• Title/Summary/Keyword: Inforamtion Policy

Search Result 5, Processing Time 0.017 seconds

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

A Study on Development a Model for an Integrated National Management System of Information Services in the Science, Technology and Industry Sectors in Korea (우리나라 과학기술산업 지식정보통합관리시스템의 모형 개발에 관한 연구)

  • 곽동철
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.143-162
    • /
    • 2001
  • The purpose of this study is to develope a model for an integrated national management system of information services in the science, technology and industry sectors by assigning major roles to KISTI which was set up by the merge of KINITI and KORDIC. In order to determine these roles, this study investigates the characteristics and significance of national information services in the science, technology and industry sectors, and analyzes the functions and problems of KISTI and the other information service institutes in Korea.

  • PDF

Development of GIS-based EEZ Policy Making Support System (GIS기반의 배타적 경제수역 정책결정지원시스템 개발)

  • Park, Eun-Ji;Kim, Kye-Hyun;Lee, Chul-Young
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.06a
    • /
    • pp.183-188
    • /
    • 2008
  • 본 연구의 주요 목적은 기존의 연구에서 구축된 배타적 경제수역(EEZ) 해양자원정보시스템(MRIS)을 근간으로 다양한 해양자원의 정보를 효율적으로 표출하고 EEZ 관련 의사지원과 정책결정을 위한 GIS기반의 EEZ 정책결정지원시스템을 개발에 있다. 이를 위하여 기존에 구축된 MRIS를 이용하여 분산되어 관리되던 기존의 데이터와 매년 탐사 과정을 거쳐 추가되는 데이터의 관리를 위한 표준화를 수립하고 관리방안을 확정하였다. 또한, 기존에 개발된 다양한 해양데이터의 표출방안을 이용하여 EEZ 경계획정 협상 및 정책 결정에 있어 실질적 판단근거가 되는 EEZ에 대한 법령과 각국의 정책 및 EEZ 경계획정 사례 등을 데이터베이스화하였다. 나아가 GIS를 이용하여 표출된 공간데이터를 다양한 공간 검색과 공간분석 기능을 이용하여 분석함으로써 과학적인 방법으로 EEZ에 대한 중요정책 결정에도 활용하도록 하였다. 본 시스템을 이용하여 향후 EEZ 내 자원분포 및 지 역 별 경제성 비교와 쟁점지역에 대한 정확한 분석이 가능함에 따라 국가 간 협상에서 우리나라에 보다 유리한 협상결과를 도출하는데 기여가 클 것으로 판단된다. 아울러 주변국과 경계획정에 있어 유리한 협상 결과를 도출하기 위한 제반 정보의 제공과 함께 보다 효율적인 정책 수립을 위한 다양한 의사결정의 지원이 가능할 것으로 사료된다.

  • PDF

A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch (갤럭시 워치를 중심으로 본 스마트워치 활용 기술유출의 위험성 및 대응방안에 대한 연구)

  • Seungjae Jeon;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.893-906
    • /
    • 2023
  • Awareness that smartphones can be used as tools for criminal activity is prevalent in many organizations, but the functionally smartphone-like smartwatch's potential as a criminal tool is being overlooked. Considering this situation, this research verifies the possibility of information leakage through an insider's smartwatch in a situation where smartphones are controlled by security regulations and technologies, but smart watch are not. By analyzing information related application usage and Wi-Fi connection generated in the smartwatch during the verification process, forensic information and limitations are identified. Finally, this research proposes preventive methods to prepare for potential smartwatch-related crimes, and reconsiders awareness of the possibility of using smartwatches as criminal tools.

GIS 데이터구축 감리와 검수 프로그램

  • 조윤숙;박인만;정필구
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2002.03b
    • /
    • pp.11-24
    • /
    • 2002
  • Many GIS systems are not to be trusted becuase many GIS project managers often fail to notice importance of GIS data Construction. With this reason, it is a lively discussion on GIS administration system's adaption. The definition of GIS administration system is not clear, but GIS administration system generally is devided information system administration, audit guideline for the data construction of GIS. Audit guideline for the data construction of GIS. GIS data construction's goals are logical and reasonable action policy of GIS data construction in widespread filed, the other goal is creation of product to the purpose exactly. Audit guideline for the data construction of GIS is composed of optimum of GIS data construction's planning, optimum of GIS data construction's activity, optimum of GIS data quality management, optimum of consultations of GIS data construction, GIS data audit. GIS data audit is the phase of detection product's potential error in each level. GIS data audit is composed of filed examination or filed verification, examination with the naked eye, screen verification, program verification, auto verification. GIS information system's efficiency is linked with auto verification system's function variety, accuracy. this paper offer introduction of Audit guideline for the data construction of GIS, efficient auto verification program

  • PDF