• Title/Summary/Keyword: Information policy

Search Result 10,247, Processing Time 0.037 seconds

A Study of Promotion of Public Policy Information Services: Focusing on a Model of a Specialized Educational Policy Information Center (정책정보서비스의 활성화 방안 연구 - 교육정책정보전문센터의 모형 제시를 중심으로 -)

  • Lee, Myeong-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.139-160
    • /
    • 2013
  • Ten Web sites from educational policy authorities, educational research institutions, professional educational, and national libraries that provide educational policy information services are investigated using content analysis method. They are analyzed using various types of information sources, classification schemes, and functions of information retrieval. Standardization of classification scheme of educational policy information, standardization of meta data items, improvement of retrieval systems, provision of personalized information services to educational policy authorities, operation of specialized policy information centers, and cooperation among professional institutions are suggested. A model of a specialized educational policy information center is proposed.

A Study on Policy Researchers' Requirements for Policy Information Providing Service (정책정보제공서비스에 대한 정책연구자 요구분석에 관한 연구)

  • Noh, Younghee;Sim, Jae-Yun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.3
    • /
    • pp.137-168
    • /
    • 2014
  • This study proposed to seek the future development direction of policy information service in Korea by identifying users' needs for policy information and analyzing policy information users' behavior. For this purpose, we analyzed policy information users' needs and behavior through survey and interview methods, and the results are as follows. First, the most common purpose of policy information use was figuring out policy trends, and the Internet was the most common search method used in investigating policy information. Second, electronic resources showed a high rate of use, but the domestic material utilization ratio was higher, and the U.S. resources usage of overseas data was the highest. Third, users most often used materials produced within the last 2-5 years, and Web DB (journals, academic articles, etc.) and reports were the most used material types. Fourth, in the survey of opinion about methods for improving policy information utilization efficiency, cooperation between government agencies' libraries, cooperation between agencies producing the policy information resources, and the overall national collection of policy information were rated the highest.

A Study on Possible Ways to Improve Policy Information Services and Demand Survey Analysis (정책정보서비스에 대한 수요조사 분석 및 개선방안 제안에 관한 연구)

  • Hong, Hyun-Jin;Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.2
    • /
    • pp.69-97
    • /
    • 2008
  • Policy information is very valuable around the nation in its aspects of uniqueness, perofessionalism and specificity, so it has great significances to individual citizens. Therefore, it is necessary to prepare systematic instruments for anyone to have easy access to policy information owned by government and administrative institutions. And particularly, it is so impending to develop efficient policy information service(PIS) system. Indeed, however, Korea doesn't have yet established any policy or system to make policy information available on bloc to citizens. Thus, the purpose of this study is to conduct a survey to analyze actual profile of Korean policy information circulating institutions, and is also to analyze needs for domestic circulation of policy information, so that it can seek possible ways to consolidate domestic scattered policy information into a nationwide information system to improve national policy information infrastructure of Korea.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

A Study on the Improvement of the BRM Classification System for Policy Information Service (정책정보제공서비스를 위한 BRM분류체계 개선에 관한 연구)

  • Noh, Younghee;Park, Yang-Ha
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.135-171
    • /
    • 2014
  • The aim of this study was to suggest a classification system adapted to provide policy information services. For this purpose, this study completed the following processes; BRM taxonomy analysis, document analysis, analysis of classification systems providing policy information, consulting classification experts, surveys and interviews with policy information consumers, and an empirical validation process through the actual construction of policy information materials. Finally, this study complemented and modified the BRM taxonomy system and proposed a classification system appropriate to policy information resources. Through the procedures of experts discussion, the steps of BRM analysis appropriate to provide policy information services is determined as three steps. The domestic institute websites for policy information services has confirmed the appropriateness of the BRM taxonomy system through the analysis system and service research to provide policy information resources. Also through the specialist interview, the confirmation of BRM and the improvement has been drawn. Through the questionaires, the study analyzes the appropriateness of available BRM taxonomy system and the requirements by subjects. And through the empirical verificaion, it determines the subject of BRM taxonomy system for policy information services.

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

A Study on the Status and Improvement Direction of Korea SMEs Policy Information System (우리나라 중소기업 정책정보시스템의 현황 및 개선 방향에 관한 연구)

  • Kim, Ju-Mi
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.61-86
    • /
    • 2008
  • Korea 5MBA(Small and Medium Business Administration) is operating SMEs Policy Information System called SPi-1357 as a part of electronic government business, G4B. SPi-1357 system is offering tailor made policy information to a nation through on-off line system. In this paper, I provide the offering status of policy information, the status of SPi-1357 system, political results of SPi-1357 system, comparison with other country's policy information system, and the development direction of SPi-1357 system. Until now, most Policy Information Systems documents have focused on policy maker but the focus of this paper is functionally oriented SMEs.

A Study on Development of Policy Attributes Taxonomy for Data-based Decision Making (데이터기반 의사결정을 위한 정책 및 사업 속성 분류체계 개발 연구)

  • Kim, Sarang
    • The Journal of Information Systems
    • /
    • v.29 no.3
    • /
    • pp.1-34
    • /
    • 2020
  • Purpose Due to the complexity of policy environment in modern society, it is accepted as common basics of policy design to mix up a variety of policy instruments aiming the multiple functions. However, under the current situation of written-down policy specification, not only the public officers but also the policy researchers cannot easily grasp such frameworks as policy portfolio. The purpose of this study is to develop "Policy Attributes Taxonomy" identifying and classifying the public programs to help making decisions for allocative efficiency with effectiveness-based information. Design/methodology/approach To figure out the main scheme and classification criteria of Policy Attributes Taxonomy which represents characteristics of public policies, previous theories and researches on policy components were explored. In addition, to test taxonomic feasibility of certain information system, a set of "Feasibility Standards" was drawn from "requirements for well-organized criteria" of eminent taxonomy literatures. Finally, current government classification system in the area of social service was tested to visualize the application of Taxonomy and Standards. Findings Program Taxonomy Schemes were set including "policy goals", "policy targets", "policy tools", "logical relation" and "delivery system". Each program and project could be condensed into these attributes, making their design more easily distinguishable. Policy portfolio could be readily made out by extracting certain characteristics according to this scheme. Moreover, this taxonomy could be used for rearrangement of present "Program Budget System" or estimation of "Basic Income".

Analysis of Donation Demand for Expansion of National Policy Information Collection: Focused on National Association for Policy Information (국가 정책정보 수집력 확대를 위한 기증수요 분석 - 국가정책정보협의회 회원기관을 중심으로 -)

  • Yoon, Hee-Yoon;Oh, Seon-Kyung;Kim, Sin-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.4
    • /
    • pp.5-26
    • /
    • 2018
  • The National Library of Korea, Sejong is a subject branch of the National Library of Korea, which is centered on policy information for governments and related research institutes. Therefore the strategic orientation of the NLKS to establish the essential identity and to enhance it's capacity is to collect and preserve policy information both domestic and abroad. In order to strengthen the capacity of the NLKS as a national conservation center of policy information, we surveyed and analyzed the perception of the operation and policy information services of the National Association for Policy Information and intention of policy information bulk donations of the member institutions, which are the producers and consumers of policy information. And based on the results, we suggested ways to strengthen the policy collection ability of NLKS.

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy (정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로)

  • Oh, Jinwouk;Baek, Seung Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.