• Title/Summary/Keyword: Security Awareness Education

Search Result 133, Processing Time 0.023 seconds

A study on residents' awareness of functions and facilities of the rural centers - Myeon locations in Hwasun-gun, Jeollanam-do Province- (농촌지역 중심지 기능 및 시설에 대한 주민 인식도 조사 - 전라남도 화순군 면소재지를 중심으로 -)

  • Park, Sung-Jin;Kim, Jeong-Gyu
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.18 no.2
    • /
    • pp.19-27
    • /
    • 2016
  • This study typified the rural centers with myeon locations in Hwasun-gun which showed comprehensive and various class types through settlement class structure analysis. It is also for establishing the awareness of strengthening functions and facilities of the centers and the directions of strengthening it. Subjects of the study could be classified into three types including base type (Neungju-myeon), general type (Nam-myeon) and decline type (Dongbok-myeon) through the analysis of settlement class structure. Neungju-myeon location as the base type could function as the myeon location by itself and tended to serve education, health and welfare functions through the strengthening of central living functions. Nam-myeon location as the general type required sports facilities management based on the vicinity and accessibility to the senior's welfare functions. Dongbok-myeon location as the decline type required the accessibility to public health facilities and the security of vicinity to the facilities because of its high population of the aged.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Effect of Military Officer's Ethical Disposition and Perceived Work Environment on Organizational Security Policy Compliance (군장교의 윤리적 성향과 업무환경 지각이 조직의 보안정책준수에 미치는 영향)

  • Bora Kim;Kisoo Seong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.31-58
    • /
    • 2020
  • Based on the social control theory, this study intends to find out the influential factors of organizational members' information security policy compliance (ISPC). Survey data from 195 military officers were analyzed to examine the effect of ethical disposition (morality, responsibility, the perceived value of ethical education) and perceived work environment (relationships with supervisors, overwork, and pay satisfaction) on ISPC attitude, ISPC intention, and turnover intention. The results of partial least squares structural equation modeling (PLS-SEM) show that ethical dispositions affect ISPC attitude and that work environments (except for pay satisfaction) affect turnover intention. In addition, ISPC attitude significantly mediates relations between ethical disposition and ISPC intention, between relationships with supervisors and ISPC intention, and between turnover intention and ISPC intention. These findings suggest that ethical disposition factors can predict an individual's security awareness level, and the ISPC attitude is a significant variable in the organizational security context.

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

National and Patriotic Education of Young Students by Means of Digital Technologies in Distance Learning Environment

  • Bezliudniy, Oleksandr;Kravchenko, Oksana;Kondur, Oksana;Reznichenko, Iryna;Kyrsta, Nataliia;Kuzmenko, Yulia;Tkachuk, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.451-458
    • /
    • 2022
  • This article is devoted to the problem of national and patriotic education of young students by means of digital technologies in the conditions of distance learning environment. It is emphasized that national and patriotic education is a powerful means of strengthening the unity and integrity of Ukraine. It is proved that national and patriotic education will be effective under the condition of systematic and purposeful activity on formation of patriotic consciousness in youth, sense of national dignity, necessity of service of ideals and values of the country. Various forms of educational work of national and patriotic orientation at Pavlo Tychyna Uman State Pedagogical University, which were conducted by digital technologies: online thematic lectures, educational classes, round tables, workshops, guest online meetings with famous researchers of historical heritage of Ukraine, online tours of historical places, virtual exhibitions of art, participation in the national-patriotic student camp "Diia" (Action) and etc. The activity of the University Library and V. O. Sukhomlinsky State Scientific and Pedagogical Library of Ukraine of the National Academy of Pedagogical Sciences of Ukraine, which has a significant impact on the formation of national consciousness and social and political activity of students by modern means of information and communication technologies. It is determined that the project "Inclusive 3D map" helps to broaden the horizons and deepen the knowledge of young students, education of a true citizen, the formation of cognitive interest in the subjects studied, motivation to study, raising awareness of Ukrainians on historical and cultural heritage. The study showed that young students take an active social attitude: they speak Ukrainian, want to live and work in Ukraine, respect their homeland, its traditions, cultural and historical past, love to travel and they are tolerant of people with special needs. Promising areas of educational work with students based on the use of a wide range of information and communication technologies, namely 3D games, TV tandems, podcasts, social networks, video resources in national and patriotic education of youth.

A Study on the Safety Management Procedures during Theme Groups Experiential Learning Experiences (단체 테마 현장체험학습의 안전관리에 관한 연구)

  • Bang, Sungmin;Kim, Changho
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • This study aims to examine the state of accidents and related issues related to Theme Groups experiential learning experiences of students and suggest ways to improve security measures to prevent future incidents. Case studies of the sunken Sewol ferry and the collapse of the gymnasium at Mauna resort in Gyeongju are conducted by analyzing the existing literature and the data collected from the media sources and related agencies. With a basis on the findings of the analyses, it is suggested that legal foundation and disaster and risk management systems (systematic revision of the laws, raised safety awareness among citizens, production and education of security managers, formation of disaster management organizations, establishment of headquarters in case of emergency and installation of first aid facilities, improved national response system, enforcement of disaster drills, introduction of assessment system, etc.) must be established to contribute to creating a safer society.

The Impact of IS Policy and Sanction Perceptions on Compliance Intention through Justice: The Role of Justice Sensitivity (정보보안 정책 및 제재 인식이 공정성을 통해 준수 의도에 미치는 영향: 공정 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.337-348
    • /
    • 2023
  • As protecting organizations' information assets affects their substantiality, they are increasing their investments in policies, regulations, and technologies for systematic information asset management and protection. This study confirms the impact on information security(IS) compliance from the perspective of employees who apply IS policies to actual work. In particular, this study identifies mechanisms linked to IS policy awareness, sanction, justice, and IS compliance from the perspective of expanding deterrence theory. We applied 316 samples obtained from workers of organizations that applied IS policies and regulations to work and verified the relationship between mechanisms by using AMOS and SPSS packages. As a result of the verification, IS policy awareness had a positive effect on organization justice and compliance intention through the severity and clarity of sanctions. Individual justice sensitivity had a moderating effect on the cause and outcome of justice. The sanction-related mechanism presented in this study provides strategic implications for organizations that require active IS activities by insiders.

Design to Improve Educational Competency Using ChatGPT

  • Choong Hyong LEE
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.182-190
    • /
    • 2024
  • Various artificial intelligence neural network models that have emerged since 2014 enable the creation of new content beyond the existing level of information discrimination and withdrawal, and the recent generative artificial intelligences such as ChatGPT and Gall-E2 create and present new information similar to actual data, enabling natural interaction because they create and provide verbal expressions similar to humans, unlike existing chatbots that simply present input content or search results. This study aims to present a model that can improve the ChatGPT communication skills of university students through curriculum research on ChatGPT, which can be participated by students from all departments, including engineering, humanities, society, health, welfare, art, tourism, management, and liberal arts. It is intended to design a way to strengthen competitiveness to embody the practical ability to solve problems through ethical attitudes, AI-related technologies, data management, and composition processes as knowledge necessary to perform tasks in the artificial intelligence era, away from simple use capabilities. It is believed that through creative education methods, it is possible to improve university awareness in companies and to seek industry-academia self-reliant courses.

A Study on Factors Affecting the Reception Attitude toward Electronic Medical Record (전자의무기록 수용태도에 영향을 미치는 요인에 관한 연구)

  • Jin, Hye-Eun;Choi, Eun-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.279-286
    • /
    • 2012
  • The purpose of this study was identified the influence of introducing Electronic Medical Records (EMR) on reception attitude, based on literature investigation, the study converted utility and serviceability from Davis TAM Model into awareness of effects in computerized database except attitude variable. The electronic survey for doctors, nurses, medical technicians of a general hospital located in Gangwon-do was performed for 4 weeks from Nov, 11th, 2009 to Dec, 2nd and the collected data was computerized through SPSS 12.0. The factors influencing reception attitude were divided into 4 categories; basic characteristics of the individual, awareness of privacy protection, awareness of effects in computerized database, technological preparation and measured detailed specific variables. As the result of this, the factors influencing reception intention were different depending on recognizing the effectiveness caused by computerization of medical information. Especially, in terms of the difference between basic characteristics of the individual and awareness of privacy protection, there were significant distinctions among 3 sectors; general, transactional, online information management. The significant effects were identified from information management related to business or online information management depending on experiencing security education.