• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.033 seconds

A Study on the Development of National Defense Leadership through the Change of Civil-Military Relationships (민군관계의 변화와 국방리더십의 발전방안에 관한 연구)

  • Lee, Chang-Gi
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.83-118
    • /
    • 2006
  • This study is to develop digital leadership in a field of national defense. Today, korean society is facing the crisis of national security. But national defense leadership is not show in the circumstance of national security crisis. As you know, national defense leadership is a process that make use of influence. Which means it converges people's interest and demands well and also show people the right vision of national defense and make them to comply the policy about national security. Because of the environmental change, our national defense leadership is having a new turning point. First, international order, which is under post-cold war, raises possibility of guarantee of peace and security in international society but also, cause the increase of multiple uncertainty and small size troubles in security circumstance. In addition, Korean society is rushing into democratization and localization period by success in peaceful change of political power went through about three times. The issue of political neutralization of military is stepping into settlement but still, negative inheritance of old military regime is worrying about it. In this situation, we can't expect rise in estimation about the importance of security and military's reason for being. So, military have to give their concern to not only internal maintenance of order and control and growth of soldiers but also developing external leadership to strength influence to society and military's the reason for being. So for these alternative I'm suggesting a digital leadership of national defense which fits digital era. This digital leadership is the leadership which can accept and understand digital technology and lead the digital organization. To construct digital national defense we need a practical leadership. The leadership has to be digital leadership with digital competence that can direct vision of digital national defense and carry out the policy. A leader who ha s digital leadership can lead the digital society. The ultimate key to construct digital government, digital corporate and digital citizen depends on digital leader with digital mind. To be more specific, digital leadership has network leadership, next generation leadership, knowledge driven management leadership, innovation oriented leadership. A leader with this kind of leadership is the real person with digital leadership. From now on, to rise this, we have to build up human resource development strategy and develop educational training program.

  • PDF

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

Analysis of Research Trends of the Information Security Audit Area Through Literature Review (문헌 분석을 통한 정보보안 감사 분야의 국내 및 국제 연구동향 분석)

  • So, Youngjae;Hwang, Kyung Tae
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.3-39
    • /
    • 2023
  • With the growing importance of information/information system, information security is emphasized, and the significance of information security audit as a tool for maintaining the proper security level is increasing as well. The objectives of the study are to identify the overall research trends and to propose future research areas by analyzing domestic and overseas research in the area. To achieve the objectives, 103 research papers were analyzed based on both general and subject-related criteria. The following are the major research results : In terms of research approach, more empirical studies are needed; For subject "Auditor," studies to develop a framework for related variables (e.g., capability) are needed; For subject "Audit Activities/Procedures," future research should focus on the process/results of detailed audit activities; Future domestic research for "Audit Areas" should look for the new technology/industry/security areas covered by foreign studies; For "Audit Objective/Impact," studies to define the variables (e.g., performance and quality) systematically and comprehensively are needed; For "Audit Standard/Guidelines," research on model/guideline needs to be continued.

Evaluation of Convention Destination Images for 2006 and 2010: Importance-Performance Analysis of Meeting and Exhibition Planners' Perceptions (IP분석에 의한 회의 및 전시 기획가의 컨벤션 개최지 이미지 평가)

  • Kim, Si-Joong
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.1
    • /
    • pp.19-32
    • /
    • 2011
  • This study compares the results of two Importance-Performance Analyses (IPA) on the convention destination images in Korea by meeting and exhibition planners. Meeting and convention planners carefully evaluate convention destinations by considering meeting room facilities, hotel service quality, safety/security, air transportation access and hotel room availability as the most important attributes of a convention destination. On the other hand, night life, exhibition facilities, scenery/sightseeing opportunities, food and lodging costs and restaurant facilities are considered as the least important attributes of a convention destination. The study revealed that convention destination attributes ranking is dynamic and continuous evaluation should be done to determine the current perception of the meeting and exhibition planners. Meeting and exhibition planners' importance grid of the convention attributes is dynamic and changed with the environment and needs of their clientele. In this study it was noted that the ranking for some attributes has dramatically changed.

  • PDF

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

Hospital Security System using Biometric Technology (바이오메트릭스 기술을 이용한 병원보안시스템)

  • Jung, Yong-Gyu;Kang, Jeong-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • Recently increasing importance of information security, personal security is researched. Among them, biometrics research is very good at recognition and security particularly in terms of iris recognition. Recent hospital physicians and employees for access control is emphasized. But most of them, easy-employee card access control systems are used. It has difficulties of iris recognition on the issue of accurate iris recognition algorithm to eliminate noise and inaccuracy of pretreatment methods for recognition from existing research. Therefore, this paper complements existing encryption methods to the disadvantages of biometric iris recognition using high-access records in the hospital management system is applied. In addition to conventional pretreatment process to increase recognition eyebrows when mask line component added to the extraction mask, the correct preparation method, and accordingly proposed to improve the recognition of records management systems offer access to the hospital.

Study on promoting the educational role of security sector to prevent child missing (아동실종 예방을 위한 시큐리티 분야의 교육적 역할증진)

  • Park, SangKyun;Kim, JinHwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.215-222
    • /
    • 2013
  • This study aims to provide future direction recognizing the educational importance and to present the way ahead that practices correctly for improving an educational role on security sector to prevent child missing. Therefore, it was conducted with questionnaire that is "Research on participation grade of education to prevent child missing and the actual condition" made by researcher of this study which is on 363of parents of pre-chirdren of 6,7 and 8years old in a kindergarten and an elementary school where is located in metropolitan area. It operated to take processing enterprise statistics using SPSS/WIN 12.0 for getting data, and analyzed frequency and t-verification.It investigated correct selection of an education specialist on preventive education and participation grade of education to prevent missing on home, how often, how it is conducted, then what requirement for educationto prevent child missing and participation grade is, whether difference is in accordance with gender of parentsand gender of child.