• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.025 seconds

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Applying an IPA(Importance-Performance Analysis) Model to Comparative Study on the Elementary School Students' Parents' Crime Prevention Design Element(CPTED) Awareness for Crime Prevention (범죄예방을 위한 초등학교 학부모의 범죄예방설계(CPTED)요소 인식에 관한 비교 연구: IPA(중요도-실행도 분석)기법을 중심으로)

  • Choi, Hyun-Sick
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.209-242
    • /
    • 2014
  • This study is to understand sure the primary crime prevention has been incidence as a social problem intended for parents through the analysis of the Crime Prevention Design (CPTED) CPTED element of recognize elements that target crime prevention strategy to effectively help students be and an object of the present invention is to provide a policy suggestion haryeoneunde proposed basic data required for orientation. To achieve the study objectives such as the core framework in this study IPA: Importance-Performance Analysis) also was selected. Subjects of study in 2010 Gyeongju Elementary parents name and were 203 first research group investigating the secondary school population of the region in 2014 to nomadic parents of 297 people sampled selection. Questionnaire that use by this study applies "Important-Performance Analysis : IPA" technique that Martilla & James(1977) presented and analyzed awareness for CPTED elements of strategy for student's crime prevention to elementary school pupil students' parentse. It was the first group, 0.886, 0.920, 0.895 and 2nd group 0.880, 0.906, 0.878 that reliability of (Cronbach' s ${\alpha}$) the importance, and believability of run chart was the first group, 0.880, 0.917, 0.878 and 2nd group, 0.735, 0.840, 0.830. Analysis of the data carried out frequency analysis, reliability analysis, Frequency analysis was performed, paired sample t-Test for the reliability analysis, and the technical statistical analysis of the data is. The analysis of lattice bars execution through the IPA, the importance of the primary parents elements of CPTED strategies are generally very high, but found that the variation depending on the components that Performance. This study, an important element of the strategy to eliminate the school building for students from inside and outside the criminal fears CPTED is a mechanical surveillance in the first group, organizational surveillance, and the second group is the region intensified I'll showed mechanically and organizational factors in the investigation, and request that the investment is urgently important element is also execution low, crime prevention personnel security higher importance than expanding the front door. The analysis result of this study expects that basic data can be used in policy direction presentation that examines closely CPTED elements of strategy for crime prevention of students and applies CPTED's component effectively at elementary school hereafter.

  • PDF

A Survey on Uniforms and Development of Design (1) (유니폼 실태조사와 디자인 개선을 위한 연구(1))

  • Nam, Yun-Ja;Kim, Gyeong-In;Lee, Yun-Jeong
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.2
    • /
    • pp.455-470
    • /
    • 1997
  • The importance of uniform is getting increased in the present society because it is one of symbols which represent a company and give customers the image of it. Uniform shows the kind of companies, one's position, and sometimes the actual job which one does. And workers who put on the same kind of uniform feel companionship among them, the security of their position and responsibility for their job, all of which elevate the efficiency of their job and the company. To enhance the functions of uniforms such as representativeness, esthetics, convenience and economization, the followings were studied. 1) Through survey on the present condition of seven different types of company uniforms, we analyzed preference of workers, staffs and consumers and did the factor analysis of uniform constitution. 2) It presented the relative importance among the uniform constitution. 3) The reflective condition of the uniform constitution was estimated. 4) It investigated the working condition and working movement.

  • PDF

A Design on Information Security Occupational Classification for Future Convergence Environment (미래 융합환경 기반의 정보보호 직업군 설계)

  • Lee, Yunsoo;Shin, Yongtae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.201-215
    • /
    • 2015
  • Recently advanced security threats have increasingly occurred, and the necessity and importance of Information Security has been growing with the advent of the era of convergence beyond information-oriented age. Most domestic studies in the field of occupational classification of Information Security have only focused on technology-oriented occupations. Relatively little research has been carried out on the occupational classification in the view of convergence environment. Therefore, in this paper we gave a definition of Information Security occupations, classified them and draw required capabilities by occupations in order to design the occupational classification system of Information Security and the required capabilities for future convergence environment by analyzing the previous studies. We also reclassified the occupational classification and required capabilities by occupations, and verified the validity of them based on National Initiative for Cybersecurity Education's the occupational classification system of Information Security considering the future convertgence environment. It is expected that the results of this study will be employed as base data for manpower demand and supply and improvement of working conditions in the future convergence environments. In the future study we will build standardized instruction methods which provide occupational capabilities by using the required capabilities by occupations.

Effect of Job Characteristics on Trait Anxiety and Task Performance of Private Security Workers (민간경비업 종사자의 직무특성이 특성불안 및 과업수행에 미치는 영향)

  • Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.306-315
    • /
    • 2011
  • The study defines the job characteristics anxiety of the private security workers and the effect of the performance. While the study selected the private guards working at the private security companies registered at the National Police Agency in Seoul 2011 and sampled total 300 people by using the judgment sampling method, the final input case number is 266 people. The study used alpha value of the reliability analysis and the maximum-likelihood classification of the covariation structure analysis in order to verify the validity of the survey and the reliability. With the research method and the process the result of the study is as follows. First, the task importance of the private security workers affects the minus influence to the characteristic anxiety. Second, the feedback of the private security workers affects the minus influence to the characteristic anxiety. Third, the job autonomy of the private security workers affects the minus influence to the characteristic anxiety. Fourth, the feedback of the private security workers affects the plus influence to the task performance. Fifth, the job autonomy of the private security workers affects the plus influence to the task performance. Sixth, the skill variety of the private security workers affects the plus influence to the task performance. Seventh, the characteristic anxiety of the private security workers affects the plus influence to the task performance.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.

A Study on the Effect of Information Security Compliance and Crisis Management on Information Security Trust (정보보안 컴플라이언스와 위기대응이 정보보안 신뢰에 미치는 영향에 관한 연구)

  • Yoon, Il-han;Kwon, Sun-dong
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.141-169
    • /
    • 2015
  • Electronic financial accidents are constantly happening and these accidents are taking place by a combination of several causes such as technique, human, and structure. Among electronic financial accidents, personal information disclosure is most frequently happening and becomes big problems, because secondary damage like voice phishing causes great loss to society. This research model is that financial information security compliance affects the crisis response of financial institutions and financial authorities and these crisis responses affect financial information security trust. Research target is people who experienced the disclosure of their own financial information. For empirical verification, survey questionnaires were distributed and total 103 questionnaires were collected and analyzed. As results of data analysis, all hypotheses were accepted. First, financial information security compliance influenced the crisis response of financial institutions and authorities. Second, the crisis response of financial institutions and authorities affect financial information security trust. Third, at the moderating effect analysis, the importance of personal financial information moderated the effect of the crisis response of financial institutions on financial information security trust. And the disclosure level of personal financial information moderated the effect of the crisis response of financial authorities on financial information security trust.

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.