• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.038 seconds

A Firm's Environmental Determinants Impacting the Information Security Management and the Moderating Effects of Regulatory Influence (정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.79-94
    • /
    • 2012
  • According to the higher dependence of contemporary firms on data digitalization and the information technology, the role and importance of Information Security Management (ISM) is getting higher. Thus, there is a need to arrange proper procedure and a series of device within the organization in order to reduce diverse security risks, which take place from the inside and the outside of firm. In other words, prior examination for reinforcing recognition of ISM, and of a systematic performance method in the refined form is important. This study investigate the key variables influencing the ISM. Thus, this study suggests firm environmental factors that include four exogenous variables, market volatility, task interdependence, perceived benefits, and coordination mechanism affecting awareness of ISM. In addition, it proposes a concept of the ISM process with awareness, development, and performance, and examines the moderating effects of regulatory influence. The research model was tested by using Structural Equation Modeling, via SmartPLS 2.0 analysis on a sample collected from 186 employees in various industries. The research results provide the evidence that supports the tested hypotheses except significance of coordination mechanism. The implications of the findings suggest a new theoretical framework of the ISM and offers important solutions for the practical application guidelines.

A Study on the Methodologies to Assess Network Vulnerability (네트워크 위험 분석 및 취약점 점검 방법에 관한 연구)

  • Seo Dong-Il;Park Won-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.107-114
    • /
    • 2005
  • This paper proposes to analyze a security level about information property systems. This method uses objective and quantitative risk level assessment. The method analyzes administrative, physical and technical aspects of information property system commonly. This method also uses administrative, physical and technical weights. Individually according to requirements security assessment purpose. And it shows risks weighting mean and importance of information property by graph. The most right and up systems in maps is prior to other systems. Also, Quantitative analysis presents more objective and efficient results for security level assessment of information system.

  • PDF

A Role-play base PBL(Problem-Based Learning) for Information Security Learning (정보보호 학습을 위한 롤-플레이 기반 문제중심학습)

  • Lee Byong-Rok;Ji Hong-Il;Shin Dong-Hwa;Cho Yong-Hwan;Lee Jun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.85-92
    • /
    • 2006
  • Problem-Based Learning(PBL) is one of constructionism's model which is learner-centered learning. In this paper, a role-play base PBL using character is proposed to study importance of information security. It is different from the other PBL models in that it reflects the characteristics of learners, learning task. And it is learning support system which the learners preside their own learning activities using Internet and mobile devices. By experimental result showed that proposed method was more effective than traditional teacher-oriented teaching method about information security in self-directed learning, cooperative learning, contents-making and attraction.

  • PDF

A Security Labeling Scheme for Privacy Protection in Personal Health Record System (개인건강기록 시스템에서 개인 프라이버시 보호를 위한 보안 레이블 기법)

  • Yi, Myung-Kyu;Yoo, Done-sik;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.173-180
    • /
    • 2015
  • The advent of personal healthcare record(PHR) technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. But the problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, we propose a security labeling scheme for privacy protection in PHR system. In the proposed scheme, PHR data can be labeled also manually based on patient's request or the security labelling rules. The proposed scheme can be used to control access, specify protective measures, and determine additional handling restrictions required by a communications security policy.

Factors Influencing on Behavior Intention for Mobile Commerce (모바일 커머스의 이용의도에 영향을 미치는 요인)

  • Chung, Kyung-Soo;Lee, Won-Bin
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.153-174
    • /
    • 2008
  • Mobile commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network such as payment, ticketing, auction and mobile banking. Despite the importance of mobile commerce, there have not been so many academic studies on the unique characteristics of mobile commerce environments. In this study, our research model is developed based on TAM(Technology Acceptance Model) to investigate the user's technology acceptance process in mobile commerce environment. The factors, such as ubiquity, compatibility, perceived usefulness, perceived ease of use, cost, security, attitude and behavior intention for mobile commerce were selected from pier study in information systems area. The data for empirical analysis of the research model is collected online-questionnaire of 167 mobile commerce users in South Korea. The hypotheses were analyzed using SPSS 15.0 and AMOS 7.0. The results of our study show that: (1) compatibility, perceived usefulness and security had influences on the attitude whereas perceived ease of use and cost did not have any significant impact on the attitude, (2) compatibility influenced perceived usefulness whereas perceived ease of use did not, and finally (3) ubiquity, perceived usefulness and attitude had considerable influences on intention for mobile commerce. Therefore, practitioners should focus on enhancing security, quality of contents and services as well as offering what mobile commerce users want. The results of this study may useful for academicians and practitioners alike.

A Study on the Need of Unified Cyber Crisis Management System:Around Comparison about Policies and Systems of USA and Korea (통합적 사이버 위기관리 체계의 필요성에 관한 연구 : 미국과 한국의 제도 및 정책 비교를 중심으로)

  • Kim, Min-Sik;Park, Sang-Don;Kwon, Hun-Yeong;Kim, Il-Hwan;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • According to Homeland Security Act of 2002, DHS in USA is comprehensively responsible for execution of protection methods on the public and private sectors against cyber attack for USA cyber crisis management. There are different laws and organizations according to the sector that is the public, the private, CII(Critical Information Infrastructure, or Non-CII in Korea. In this paper, we show the unified cyber crisis management of USA makes korea realize the importance to integration and systematization for the national cyber crisis management system.

  • PDF

An Approach to Optimal Dispatch Scheduling Incorporating Transmission Security Constraints

  • Chung, Koo-Hyung;Kang, Dong-Joo;Kim, Balho H.;Kim, Tai-Hoon;Oh, Tae-Kyoo
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.199-206
    • /
    • 2008
  • The introduction of competition in electricity markets emphasizes the importance of sufficient transmission capacities to guarantee effective power transactions. Therefore, for the economic and stable electric power system operation, transmission security constrains should be incorporated into the dispatch scheduling problem. With the intent to solve this problem, we decompose a dispatch scheduling problem into a master problem(MP) and several subproblems(SPs) using Benders decomposition. The MP solves a general optimal power flow(OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. In addition, we consider interruptible loads as active control variables since the interruptible loads can participate as generators in competitive electricity markets. Numerical examples demonstrate the efficiency of the proposed algorithm.

Security Analysis of Diffie-Hellman based Standard Key Agreement Protocols (이산대수 기반 Diffie-Hellman형 표준 키 분배 프로토콜의 안전성 분석에 관한 연구)

  • Kim, Kyung-Jin;Kim, Sung-Duk;Shim, Kyung-Ah;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.799-808
    • /
    • 2002
  • According to the wide-spread of information transmission system over network, the use of cryptographic system to provide the integrity of transmitted message over network is increasing and the importance of that is emphasized. Because the security of the cryptographic system totally relies on the key, key management is a essential part of cryptographic system. A number of key agreement protocols have been proposed to far, but their rigorous security analysis is still open. In this paper, we analyze the features of Diffie-Hellman based standard key agreement protocols and provide the security analysis of those protocols against several kinds of active attacks.

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.