• Title/Summary/Keyword: National Informatization Agency

Search Result 318, Processing Time 0.016 seconds

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

Difference of Privacy Paradox on Open and Closed SNS (개방형 및 폐쇄형 SNS에서 프라이버시 역설의 차이)

  • Shin, Il-Soon
    • Informatization Policy
    • /
    • v.27 no.1
    • /
    • pp.72-91
    • /
    • 2020
  • In this study, we classified SNS into open and closed types, and empirically examined in which SNS activity the privacy paradox holds. The idea comes from the argument that privacy paradox may be observed differently in the open SNS, which is more vulnerable to the leakage of personal information due to public profiles, and the closed SNS, which is relatively less vulnerable by limiting the range of acquaintances, The results of the empirical analysis are as follows. First, in case of SNS usage, the privacy paradox holds in the overall SNS activities, but different conclusions are drawn according to open and closed SNS. In particular, it is found that as privacy concerns increase, individuals respond in a reasonable and desirable way to reduce SNS activity in the open SNS, which is more susceptible to infringement. Second, in the case of SNS activity intensity, (i) heavy users are more seriously aware of the probability of privacy infringement than light users, so there is a reasonable response to reducing the intensive margin with increasing privacy concerns, and (ii) this tendency is more clearly observed in open SNS, which is more vulnerable to privacy infringement. Accordingly, insisting that the privacy paradox is empirically established by observing only the overall SNS activities without distinguishing them into open and closed SNS may be interpreted as a "Fallacy of Composition."

The Mediating Effect and Moderating Effect of Pseudonymized Information Combination in the Relationship Between Regulation Factors of Personal Information and Big Data Utilization (개인정보 규제요인과 빅데이터 활용간의 관계에서 가명정보 결합의 매개효과 및 조절효과)

  • Kim, Sang-Gwang
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.82-111
    • /
    • 2020
  • Recently, increasing use of big data have caused regulation factors of personal information and combination of pseudonymized information to emerge as key policy measures. Therefore, this study empirically analyzed the mediating effect and moderating effect of pseudonymized information combination as the third variable in the relationship between regulation factors of personal information and big data utilization. The analysis showed the following results: First, among personal information regulation factors, definition regulation, consent regulation, supervisory authority regulation, and punishment intensity regulation showed a positive(+) relationship with the big data utilization, while among pseudonymized information combination factors, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination were also found to be in a positive relationship with the use of big data. Second, among the factors of pseudonymized information combination, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination showed a positive(+) mediating effect in relation to regulation factors of personal information and big data utilization. Third, in the relationship between personal information regulation factors and big data utilization, the moderating effect hypothesis that each combination institution type of pseudonymized information (free-type, intermediary-type, and designated-type) would play a different role as a moderator was rejected. Based on the results of the empirical research, policy alternatives of 'Good Regulation' were proposed, which would maintain balance between protection of personal information and big data utilization.

North Korean Defectors' Adaptation to South Korean Society: Their Emotional States, Social Media Use, and Life Satisfaction (북한이탈주민의 사회적응: 정서적 상태, 소셜 미디어 이용 그리고 남한생활 만족도)

  • Min, Hee
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.67-83
    • /
    • 2018
  • This study explores how social media influences individual's social development and well-being. Social media is discussed as an effective tool when individuals lacking social and psychological resources are trying to expand their social networks. This study focuses on the social media use of North Korean defectors, who, in general, have closed social media networks in the South Korean society. This study tries to analyze empirically the effect of social media use on North Korean defectors' satisfaction with our society. In particular, this study focuses on how the use of social media influences satisfaction with their life in South Korea at different levels of their emotional states. This study explores that the relationship between social media and satisfaction with their life in South Korea varies based upon the degree of self-esteem and anxiety. This study expects that social media might provide greater benefits for those who are experiencing low self-esteem and high anxiety. In addition, this study conducts the same analysis for the general public and then compares its results with the survey on North Korean defectors. According to the results of North Korean defectors' survey, the impact of social media use on satisfaction with their life in South Korea was greater for those with high anxiety than for those with low anxiety. Meanwhile, the impact was greater for those with high self-esteem than for those with low self-esteem.

A Study on the Infusion of Public Administrative Information Systems: Focusing on the Social Security Information System (공공행정 정보시스템의 내재화에 관한 연구: 사회보장정보시스템을 중심으로)

  • Park, Sun-Mi;Hwang, K.T.
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.46-66
    • /
    • 2018
  • This research explores the factors affecting infusion of public administrative information systems(IS) and analyzes its impact on work performance. For this purpose, the factors affecting the infusion of IS are classified into voluntary and involuntary motivations based on the self-determination theory that explains individual motivations. As factors for voluntary motivation, performance expectancy, personal innovativeness, and organizational citizenship behavior are proposed, while government influence, competitor influence, and the top-level management influence are proposed as factors for involuntary motivation. The analysis shows the voluntary motivation factors-performance expectancy, personal innovativeness, and organizational citizenship behavior-do affect infusion of IS, whereas the involuntary motivation factors-government influence, competitor influence, and the top-level management influence-have no statistically significant impact on the infusion of IS. The relationship between infusion of IS and work performance is found significant. While individuals are unable to decide on the adoption of IS in an involuntary environment such as in the case of using the public administrative IS, the results show that the factors related to individual autonomy have an important role in extended, active usage of IS beyond the mandatory level.

An Analysis of Factors Influencing the Intention to Use Social Network Services (소셜 네트워크 서비스의 사용의도에 영향을 미치는 요인)

  • Kim, Jongki;Kim, Jinsung
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.25-49
    • /
    • 2011
  • As a way to gather diverse information required for everyday living, the importance of social networks has been growing. Social network services have been spreading rapidly because of diffusion of the Internet, evolution of social network sites, and recognition of the importance of social networks. Recently, the social network service has been evolved based on a new paradigm, Web 2.0, pursuing participation and openness. Following the adoption of Web 2.0 technologies, the social network service allows users to make and maintain new relationships in a more convenient way. Users of the social network service tend to reveal their personal information, and share their ideas and content with other people; in the process they become aware of their existence, feel satisfaction with life and exert influence to others as a member of the society. This study uses higher order factor analysis to analyze factors that affect the intention of using the social network service. A research model was developed with second-order factors including perceived social presence, perceived gratification and perceived social influence. First-order factors are grouped by technical, individual and social factors. Smart PLS 2.0 was used to conduct empirical analysis. The analysis results supported the validity of the research model.

  • PDF

A Study on the Development of an Assessment Framework for Smart Work Readiness (스마트워크 적합성 평가 프레임워크 개발에 관한 연구)

  • Lee, Jungwoo;Lee, Hyejung;Lee, Seyoon
    • Informatization Policy
    • /
    • v.20 no.2
    • /
    • pp.60-72
    • /
    • 2013
  • Rapid development of information and communication technologies leads firms to take 'smart work' into serious consideration as a new way of working in coming knowledge and information society. However, some jobs may be fit for smart work while some may be not. A $2{\times}2$ framework for smart work readiness assessment is developed in this study through the review of extant literature and a series of focus group activities. Two critical dimensions of smart work are derived and presented as a result: smartness (knowledge versus data) and mobility (mobile versus static). Knowledge intensive jobs with possible mobility seem to be the target group that can be easily converted to smart work while mobile workers with interactive data processing devices seem to be already doing smart work. As mobility is a critical presumption for work to be flexible in terms of time and place, jobs with no mobility are assessed here as not ready for smart work at least at present. This framework is experimentally applied against the published job statistics 2011 in Korea, and used to estimate the number of workers ready for smart work. As a conclusion, discussions on policy implications and further research issues are made at the end.

  • PDF

A study on Ability and Utilization of Smart Devices for the Disabled: Focusing on the Effect of Education for Smart Device Utilization (장애인의 스마트기기 사용능력 및 활용도에 관한 연구 - 스마트기기 활용교육의 효과를 중심으로 -)

  • Song, Jihyang;Kim, Dongwook
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.67-88
    • /
    • 2014
  • The research hypothesis of this paper is that education for smart device utilization has a positive effect on ability and utilization of smart devices for the disabled. The data for disabled of NIA's 2012 survey about digital divide is used, and the research method is "Heckman's 2-stage method" which considers the problem of selection bias. As a research result, this paper says that the disabled who had experience of education for smart device utilization have higher level of ability and utilization of smart devices. Also, a high level of education and family income, professional career and young generation have been very positive effect on the high level of ability and utilization of the disabled. The level of ability and utilization of the blind tend to be lower than those of the physically disabled. These results remind that the education for smart device utilization for the disabled is important and effective. And various contents and methods of education which are appropriate for the disability types should be developed.

A Prepaid System Promotion Policy for the 3G MVNO - Carrier Selection, Interconnection, Number Portability, Prepay, Wholesale Provision - (3G MVNO를 통한 선불요금제 활성화 정책 - 선불요금, 상호접속, 사업자선택, 도매제공 및 번호이동 -)

  • Kim, Byung-Woon
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.88-107
    • /
    • 2011
  • This paper proposes a prepaid system promotion policy for the 3G(WCDMA) MVNO with regard to the newly included paragraphs 3, 4 and 5 of Article 32 (User Protection) and Article 38 (Provision of Wholesale Telecommunications Services) of the Telecommunication Business Act, which was revised on March 22, 2010. As of June 2011, there are only a few prepaid system subscribers to the mobile communications service due to various limitations, including prepay, interconnection, carrier selection, the MVNO policy, and number portability. However, overseas communications service regulatory agencies and service providers are increasingly presenting policies and strategies for mobile prepaid plans, in order to accommodate the various customer demands that are increasing the use of smart phones and data. This paper advances various proposals concerning promotion of the prepaid system by the 3G MVNO under the current Telecommunication Business Act, including separation of the prepaid data system and the mobile network; introduction of a monthly fixed-rate hybrid prepaid system, a top-up system and USIM system; introduction of mobile network carrier selection; differentiated retail discounts between prepaid and post-paid prices; revision of the retail discount policy for wholesale provision; increase in the number of mandatory service providers; and in-depth consideration of the introduction of a number portability policy for the prepaid and post-paid systems.

  • PDF