• Title/Summary/Keyword: Human Resource Security

Search Result 120, Processing Time 0.026 seconds

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

A Knowledge Workers Acquisition Problem under Expanding and Volatile Demand: An Application of the Korean Information Security Service Industry

  • Park, Hyun-Min;Lim, Dae-Eun;Kim, Tae-Sung;Kim, Kil-Hwan;Kim, Soo-Hyun
    • Management Science and Financial Engineering
    • /
    • v.17 no.1
    • /
    • pp.45-63
    • /
    • 2011
  • The aim of this paper is to consider the process of supplying trained workers with knowledge and skills for upcoming business opportunities and the process of training apprentices to be prepared to meet future demands in an IT service firm. As the demand for new workers fluctuates, a firm should employ a buffer workforce such as apprentices or interns. However, as a result of rapid business development, the capacity of the buffer may be exceeded, thus requiring the company to recruit skilled workers from outside the firm. Therefore, it is important for a firm to map out a strategy for manpower planning so as to fulfill the demands of new business and minimize the operation costs related to training apprentices and recruiting experienced workers. First, this paper analyzes the supply and demand of workers for the IT service in a knowledge-intensive field. It then presents optimal human resource planning strategies via the familiar method of stochastic process. Also, we illustrate that our model is applied to the human resource planning of an information security service firm in South Korea.

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

CSR and Governance Principles in Business Administration According to Deans of BA Schools Perspective: BA of Northern Border University as Case Study

  • AL-Ajlouni, Mahmoud Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.219-222
    • /
    • 2021
  • The study shed the light on the information required by Governance Principles and Corporate Social Responsibilities of human resources department from the point deans' perspectives of BA colleges during the discussion the publication of studies that academic members earlier submitted in many journals as authors of similar studies talking about business schools and CSR in Saudi Arabia universities. The study sample was the deans of business schools in northern border university and interviews were used to collect data. Findings showed that CSR in business colleges within an integrated set of research products in the human resource that he owns, support the mechanisms of social services from a purposeful pioneering and creative perspective. In addition, the success of business administration colleges in preparing these cadres depends on the college's senior leadership represented by its dean and its administrative policy to motivate academic staff and students to develop the CSR and governance.

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

A Study on the Improvement Plan of ROK Army's ROTC System in the Aspect of Strategic Human Resource Management -Focusing on the Organizational Structure and Operation System- (전략적 인적자원관리 측면의 육군 ROTC 제도 개선방안 연구 - 조직편성 및 운영체계를 중심으로 -)

  • Myung-Lyul Kim;Choong-Kwan Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.141-148
    • /
    • 2022
  • Korea's ROTC system was introduced from the United States in 1961 to recruit competent primary grade officers and secure reserve forces in peacetime. However, entering the 2000s, it was faced with a serious crisis, which was a decrease of the application rate due to the change in the acquisition environment including the decrease in school-age population and military service resources due to the low fertility, and the shortened period of military service. Therefore, this study tried to suggest a ROTC system improvement plan focusing on the organizational structure and operation system by analyzing the change in the acquisition environment and the cause of decrease in the application rate. As a research method, a comparative method between the cases of the ROTC systems in the US and Korea was applied through domestic and foreign literature studies. In terms of theory, Strategic Human Resource Management, which is applied to corporate management to achieve organizational performance and secure comparative competitive advantage in a knowledge-based society, was used as a theoretical criterion.

Value Chain Analysis on Business Difficulties of Information Security Industry (가치사슬분석을 통한 지식정보보안산업의 애로사항 분석)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.229-245
    • /
    • 2013
  • The information security industry market is sluggish despite high expectation for its growth, and thus policies are required to define the causes and to address these issues. The policy formulation requires various historical market and human resource data for analyzing the industry, which cannot be guaranteed secured. This study executed face-to-face in-depth interviews with the frontline businesses in order to gather live opinions and to analyze industry's value chain, problems, and difficulties with a view to defining policy tasks for the development of the industry. The findings of the study revealed the current technical level of the information security industry, the frontline difficulty, and industrial ecosystem status. Based on these findings, the industry revitalization policy was devised and proposed. Objectives of the policy included the fostering of capacity to conceptualize, plan, and design industrial strategies based on the analysis of the industry's value chain and ecosystem, the expansion of the industry's value-added through the enhanced securing and management of the Intellectual Property Rights (IPR), and the nurturing of the security Human Resources (HR) in line with the industrial demand.

A Study on Efficient Human Resource Management Methodology Design for Human-centered Security Management System Implementation in IoT Environment (IoT환경에서 인간중심 보안관리체계 구축을 위한 효율적 인적자원관리 방법론 설계 연구)

  • Ryu, Bora;Lee, Hyojik;Na, Onechul;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.428-430
    • /
    • 2015
  • 보안은 오직 기술을 관리하는 것이 아닌 사람관리, 조직관리, 경영관리이다. 그 중에서도 인적자원은 모든 산업에서 가장 중요한 자원임과 동시에 보안의 측면에서 볼 때 가장 통제해야 하는 존재이다. 이는 산업보안에서 가장 큰 이슈인 산업기술 기밀 유출이 주로 전 현직 임직원 및 협력업체 직원 등 인적자원을 통했기 때문이다. 미래 산업의 중심이 될 IoT환경에서는 산업기술이 핵심자산이므로 이에 더 주목해야 할 필요가 있다. 이처럼 인적자원에 대한 통제와 관리가 산업보안에서 중요한 의미를 갖는 것에 비해 기존의 보안관리체계의 통제항목은 대부분 IT적인 부분에 치중되어있다. 또한, 체계적인 운영이 부족하고, 산업스파이, 정보절취 등 다양한 위험요소가 존재한다. 특히, 인적자원은 완벽한 예측이 불가능하므로 위험을 최소화하는 방법을 고안해 대는 것에 유념하여 IoT환경에서의 인간중심적인 보안관리체계 구축해야한다. 이를 위해 기존의 정보보호 관리체계 분석을 통하여, 기존의 인적보안 지침들의 적합성을 따져 우선순위를 적용하여 효율적인 인적자원관리 방법론을 설계하였다. 본 연구결과는 보유자원을 가장 효율적으로 활용하여, 그 조직에 적합한 보안체계를 구축하는데 도움이 될 것으로 기대된다.

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.