• Title/Summary/Keyword: Information security industry

Search Result 973, Processing Time 0.025 seconds

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Security Analysis on Commercial Online Music Streaming Service and Countermeasures (국내 포털사이트 음원서비스 취약점분석 및 대응방안 제안)

  • Lee, Sang-Sik;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.681-690
    • /
    • 2009
  • Nowadays, the music industry is moving from analog to digital. Most of the big portal sites provide commercial online music streaming services according to the tendency. In this paper, we analyze the security of the Korean commercial online music streaming services which are provide by the Korea's major portal sites(Dosirak, Cyworld, and Naver). Moreover, we show attacks on commercial online music streaming services that lead to an infringement of copyright and propose technical countermeasures for online commercial music streaming services, the contributions of the present work are that the measures protect the copyright of the music.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Difference of Risk Management between Foreign and Domestic ERP : Empirical Approach with Korean Small & Medium-Sized Logistics Firms (외산 ERP와 국산 ERP를 도입한 국내 중소 물류기업간의 위험 관리 비교 연구)

  • Kim, Taeha;Nam, Seunghyeon
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.119-130
    • /
    • 2020
  • This work investigates how domestic or foreign ERP affects the relationship between risks associated ERP implementation and intention to adopt risk-mitigating options. We propose three risks such as ERP vendor risk, economic risk, and security risk should affect positively the intention to adopt the risk-mitigating options. To validate the impact of risks and to examine the difference between domestic and foreign ERP, we collected data from IT managers in small and medium sized logistics companies in South Korea using survey questionnaires. We validate the difference between domestic ERP and foreign ERP using multiple regression analyses. We find that IT managers using domestic ERP are willing to adopt risk-mitigating options for economic and security risk. In contrast, we find that IT managers using foreign ERP are willing to adopt risk-mitigating options for ERP-vendor risk. This work may provide IT managers in logistics industry a practical guideline of choosing either domestic or foreign ERP based on their risk preferences.

A study on DVB-SI based additional information transmission method of data service linked with movie information TV program (영화정보 프로그램 연동형 데이터서비스의 DVB-SI 기반 부가정보 전송 방법에 관한 연구)

  • Kwangilm KO
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Because the movie has the characteristics of a cultural product where experience is important, a promotional strategy is used to convert viewers into movie audiences by providing indirect experiences of movies through professional movie information programs. Considering that the movie information program is a strategic publicity medium that raises the audience's intention to watch a movie, a study on the data service that provides useful additional information to the viewer in conjunction with the movie information program is meaningful. Against this background, this study contains the core research contents in the development of data service linked with movie information program. Specifically, additional information of the movie information program was defined. And to provide the additional information to the data service, the digital broadcasting international standard DVB-SI-based additional information transmission method was devised.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Item Goodness-of-Fit of Psychological Empowerment Scale in Private Security Guards (시큐리티 요원의 심리적 임파워먼트 척도의 문항 적합도)

  • Kim, Eui-Young;Kim, Sae-Hyung;Lee, Jun-Woo
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.25-45
    • /
    • 2012
  • Based on the results of preceding researches that the uncertainty perceived by the private security guards about their roles exerts direct effects on the business performance of the security industry, it needs to preferentially examine the degree of authority that the private security guards have. The suitability of the psychological empowerment criteria for measuring this for private security guards, however, has not yet been established up to the present, so it can be said that the validity of the information has not yet been established. Accordingly, as the psychological empowerment criteria of private security guards, this research examined the suitability of items, reliability of items, the level of difficulty of items, and the item goodness of fit from the viewpoint of the appropriateness of category of responses, and it is summarized as follows. First, in the self-determinism factor of the psychological empowerment criteria, Item 11 was found to be an unsuitable item, so it is proper that Item 11 should be deleted when examining the psychological empowerment of private security guards from now on. Second, the item reliability of the psychological empowerment criteria was high, so the consistency of the results is shown even if the data are collected from the other private security guards. Third, they feel that it is hard to respond to Item 12 while they perceive that Item 1 is the easiest, and the level of items of the psychological empowerment criteria is evenly distributed. Fourth, it was established that the 5-point categories of the psychological empowerment criteria were suitable to the private security guards.

  • PDF

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

An Estimation Process of Effort and Cost in Security Evaluation of Information Technology Security Systems by utilizing Evaluation Work Break-down Structure (EWBS를 통한 정보보호 시스템의 보안성 평가 업무량 및 비용 산정 프로세스)

  • You, Hyung-Joon;Ko, Jeong-Ho;Chang, Soo-Jin;Ahn, Sun-Suk;Lee, Gang-Soo;Jung, Hong-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.134-147
    • /
    • 2000
  • Even though software industry has been activated, there lack in results of studies on evaluation effort and cost of software systems including Information Technology Security System (ITSS). In this paper, we present a process and a tool for evaluation effort and cost of ITSS, which are conformed to a ITSS evaluation criteria(i. e., Common Criteria or ISO/IEC 15408), by utilizing Evaluation Work Break-down Structure (EWBS) and conventional software development cost estimation methods. Even though we concentrate on ITSS, results of this paper can be applied to estimation of effort and cost of evaluation of software development process and software products.

  • PDF

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.