study is to simulate landscape changes according to the Cultural Heritage Protection Act and National Land Planning and Utilization Act by using Unity3D in the Pungnammun Gate(Treasure No. 308) of Jeonju and its surroundings, where architectural cultural property forms the symbolic landscape of the city. Then some items such as view points, target points were introduced and the quantitative evaluation of landscapes was attempted by applying the indicator of 3D Visual Exposure. As a result, the viewing opportunity and viewing area of Pungnammun Gate were not significantly influenced by changes in landscape according to the two laws. However, the change of the height of buildings by the National Land Planning and Utilization Act, which has the greatest development capacity, confirmed the possibility of weakening the identification of the Pungnammun Gate by increasing 3D Visual Exposure of the background buildings more than two times. Finally, it was confirmed that the skyline of Pungnammun Gate was clearly infringed upon development under the National Land Planning and Utilization Act, but the skyline was maintained similar to the current situation in the regulation by the Cultural Heritage Protection Act. Thus, this study is meaningful in that the application of 3D Visual Exposure showed the possibility of utilization as an indicator for quantitatively evaluating the protection of view on cultural property and skyline according to the changes of building heights.