• Title/Summary/Keyword: Security Plans

Search Result 318, Processing Time 0.021 seconds

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine

  • K. Janani;R. Gunasundari
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.64-72
    • /
    • 2024
  • In recent times cyber attackers can use Artificial Intelligence (AI) to boost the sophistication and scope of attacks. On the defense side, AI is used to enhance defense plans, to boost the robustness, flexibility, and efficiency of defense systems, which means adapting to environmental changes to reduce impacts. With increased developments in the field of information and communication technologies, various exploits occur as a danger sign to cyber security and these exploitations are changing rapidly. Cyber criminals use new, sophisticated tactics to boost their attack speed and size. Consequently, there is a need for more flexible, adaptable and strong cyber defense systems that can identify a wide range of threats in real-time. In recent years, the adoption of AI approaches has increased and maintained a vital role in the detection and prevention of cyber threats. In this paper, an Ensemble Deep Restricted Boltzmann Machine (EDRBM) is developed for the classification of cybersecurity threats in case of a large-scale network environment. The EDRBM acts as a classification model that enables the classification of malicious flowsets from the largescale network. The simulation is conducted to test the efficacy of the proposed EDRBM under various malware attacks. The simulation results show that the proposed method achieves higher classification rate in classifying the malware in the flowsets i.e., malicious flowsets than other methods.

A Study of Correctional Education for Juvenile Delinquents in Korea (우리나라 소년범(少年犯) 교정교육(稿正敎育)의 실태(實態) 문제점(問題點))

  • Kim, Kyung-Hoe
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.1-16
    • /
    • 1997
  • Nowdays the prison is the only correctional for juvenile delinquents not to be the second offenders in Korea. Originally the correctional education aims to let criminals go back to the society as a decent citizen after correcting them and prevent them from comminitting crimes repeatedly. Being considered to increase the second offenders in juvenile delinquency, the purpose of this study is to investigate the actual condition and problems of juvenile correctional education in Korea and to find out the solution of problems. First of all, this study examines the actual condition of the juvenile delinquency in Korea. The number of juvenile crimes has been increased from 1985 to 1995. In 1997, the current education in correctinal institutions for juvenile delinquents is inferior to that of developed countries. On the basis of this investigation, improvement plans which will be fit for the circumstances in Korea are suggested. The conclusion of this study are summarized as follows 1. Correctional institutions will be improved to accommodate the proper number of convicts. 2. Correctional officers should be qualified proffessinals who can achieve the aim of correctional education successfully. 3. In order to cultivate he social adaptability of convicts, the expansion of open prison is needed. 4. It is neccessary to classify convicts by means of moderized and scientific methods. 5. Correctinal education consist of various practical courses on jobs, After complenting these vocatinal training, the convict can obtain certificates. 6. The government has to has to plan policies that the released convicts can get jobs for living. 7. Owing to keeping prisons sanitary, it is very helpful for convicts to have thebelief that they are not abandoned by the member of their society. 8. Convicts are given opportunities to participate religious activities by their free-will. If above improvement plans are sufficiently accomplished, correctinal education will obtain good results, It is also effective to minimize the repetition of offence by ex-convicts.

  • PDF

A Study on Improvement Plans for Application of the Personal Information Protection Act(Based on the Subject to Duty of Safeguards) (개인정보보호법 적용 대상에 대한 개선 방안 연구(안전성 확보조치 기준 의무 대상 중심으로))

  • Jang Sang Soo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.35-43
    • /
    • 2023
  • Since the Personal Information Protection Act was enacted in 2011, it has played a role in safely protecting people's personal information and protecting their rights. Personal information controller must comply with the duty of safeguards for safe personal information management. Even though administrative regulation is an accompanying issue, it is not clear to whom, when and how it applies. According to the imposition of duties, the scope, standards, safety measures, procedures, etc. for the target person should be clearly and specifically specified, but the current legal system is insufficient .In this study, problems and reasonable improvement plans were presented for the classification criteria for applicable subjects, the criteria for the criteria for determining the targets, and the criteria for measures to ensure safety. Through this, we intend to contribute to enhancing the effectiveness of the system by presenting reasonable measures by clarifying and specifying the scope and standards of application.

The Status of Teachers of Students with Intellectual Disabilities in Practicing Strategies for the Modification of Aggressive Behaviour in Saudi Arabia

  • Alqurashi, Yasser O.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.241-247
    • /
    • 2022
  • This study examines teachers' implementation of strategies to modify the aggressive behavior of students with intellectual disabilities in Saudi Arabia, to determine the obstacles to their real-world execution. In addition, it presents potential approaches to overcome the obstacles to implementing strategies with this group of students. The research employed a qualitative design using semi-structured interviews as a data collection tool and applied a thematic analysis. The study population comprised 35 teachers of students with intellectual disabilities and the study sample numbered six teachers. The interviews were conducted via different methods: three by phone, two face-to face, and one using the Zoom platform. The results revealed inadequate understanding among teachers of intellectual disability and behaviour modification strategies, and this affected their capacity to develop plans that were compatible with the needs of students with intellectual disability. The findings also identified multiple obstacles that impede teachers' implementation of strategies to modify aggressive behaviour among students with intellectual disabilities; the most important being the lack of input from a psychological specialist when developing programs to modify aggressive behaviour. In general, it is apparent that programs for modifying aggressive behaviour are neither structured nor complementary, due to the scarcity of administrators with sufficient knowledge and familiarity with the characteristics and personalities of students with intellectual disabilities. This study presents several recommendations, the most important of which is that teachers of students with intellectual disability should develop themselves through training courses to enable them to deal with these students and create treatment plans that include strategies and clear steps to modify the aggressive behaviour of students with intellectual disabilities. To support teachers, it is also necessary to remove the obstacles facing education centres by providing financial support to create an environment in which they can access the required devices and equipment in their classes.

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.

A Study on the Design Characteristic and Improvement of the Studio Type Urban Lifestyle Housing in Seoul (서울시 도시형 생활주택 원룸형 주거의 계획특성 및 개선방안 연구)

  • Cho, Min-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.2
    • /
    • pp.156-166
    • /
    • 2011
  • A studio type urban lifestyle housing was recently introduced as a new urban multi-housing typology. It was particularly created to meet the increasing housing demand of one-person households due to the population change and the shortage of housing supply. However, some concerns have been raised, because the government's policy has been focused on expanding housing supply by easing certain legal regulations in construction. Poorly planned and managed urban lifestyle housings might degrade living conditions for one-person households and ultimately harm urban environments. As such, this research is conducted to investigate the design characteristics of the studio type urban lifestyle housing from selected construction precedents in Seoul. Critical evaluations are made for the facilities and uses in site plans, unit plans, and shared public spaces. As a result, problem areas are found in the lack of design varieties, privacy protection in units, control of natural environment conditions, and the absence of community spaces. Improvement strategies can be suggested by comparing with some overseas' housing precedents: Design variations can be extended through flexible structure, facility, and furniture systems. Privacy and natural environment can be controled through the integration of interior space configurations and exterior envelope systems. The housing policy needs to be reconsidered to improve a variety in design, residents' social interaction, security, and management. Thereby, the studio type urban lifestyle housing should be holistically approached in terms of design and policy to enrich urban living experiences by residents and communities.

Root cause analys is and improving strategy of suicidal sentinel events (의료기관 내 자살사건의 근본원인분석과 개선전략)

  • Lim, Hun-Sun;Kim, Hong-Soon;Yum, Ho-Kee
    • Quality Improvement in Health Care
    • /
    • v.19 no.2
    • /
    • pp.50-64
    • /
    • 2013
  • Objectives : Suicide is a serious sentinel event in healthcare organization. Suicide and suicidal attempt are fatal and long lasting mental and physical damage to themselves, family, and medical staffs. To develope the system to prevent suicidal accident in hospital, we reviewed and analysed one case of suicidal sentinel event. Methods: The risks of suicidal sentinel event were evaluated and analysed through the root cause analysis and failure mode effects analysis. Result: We found several root causes such as initial assessment of oldest patient and security issues. Couple of action plans to fix the problems were done immediately. According to failure mode, we evaluate the risk priority number to modify the action plans. Conclusion: To reduce the risk of sentinel events, we reviewed the suicidal event and established the new system and action plan to prevent sentinel events.