• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.033 seconds

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

The Israel-Iran Conflict: Historical Background and Modern

  • Kim Seung-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.309-317
    • /
    • 2024
  • The conflict between Iran and Israel has been a major source of instability and security threats in the Middle East. This study analyzes the historical background and modern aspects of the Israel-Iran conflict, examining its root causes, nuclear issues, proxy wars, cyber warfare, economic sanctions, and the role of the United States. The research employs qualitative methods, including literature review and case analysis, using various sources such as academic papers, government reports, and media articles. The findings suggest that the conflict is deeply rooted in historical, religious, and political factors, and has escalated since the 1979 Iranian Revolution. The study highlights the need for dialogue, negotiation, and international mediation to resolve the conflict and maintain regional stability. The Israel-Iran conflict also provides valuable lessons for addressing the North Korean nuclear issue, emphasizing the importance of dialogue, international cooperation, and confidence-building measures.

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners (전자상거래를 위한 보안 항목 우선순위 분석: 연구자그룹과 실무자그룹을 중심으로)

  • Kim, Hyun-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.163-171
    • /
    • 2011
  • In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance (정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구)

  • Kim, Hye Jung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.147-164
    • /
    • 2013
  • For the continuous information security governance, we have to focus on not just technical aspects like access control and DRM, but informal level management like information security(IS) behavior, culture, and personal value. But there are few informal level studies, while many formal level studies of IS governance or technical means. This study is an empirical test that how IS culture, normal beliefs, personal behavior and value affect employee's deviant behavior. And we define a lack of an awareness of value and importance on IS regulations in organizations as "Information Security Anomie" with the concept of anomie, a viewpoint on social organization.

Study of Hospitality Security (Hospitality Security의 학문적 고찰)

  • Kim, Hyeong-Seok;Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.37-56
    • /
    • 2018
  • Safety is considered as a very important factor when tourists select tourist spots, which means that the desire for safety in the tourism industry is very high. Therefore, a specialized field for the safety of the tourism industry is necessary. Already, there are staff members who are responsible for safety in various tourism sectors, but they have been led through knowledge based on work experience without professional education. In order to train specialists who are responsible for the safety of the tourism industry, research in related fields is indispensable, and universities in charge of research and education systematically construct surveys of related fields, and through experts I have to train. In the field meaning tourism security, there is Hospitality Security. Hospitality means 'to hospitality', 'to be entertaining', Hospitality Industry is used to cover the tourism industry in its exhaustive sense. Security is a term that refers to safety and security. Therefore, Hospitality Security which the two meanings together, that is, korean word hospitality security, tourism security can be said. Already in the US experts in the field of Hospitality Security explained the importance through related books. Currently in Korea, well-known tourism related universities operate subjects in the Hospitality field, and the security field also manages subjects at several universities. So, We collected the subjects managed at each university, analyzed them, and selected subjects of Hospitality Security. If the results of research through continuous research accumulate, the value as academic will be further increased, and it will be possible to have a role responsible for the safety of the tourism industry by producing experts accordingly.

Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance (선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가)

  • D'agostini, Enrico;Jo, Sohyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.201-211
    • /
    • 2019
  • Safety and security measures in the shipping industry play a pivotal role in ensuring efficient and reliable cargo and passengers operations at each stage of the supply chain. The ISPS Code was adopted into SOLAS convention to protect seafarers and vessels from security threats. Furthermore, according to the Manila amendments to STCW Convention in 2010, personnel employed on board are required to participate in security training. Effective seafarers' education and training programs are of major importance to guarantee satisfactory performance levels onboard to minimize security-related risks. The study's contribution focuses on empirically evaluating the relationship between personal level of awareness and security performance when seafarers undertake security training courses. Findings of this study suggest that (1) seafarers who undertake maritime security training have a higher awareness of ship security, (2) security training and security awareness have a positive influence on security performance, and (3) security awareness mediates the impact of security training and security performance. In conclusion, education and training programs are key tools in enhancing seafarers' security awareness and security performance which, from an industry viewpoint, can translate into major economic, operational and reputational benefits.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

A Study on Global Compliance of Global Companies under the Circumstance of Export Control (전략물자 무역환경에 따른 글로벌기업의 글로벌 컴플라이언스에 관한 연구)

  • Choi, Choon-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.367-389
    • /
    • 2008
  • On the stage of an international trade with well-developed transportation, communication system and proliferation of free trade, global companies who are eager to sustain business growth by cutting cost and pioneering new market are facing a new challenge named "Global Compliance" of business transparency, export and import regulations, and potential international business environment. The purpose of a global compliance is to monitor and regulate a company's trade activities to reduce the risk of transactions that might violate relevant countries' laws, regulations, or standards. After the 911, for strengthening the non-proliferation of the export control goods, UNSCR1540(United Nations Security Council Resolution 1540(2004)) was declared in order to enforce the members to adopt the rules in the resolution into their national laws and regulations. Companies does not realized that they need to get rid of the risks because they underestimate the importance of international security, caused by their careless management. That is why currently the export control program is not fully observed by the most. Lack of awareness for the export control and the poor system of each members could be the reason for this unstable operating status. With this background, this thesis will study on the meaning of export control, schemes for companies to recognize its importance and governmental guideline to support global companies.

  • PDF