• Title/Summary/Keyword: Security Governance

Search Result 151, Processing Time 0.024 seconds

Analysis and New Agenda of e-Government program (전자정부의 의의와 추진실적 및 향후 과제)

  • HwangBo, Yeoul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.141-158
    • /
    • 2003
  • This paper examines new phenomenon and transformation that arise from the expansion of knowledge-based economy, envisions the meaning of e-government through comparing traditional administration with new governance, formulates the e-government model, and presents a direction for next e-government for the conclusion. These new phenomenon include a transformation to product and service convergence model, cyber sovereignty dilemma, privacy and information security threats, and various others. Also, there is a gradual transformation from government-oriented administrative approach to a new governance model that strengthens the role of NGO. And, e-government must work together to realize this new governance ideology. New e-government must be transformed where government and citizens can implement and manage e-government together. Therefore, expanding applications of Public Key Infrastructure (PKI) technologies, promotion of e-Democracy, and improvement of user interface to improve usability must be emphasized.

An Exploratory Study on Development of Information Security Manpower (정보보안 인력양성을 위한 탐색적 연구: 정부, 기업, 학계, 인력 관점 기반)

  • Seo, Kyung-Jin;Choi, Jee-Eun;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.73-96
    • /
    • 2015
  • Purpose Information security industry is rapidly growing, but has been confronted with many challenges in a business environment. One of them is the imbalance between supply and demand of information security manpower, which has caused an insecure market situation. Therefore, this study has derived factors of promoting and hindering information security manpower from governance, academics, corporations, and workforce perspectives, and has analyzed a sequence of cause and effect of each factor. Design/methodology/approach This study is an exploratory research based on the interviews. The causal loop diagram (CLD) was developed to deduce key issues and propose alternatives. Findings The result of this study is expected to help the development of information security manpower in Korea, by minimizing the potential negative effects as well as maximizing the positive effects. This study found out the dynamic causes and effects of the security manpower system in each stakeholder's perspective. The cause-and-effect relationships between the stakeholders will be able to contribute to solve the imbalance of supply and demand in security manpower system.

China's Government Audit and Governance Efficiency of Companies: Analyses of Listed Companies Controlled By China's Central State-Owned Enterprises (중국의 정부감사와 기업의 관리효율성 : 중국 중앙기업 상장자회사 분석)

  • Choe, Kuk-Hyun;Sun, Quan
    • International Area Studies Review
    • /
    • v.22 no.4
    • /
    • pp.55-75
    • /
    • 2018
  • In China, different from the private enterprises or the locally-administered state enterprises, central state-owned enterprises generally spread over cornerstone industry which is greatly influenced by the public policy, which results in the objective existence of government influence in their productive activities. As the strategic resource, listed companies controlled by central state-owned enterprises, mostly distributed in the lifeblood and security of key industries. Therefore, listed companies controlled by central state-owned enterprises' governance efficiency play an important role in optimal allocation of state-owned assets, improve capital operation, improve the return on capital, and maintain state-owned assets safety. As the immune systems of national governance, the government audit strengthen the supervision of listed companies controlled by central state-owned enterprises in case of the loss of state-owned assets and significant risk events occur, to ensure that the value of state-owned assets. As an important component of national governance, government audit produced in entrusted with the economic responsibility of public relationship. Government audit can play an important role in maintaining financial security and corruption, and also improve listed company's accounting stability and transparency. While government audit can improve governance efficiency and maintain state-owned assets safety, present literature is scarce. Under the corporate governance theory and the economical responsibility theory, the thesis select data from 2010-2017 to verify the relationship between government audit and listed companies controlled by central state-owned enterprises' corporate performance. Results show that listed companies controlled by central state-owned enterprises are more likely to be audited by government of poor performance. Results also show that the government audit will have a promoting effect on listed companies controlled by central state-owned enterprises, and through to the improvement of the governance efficiency will enhance its companies' value. The results show that China's government audit has appealing role in accomplishing central state-owned enterprises to realize the business objectives and in promoting the governance efficiency.

A study on the paradigm shift in National crisis management system and its functional, structural improvements : Focused on the construction of elite civil defense force (국가위기관리체계의 패러다임 변화와 기능 및 구조적 개선방안에 관한 연구 : 정예민방위대 구축을 중심으로)

  • Lee, Mi-Jeong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.137-161
    • /
    • 2012
  • There are some common and broad trends in National crisis management system around the world. This article considers that paradigm theoretically. 1) a shift from civil defense to civil protection, 2) 10 principles in sustainable National crisis management system, 3) the collaborative governance of crisis management. Some civil defense problems in National crisis management system are as follows; 1) obscurity of organizational identity through twofold function in civil defense, 2) ineffective organization in civil defense and disaster management system, 3) weakness of competencies in local government, 4) overlook of actual condition in communities and civil defense resources. This article suggests that to provide retired and active private security practitioners, retired law enforcement personnel, and retired military personnel to form a elite civil defense force and to find creative ways to address this pervasive threat which one reasonable and affordable solution would be for the government to take advantage of an existing resource.

  • PDF

Civil-Military Relations and Military Leadership (민군관계와 국방리더십의 발전방향)

  • Son, Su-Tae
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.119-156
    • /
    • 2006
  • Now it is not useful the theory about civil-military relationship that have been analysed for power games between military and civilians Korean society is going on governance society managed by cooperating network of government, civilian society and business market These social change require for new context about civil-Military relationship. Military leadership must contribute desirable civil-military relationship This study will suggest the direction about military leadership for desirable civil-military relationship. Now political issues about military intervention to the government are almost settled, but the worry about complications between military and civilians exist in the part of low issues like policy-making. Another important issues is military leadership about the style of social-being. In recent years, social change is very complex and speedy like global networking and diversity, leadership environment also, changed like leadership paradigm shift. Military leadership must be examined from the principle to the context of social integration At the present age, individual soldier is citizen in uniformed. Also military leadership must to seek the principle in the citizen mind like citizenship. Another charactristics of present day military is influence of high technogy. For the high-tech war military need the transition about science and technology from the whole society. In the context of above the development of military leadership are suggested as follows. First, the development of military control leadership must besought to the context of cooperation between government and military. Government must provide the system to strengthen military professionals in the process of policy-making about national security Second, military leadership must embody the important social values through the advanced military making, Third, military leadership must provide the adaptability to the society through the military education of their soldiers Forth, military leadership must be contributed to the social integration and to the growing up individual soldiers like their socialization and their achievement. Five, an important subject of military leadership is the creation of desirable military culture through the harmony of social culture and military culture.

  • PDF

A Study on Analysis of Collaborative Governance in the Process of Local Government Co-evaluation Based on Virtual Policy Studio (지방행정 평가정보 시스템을 활용한 지방자치단체 합동평가 과정의 협력적 거버넌스 분석에 관한 연구)

  • Mun, Young Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.191-201
    • /
    • 2010
  • The Korean central government has been investing a lot of efforts to promote performance of local governments. For example, the Ministry of Public Administration and Security (MOPAS) supported the local governments to develop and provide with a 'balanced score card' and a 'customer satisfaction innovation. ' Many other central ministries also conducted individual evaluations for local governments in their substantive policy areas. These evaluation systems of 78 appraisals for local governments conducted by the MOPAS and other ministries had made the local governments to work harder. However, most local governments have appealed their 'reform fatigue' caused by the overlapping evaluation systems. In this context, the MOPAS initiated merging the evaluations into a co-evaluation system under the new Government Performance Evaluation Act of 2006. In this process of introduction of new evaluation system, there are two significant movements. Firstly, as Korean Government has strong information technology, MOPAS has developed 'Virtual Policy Studio (VPS)' which evaluates the performance of each local government with on line. In other words, in the co-evaluation system for local government performance most evaluation steps are implemented by computer and Internet. So most stakeholder can access and work on the VPS in real time when they want to. And the other thing is that cooperation among stakeholders has been occurred in the co-evaluation system. Furthurmore the cooperative governance is systemized and sustain for a long time because MOPAS made IT based co-evaluation system. Therefore this paper intends to illustrate the process of introduction of VPS, main process of co-evaluation system based on VPS and analyze collaborative governance of the co-evaluation system.

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization (국내 산업보안 유관기관 조사를 통한 산업보안 전담부서 필요성 제고)

  • Lee, Hyojik;Ryu, Bora;Kim, Hwayoung;Lee, Jeakyun;Kim, Yein;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.121-133
    • /
    • 2016
  • All industries has expanded their research investment for development and secure of new technology, following application of ICT technology and rapid growth of industrial technology. Therefore efforts to protect the new technology have strengthened. Several governments have conducted a variety of industrial security activities with interest because these efforts are considered not only business problem level but also national level. In this paper, we research the industrial security related organization that performs the activities for industrial assets protection and technology drain prevention. Furthermore we discuss problems with the industrial security performance of government and emphasize the necessity of industrial security department in government.

Reinforcing Financial Data Exchange Security Policy with Information Security Issues of Data Broker (금융데이터거래 정보보호 강화방안: 데이터브로커 보안이슈를 중심으로)

  • Kim, Su-bong;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.141-154
    • /
    • 2022
  • In the data economy era, various policies are being implemented to create an active data distribution environment. In South Korea, the formation of a big data distribution platform and data trading began with the launch of the Financial Data Exchange under public data governance. In the case of major advanced countries in the data field, they have built a data distribution environment based on the data broker industry for decades and have strengthened national data competitiveness through added values generated from the industry. However, behind the active data distribution through data brokers, there are numerous information security issues, which have resulted in various privacy issues and national security threats. These problems can occur sufficiently in the process of domestic financial data exchange. In our study, we analyzed various information security issues of data trading caused by data brokers and derived information security requirements to be considered when trading data. We verified whether information security requirements are well reflected in the information security policy for each transaction stage of the domestic financial data exchange. Based on the verification, measurements to strengthen information security for financial data exchange are presented in our paper.