• Title/Summary/Keyword: IT통제

Search Result 2,742, Processing Time 0.032 seconds

The relationships among college students' life stress, self-efficacy, locus of control, and subjective well-being (대학생의 생활스트레스, 자기효능감, 내외통제 및 주관안녕 간의 관계)

  • Kang, HyeJa
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.461-467
    • /
    • 2020
  • The purpose of this paper was to investigate the relationships among college students' life stress, self-efficacy, locus of control, and subjective well-being. A total of 279 college students participated in this study. It was administered a questionnaire consisting of questioned of concerning life stress, self-efficacy, locus of control, and subjective well-being. The correlation analysis and the analysis of mediating effect were conducted on the data. The main results of data analysis showed (1) correlations among life stress, self-efficacy, locus of control, and subjective well-being, (2) significant mediating effect of self-efficacy between life stress and subjective well-being. The direction of a further study was suggested.

Relationship between locus of control and treatment compliance in adult orthodontic patients (성인교정환자의 내외통제소재와 치료협조도에 대한 연구)

  • Lee, Shin-Jae
    • The korean journal of orthodontics
    • /
    • v.32 no.2 s.91
    • /
    • pp.71-78
    • /
    • 2002
  • It could be suggested that adult orthodontic patients may have peculiar psychological features as well as different periodontal tissue conditions compared with adolescent patients. The aims of the present investigation were to explore the relationships between psychological characteristics and treatment compliance of patient to orthodontist and assistants (dental hygienists). Two types of locus of control data (I-score, Internal locus of control score ; E-score, External locus of control score) were obtained for 312 adult patients and 765 adolescents and then analyzed in relation to their sex and treatment compliance. In general, orthodontic patients showed higher I-score trends than ordinary persons and adult patients manifested higher I-score than adolescent patients. Unlike adult patients, female adolescent patients showed higher I-score than male adolescent patients. Adult patients with higher E-score and adolescent patients with higher I-score than their counter-part subgroup were classified into more compliant group. Orthodontist performed more generous decision about patients' compliance than assistants. The results of this study also suggest that psychological survey in orthodontic field could comprise useful diagnostic criteria.

Mechanism of China's Internet Regulation (중국의 인터넷 통제 메커니즘)

  • Kim, Jin Yong
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.61-84
    • /
    • 2013
  • This article examines how the Chinese government blocks the inflow of undesirable information, focusing on the technical aspect of the control mechanism. Unlike Cuba and North Korea, which regulate the whole Internet, China uses both state-of-the-art technological supervision and labor-intensive physical control due to economic reasons in order to prepare for actors who can threaten the Communist party. The Chinese government will not overlook the inflow of information which can be the link between demonstrations and democratization. This is because stronger protests utilizing information technology will trigger the Chinese government's flexible control based on large scale violation and technology. In this article, we first review the concept of universal internet control involved in internet regulation in nations, and then focus on China's internet censorship and its regulatory control from the '90s to the present. Finally, we analyze how the Chinese government actively controls the internet access by utilizing the relationship dynamics between the central and local governments, depending on protest issue. This thesis will assume that it is difficult for China to become democratized due to its information interception, and search how the government manages the internet.

  • PDF

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

Quadruple-Metric Based Command and Control Information Recommendation System (쿼드러플-메트릭 기반 지휘통제 정보 추천 시스템)

  • Park, Gyudong;Kim, Jongmo;Jeon, Hocheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.40-42
    • /
    • 2022
  • Command and control (C2) information is exploding as sensor and network technologies development. In the C2 are a, processing information on time is very important. If it is not possible to process all information on time because of resource limitation, higher priority information should be processed first. For this, recommendation system is available. Because it can select and present information suitable for each user among tons of information in the order of priority. This study extends the triple-metric priority criterion, which is widely used to implement military communication networks, to the quadruple-metric priority criterion, and proposes a C2 information recommendation system based on it, and shows it's feasibility through experiments.

  • PDF

정보 시스템 통제 아키텍처를 이용한 정보자원 관리에 관한 실증적 연구

  • Kim, Jeong-Uk
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.4
    • /
    • pp.29-46
    • /
    • 2000
  • Advent of the distributed computing has contributed to the rapid distribution of information technology throughout the organization. While powerful and user-friendly information technology are more available to end users, managing the distributed, heterogeneous IT environment has become a serious problem for corporate IT managers. Integrated Control Architecture (ICA) enables the monitoring and controlling of the dispersed information resources for effective enterprise-wide information resource management. This paper empirically examines the propositions that the level of information resource control is positively related to IS effectiveness measured in user satisfaction. Measures are developed and validated for the control of information resource object such as data, application, platform, and control of relationships among such objects. Results from a study of 130 organizations support that the organizations with high information resource control exhibit user satisfaction.

  • PDF

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

Risks and Safeguards of the Spywares (스파이웨어의 위험관리에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.305-313
    • /
    • 2005
  • Spyware is any software which employs a user's Internet connection in the background without their knowledge or explicit permission. The installation of spywares is generally done in a sneaky, misleading or unannounced manner. It does not only compromise the security and privacy of affected users but also be an obstruction to the digital convergence and ubiquitous computing environments. This paper provides a summary of the definition, status, risk analysis, and security controls of the spywares. Furthermore, this paper suggests additional controls which should be considered at an individual, organizational and national perspective.

  • PDF

A Study on Improving Security Controls in the Electronic Financial Transaction (전자금융거래 시 보안 통제 사항의 개선 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.881-888
    • /
    • 2015
  • Financial Authorities have added security controls to the Electronic Financial Transaction Act and the Supervisory Regulation according to the recent frequent personal credit information leakages. Accordingly, the security level has been upgraded. But it is necessary to study more security controls to add. This paper deduces 19 security controls over the mean value to be added to the financial area receiving 15 security consultant's help.

The effect of social exclusion on privacy concern and intention to provide personal information: Focused on perceived sense of control (사회적 배제가 프라이버시 염려와 개인정보 제공의도에 미치는 영향: 지각된 통제감을 중심으로)

  • Jeon, Sooji;Jeong, Hyewook
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.151-161
    • /
    • 2021
  • This study has investigated how social exclusion affects privacy concerns and intention to provide personal information. And to examine the moderating effect of perceived sense of control in the process. As a result, it was found that social exclusion increases users' privacy concerns and reduces the intention to provide personal information. In addition, it was verified that the moderating effect of social exclusion on the privacy concerns and intention to provide personal information was significant. In other words, it was proved that sense of control can reduce the influence on privacy concerns and personal information provision intentions due to social exclusion. The results of this research suggest that social exclusion can act as a factor influencing privacy concerns and intention to provide personal information, and that perceived control can reduce the effect of social exclusion. In conclusion, the results of this study suggest that individual psychological factors should be considered as influencing variables in privacy research.