• Title/Summary/Keyword: Information assurance

Search Result 658, Processing Time 0.021 seconds

Semantic Analysis of Information Assurance Concept : A Literature Review (문헌 연구를 통한 정보보증 개념의 구문 분석)

  • Kang, Ji-Won;Choi, Heon-jun;Lee, Hanhee
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.31-40
    • /
    • 2019
  • Today, information security (INFOSEC) as a discipline is gaining more and more importance according to the emergence and extension of the cyberspace. Originated from Joint Doctrine for Information Operation (Joint Pub 3-13) by the U.S. Department of Defense, 'information assurance (IA)' is the concept widely used in the relevant field. Grown from the practice of information security, it encompasses broader and more proactive protection that includes countermeasures and repair, security management throughout an information system (IS)'s life-cycle, and trustworthiness of an IS in the process of risk analysis. In Korea, many industry professionals tend to misunderstand IA, remaining unaware of the conceptual differences between IA and INFOSEC. On this account, the current study attempted to provide a combined definition of IA by reviewing relevant literature. This study showed the validity of the wordings used in the proposed definition phrase by phrase.

A Study on the Quality Assurance of e-Sports Game (e스포츠 게임의 품질 보증에 관한 연구)

  • Jo, Yong-Min;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.237-240
    • /
    • 2018
  • 현재 e스포츠 시장은 게임 산업의 성장과 맞물려 매우 큰 규모로 확대되고 있고, 업종을 불문하고 다양한 국제적인 기업과 스포츠 구단이 진출하고 있는 실정이다. 본 논문에서는 컴퓨팅 관련 산업에 있어서 수요와 공급의 중간 매체의 역할을 하는 품질보증(QA : Quality Assurance)이 게임 산업의 한 분야인 e스포츠 산업을 위해 수행할 역할과 상호작용에 대한 중요성과 필요성을 제시하고자 한다.

  • PDF

A Software Quality Assurance Methodology and a Direction for Its Usage (SQA 활동 지원을 위한 방법론 및 그 활용방향)

  • 김성근;편완주
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.113-130
    • /
    • 2000
  • As software projects become larger and more complex, we need to take a more systematic approach to quality assurance. One plausible approach is the use of SQA (software quality assurance) methodology. Since this SQA methodology was not available, our study presents a SQA methodology. This methodology has a repository in which a set of quality assurance tasks with their related techniques and deliverables is defined and from which one can select only appropriate tasks based upon characteristics of project. This study further suggests a rule-based approach for supporting task selection process.

  • PDF

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)

Interoperability Tests of IFC Property Information for Open BIM based Quality Assurance (개방형 BIM 기반 품질검토를 위한 IFC 속성정보 호환성 테스트)

  • Choi, Jung-Sik;Kim, In-Han
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.2
    • /
    • pp.92-103
    • /
    • 2011
  • The construction industry consists of various and massive architectural information as an architectural process includes a variety of design stages with cooperation of many disciplines. A Building Information Modeling (BIM) serves as a shared knowledge resource for information about a facility forming a reliable basis for decisions during its life-cycle from inception onward. building SMART has developed Industry Foundation Classes (IFC) standard for interoperability of BIM based information. Several software tools are already IFC-compliant. However, there are a lot of problems related to efficient interoperability of software owing to the lack of guide regarding the software usage and insufficiency IFC interfaces of software. The purpose of this study is to suggest efficient IFC support interface development methodologies of existing IFC certified software. The scope of this study is interoperability test for open BIM based quality assurance. To achieve this purpose, the authors have classified subject of open BIM based quality assurance and investigated IFC certification process and certified software. In addition, the authors have exported and imported via IFC files using different IFC interfaces in the software for interoperability of architectural objects and their properties. Finally, the authors have suggested IFC support interface development methodologies and hereafter direction for efficient interoperability of IFC certified software based on open BIM.

Distributing Goods and Information Flow: Factors Influencing Online Purchasing Behavior of Indonesian Consumers

  • MAIDIANA, Karilla;HIDAYAT, Z.
    • Journal of Distribution Science
    • /
    • v.19 no.7
    • /
    • pp.5-17
    • /
    • 2021
  • Purpose: The distribution of goods and the flow of information, determined by consumer behavior toward online shopping, is drastically popular worldwide. This study examines some factors such as brand trust, online sales promotion, consumer personality, delivery service, quality assurance, information search, and online consumer satisfaction influence online shopping behavior. Research design, data, and methodology: A constructed questionnaire in an online survey was conducted with 241 random cluster respondents in the greater Jakarta Area. Structure equation model was utilized to analyze and verify all the data. Results: Research finding indicates online sales promotion, delivery service, quality assurance, and online consumer satisfaction positively influence information search. Meanwhile, brand trust, quality assurance, and information search positively influence online shopping behavior. However, the result illustrates that consumer personality negatively influences both information search and online shopping behavior. Conclusions: To influence online shopping behavior, the most important factors that need to be considered by marketplaces are quality assurance. It positively motivates Indonesia's citizens to collect information and make unplanned purchases. The study finding can be a reference for brands to maintain and build outstanding product quality, an informational website, and an excellent marketing strategy so that customers can meet their expectations. Besides, it also broadens both companies' and individuals' knowledge about the digital revolution on consumer behavior.

An assurance level and product type based evaluation effort model for CC evaluation (CC기반에서 보증수준 및 제품유형을 동시에 고려한 평가업무량 모델)

  • Choi, Sang-Soo;Choi, Seung;Lee, Wan-Seok;Lee, Kang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.25-34
    • /
    • 2004
  • Common Criteria(CC, ISO/IEC 15408) is an international standard for evaluation of Information Suity Systems(ISS). There need a suitable evidence of estimation of evaluation cost in an evaluation facility under the CC-based evaluation and assurance scheme. In this paper, we propose an evaluation effort model, which is based not only on assurance-level but also on product-type of ISS, by means of real experience of real evaluators, use-ratio concept and the Function Point of security function. The model is based not on a real evaluation environment of evaluation facility, but on CC, public PPs and product specific STs. Our result might be used as a basic model for estimation of evaluation cost and time of ISS in an CC-based evaluation and assurance scheme.

Female Customers' Trust on Internet Stores and its Relationships with Service Quality and Loyalty (인터넷 상점에 대한 여성고객의 신뢰와 서비스 품질$\cdot$고객 충성도 간의 관계)

  • Min Dong-Kwon
    • The Journal of Information Systems
    • /
    • v.14 no.2
    • /
    • pp.293-317
    • /
    • 2005
  • Female customers form a major customer group for Internet shopping and their trust on Internet stores seems to be significantly related with their transactions. This paper focuses on female customers' trust on Internet stores, hypothesizing that online service quality has a positive impact on trust and that trust, in turn, together with service quality has a positive effect on loyalty. We investigate trust from three dimensions(benevolence, integrity, and ability) and at the same time, unlike existing research, treat service quality to have five dimensions (intangibles, reliability, responsiveness, assurance, and empathy) as known in SERVQUAL(Parasuraman et al., 1988). Survey data is obtained from the female college student sample. Our research model is justified in terms of construct validity, internal consistency, and goodness of fit. Research hypotheses are tested using SEM(Structural Equation Modeling). The results are as follows: First, assurance and empathy dimensions of service quality have significant impacts on benevolence/integrity dimension of trust. Second, out of the five service quality dimensions, only assurance has a positive effect on ability dimension of trust. Third, assurance dimension of service quality and ability dimension of trust are positively related with customer loyalty. The most important factors for female customers' loyalty are found to be assurance(service quality) and ability(trust). The significance of assurance is in line with findings from existing research. But its relationship with the trust dimensions is uncovered in this research, and the only dimension that impacts on ability is assurance. We find that female customers build trust about internet stores based on their ability rather than on their benevolence/integrity and that the female customers' perception on the internet stores' ability can be improved by higher service quality from the aspect of assurance. Importantly enough, these findings offer practical guidelines to Internet stores to boost female customers' loyalty.

  • PDF

Analysis of Trend Survey on Overseas e-Learning Quality Assurance (해외 이러닝 품질관리 동향 조사 분석)

  • Kim, Ja-Mee;Kim, Chang-Soo;Lee, Won-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.449-458
    • /
    • 2010
  • The e-Learning quality assurance is a part of responsibility for education in latest information age, and should be understood as a basic direction for qualitative enhancement rather than quantifiable expansion. In such a context, this study sought to survey latest trends of e-Learning quality assurance activities deployed around overseas countries, so that it could give possible implications on how to plan and perform e-Learning quality assurance in Korea. So, this study focused on surveying actual conditions, coverage, target and useful indices of e-Learning quality assurance activities deployed by 9 institutions across 5 countries, and characterizing those activities across 5 countries. As a result, this study could find out its implications such as acquisition of various resources available for e-Learning, nationwide consolidation of e-Learning quality assurance activities, development of specialists in e-Learning quality assurance, and choice and focus for e-Learning quality assurance system. In other words, it was found that e-Learning quality assurance should be approached from nationwide standpoint in the interest of better educational quality, rather than from viewpoint of task.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF