• Title/Summary/Keyword: Information Security Confidence

Search Result 83, Processing Time 0.026 seconds

Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments

  • Zheng He;Kwak Jin;Son Kyung-Ho;Lee Wan-Suk;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.329-333
    • /
    • 2006
  • New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blond nicely into ubiquitous computing environments.

  • PDF

Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness (금융회사의 정보보호활동이 정보보호의식 및 정보보호자신감에 미치는 영향 : 정보보호의식의 매개효과를 중심으로)

  • Soh, Hyeon-Chul;Kim, Jong Keun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.45-64
    • /
    • 2017
  • The Purpose of this Study is to find out the Implications of the Information Security Activities of Financial Companies on the Confidence of the Information Security Officers and to find Academic and Practical Implications to Supplement the Insufficiencies. As a Result, it was Confirmed that the Information Security Officer's Confidence in Information Security for Companies and the Level of Information Security Awareness of the Employees are Increased when Financial Companies Conduct Information Protection Activities Focusing on Information Security Education, Security Incident Responses and In/Out Security.

Research on the Importance of Security and Personal Information in Mobile Commerce (모바일커머스에서 보안과 개인정보의 중요성에 대한 연구)

  • Lee, Chan-Hee;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.913-921
    • /
    • 2017
  • Mobile electronic commerce is rapidly growing up on the strength of popularization of smart devices such as smart phone followed by internet user increase. Concurrently with this, the anxiety on information security and personal information leakage of the user of mobile electronic commerce significantly built up in recent. In this respect, the information security and personal information protection should be become aware of their importance for the sustainable expansion and development of mobile commerce. Based on the demands as mentioned, this study analyzed the effects of the awareness of personal information security on recognized risk, recognized confidence and intent to use. The result of this study indicates that information security and personal information protection contribute to improvement in confidence by decreasing anxiety and uncertainty related to mobile commerce. Reduction of anxiety and uncertainty implies a crucial point that affects psychological mechanism making intent to use higher.

A Study of the Factors Influencing on the Intention to Use Fintech (핀테크 사용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Eun Jung;Kim, Joo Hyun;Kim, Jong Weon
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.75-91
    • /
    • 2017
  • Purpose Fintech has been recently drawing extensive attention all over the world as the innovative trend that will change the future of the global financial industry. However, fintech has been mostly focusing on the payment service in the embryonic stage in Korea. This paper will investigate the approach to increase the intention to use for those who do not use fintech at present. Design/methodology/approach This paper empirically analyzes the impact of innovation of users and the perceived ease-of-use and security on the intention to use through the perceived usefulness and confidence. The 255 survey responses were used to verify research hypotheses through covariate structural equation model. Findings According to the analysis results, it was found that innovation had a significant impact on the perceived usefulness, but had no significant impact on confidence. The perceived usefulness had a significant impact on perceived usefulness and confidence. Moreover, the perceived usefulness and confidence had a significant impact on the intention to use. Meanwhile, it was identified that the security perceived by those who do not use fintech had a negative impact on perceived usefulness, confidence, and intention to use related to fintech. Accordingly, fintech service providers need to determine an approach to help customers to have a positive perception on the security of fintech.

A Study on Awareness of Information Security Influencing Trustness (정보보안 인식이 신뢰 형성에 미치는 연구)

  • Jeong, Jaehun;Choi, Myeonggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1225-1233
    • /
    • 2015
  • This study investigates the effects of information security awareness arising from E-Commerce in terms of the Elaboration Likelihood Model(ELM) and analyzes the moderating effect of the trust's involvement and experience. Consumers are using E-Commerce Web sites, depending on the level of involvement and experience in E-Commerce. This study is based on the ELM, the information security awareness of consumer confidence in E-Commerce form, according to the degree of experience and involvement suggested a theoretical model to describe the effect that the scaling and, through empirical studies validation of model. Consumer confidence is formed the attitude of the E-Commerce company through different paths, depending on the type of awareness in the E-Commerce web site, this moderate has the effect of consumer involvement and experience. Studying the information security awareness of consumer in the on E-Commerce is considered to present a new perspective on trust.

Security-Based Intranet Structure

  • Lee, S. M.;Lee, P. J.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.265-273
    • /
    • 1997
  • Intranet is an enterprise network using Internet protocols as communication standard and HTML as content standard. The Internet is like a house built on information water. It has a lot of strong points as a future enterprise network. However, companies wish to have confidence in its functional and economic effectiveness and security before adopting it. The security issue especially is a problem to solve inevitably. Enterprises will hold back to adopt Intranet unless there are enough security counter plans and countermeasures against vulnerabilities of Intranet(it is the wise decision !). Nevertheless the researches related to Intranet has been concentrated on techniques for building it. In this paper, we focus the security aspect of Intranet. Intranet security must be considered on the whole from structure design to users' services. We propose a security-based Intranet structure and security management system.

  • PDF

A Study on the Qualitative Improvement of Private Security Industrial (민간경호업의 질적 발전 방안에 관한 연구)

  • Song, Sang-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.113-127
    • /
    • 2006
  • The suggestions that follow are about the Qualitative Improvement of private security Industrial. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develope the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF

Development of Security System in the OSI Transport Layer (OSI 트랜스포트 계층에서의 보호시스템 개발)

  • Park, Young-Ho;Kim, Ki-Hyun;Moon, Sang-Jae;Gang, Shin-Gak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.65-84
    • /
    • 1995
  • The information security is needed to guarantee the safety and the confidence to users in open system. This paper analyzes transport layer security protocol and security association protocol, which are standards proposed by ISO/IEC, to provide a security service in the transport layer and particulars, not in the standard, are defined for development. And this paper suggests a development model and develps security system based upon the suggested model. The ONP of USL is used as the development environment.

The design and implementation of security kernel assured trusted path (신뢰경로가 보장되는 보안커널 설계 및 구현)

  • 이해균;김재명;조인준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.340-347
    • /
    • 2001
  • Security operating system applied to MAC(Mandatory Access Control) or to MLS(Multi Level Security) gives both subject and object both Security Level and value of Category, and it restrict access to object from subject. But it violates Security policy of system and could be a circulated course of illegal information. This is correctly IPC(Interprocess Communication)mechanism and Covert Channel. In this thesis, I tried to design and implementation as OS kernel in order not only to give confidence of information circulation in the Security system, but also to defend from Covert Channel by Storage and IPC mechanism used as a circulated course of illegal information. For removing a illegal information flow by IPC mechanism. I applied IPC mechanism to MLS Security policy, and I made Storage Covert Channel analyze system call Spec. and than distinguish Storage Covert Channel. By appling auditing and delaying, I dealt with making low bandwidth.

  • PDF

ASSESSING AND ADDRESSING INCREASED STAKEHOLDER AND OPERATOR INFORMATION NEEDS IN NUCLEAR FUEL CYCLE FACILITIES: TWO CONCEPTS

  • Saltiel, David H.
    • Nuclear Engineering and Technology
    • /
    • v.39 no.6
    • /
    • pp.691-696
    • /
    • 2007
  • Nuclear energy programs around the world increasingly find themselves at the nexus of potentially conflicting demands from both domestic and international stakeholders. On one side, the rapid growth in demand for electricity coupled with the goal of reducing carbon emissions calls for a significant expansion of nuclear energy. On the other, stakeholders are seeking ever greater safety, environmental, security, and nonproliferation assurances before consenting to the construction of new nuclear energy facilities. Satisfying the demand for clean energy supplies will require nuclear energy operators to find new and innovative ways to build confidence among stakeholders. This paper discusses two related concepts which can contribute to meeting the needs of key stakeholders in cost effective and efficient ways. Structured processes and tools for assessing stakeholder needs can build trust and confidence while facilitating the "designing-in" of information collection systems for new facilities to achieve maximum efficiency and effectiveness. Integrated approaches to monitoring facilities and managing the resulting data can provide stakeholders with continued confidence while offering operators additional facility and process information to improve performance.