• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.031 seconds

m-Gov Strategy and Policy Challenges with ICT Ecosystem Changes (ICT 생태계 변화에 따른 m-Gov의 전략수립과 정책과제)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1531-1537
    • /
    • 2013
  • In its change in ICT Ecosystem, electronic government changes to its wireless m-Gov from existing PC-based e-Gov. Thus, in order to realize the smart government, m-Gov needs to be vitalized and the strategies for this realization are required. Also, some countermeasures for those strategies and political instructions which the electric government should follows are needed. Above two are the ultimate purpose in pursuing administrative ideals because the realization of m-Gov innovates the government and betters quality of national life off. Therefore, this paper, to realize the smart government, provides some strategies for vitalization of m-Gov's electric government services, their countermeasures, and political instructions for Smart m-Gov.

A Study on the Difference between Balanced and Dominant Learning Styles and Learning Strategies by Learning Factors of College Students

  • Kim, Ji Sim;Kim, Kyong Ah;Park, Mi Soon;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.65-73
    • /
    • 2021
  • This study investigated differences in learning styles and learning strategies according to learning factors: major fields, achievements, and grades and differences in learning strategies according to learning styles for college students. Unlike previous studies that analyzed differences focused on the dominant learning style, the learning style was subdivided into a balanced and dominant learning style. In the analysis of the 179 participants in M colleges, it was found that the difference between the learning style and the learning strategy according to the learning factors was not significant. But, there was a significant difference in the use of cognitive strategies according to the learning style in the dimension of information input, and in the use of all strategies according to the information processing style. It was analyzed that active learners had a high level of using cognitive strategies, visual learners had a high level of using external strategies, and balanced learners had a high level of using internal strategies. Based on the results, the training strategies to understand the learning style and to improve the level of use of the learning strategy in the learning competency improvement program was proposed.

Manpower Demand Forecasting in Private Security Industry (민간경비 산업의 인력수요예측)

  • Kim, Sang-Ho
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.1-21
    • /
    • 2009
  • Manpower demand forecasting in private security industry can be used for both policy and information function. At a time when police agencies have fewer resources to accomplish their goals, forming partnership with private security firms should be a viable means to choose. But without precise understanding of each other, their partnership could be superficial. At the same time, an important debate is coming out whether security industry will continue to expand in numbers of employees, or level-off in the near future. Such debates are especially important for young people considering careers in private security industry. Recently, ARIMA model has been widely used as a reliable instrument in the many field of industry for demand forecasting. An ARIMA model predicts a value in a response time series as a linear combination of its own past values, past errors, and current and past values of other time series. This study conducts a short-term forecast of manpower demand in private security industry using ARIMA model. After obtaining yearly data of private security officers from 1976 to 2008, this paper are forecasting future trends and proposing some policy orientations. The result shows that ARIMA(0, 2, 1) model is the most appropriate one and forecasts a minimum of 137,387 to maximum 190,124 private security officers will be needed in 2013. The conclusions discuss some implications and predictable changes in policing and coping strategies public police and private security can take.

  • PDF

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender (인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교)

  • Lim, Se-Hun;Lee, Sung-Ho;Kim, Dae-Kil
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

Decision Making on Standardization Strategy for Personal Information Security Using Importance-Performance Analysis (중요도-수행도 분석을 이용한 개인정보 보호기술 표준화 추진전략)

  • Koo, Kyoung-Cheol;Woo, Hoon-Shik;Jo, In-June
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.145-152
    • /
    • 2010
  • Under limited resources such as budgets and experts, it is necessary to make decisions for promotion strategy of standardization work items in Information and Communication Technologies (ICTs). This paper focuses on a method of setting standardization promotion strategies for each item of personal information security standardization. As a decision making tool, the Importance Performance Anaysis (IPA) is applied and analyzed to the decision processes. The results are showed and illustrated for useful inputs to practical policy making in the field of standardization activities.

Determinants of Consumer Trust in e-Business (e비즈니스에서 신뢰의 결정요인에 관한 연구)

  • Kwak, Won-Seob
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.29-44
    • /
    • 2004
  • The main objective of this study is to investigate the determinants of consumer trust in e-business. It examines consumer perceptions trust in a Web site and address following research questions: What factors influence consumer trust in a Web site and what specific Web site cues are associated with trust and satisfaction? We test our hypothesis in a empirical data from 568 consumers across 4 Web sites. By factor analysis, the results show that Web site characteristics are such as product information and purchase process , system stability, navigation, privacy(security), design, information of seller, pay methods, and customer service. We also find that brand and Web site characteristics such as Web site design, navigation, privacy(security), and customer service can explain over 59% of the variance in Web site trust and 60% in satisfaction. The results offer important implication for Web site strategies that include the manipulation of factors influencing Web site trust. And the future directions of the present research are discussed.

  • PDF

APT Attacks on Networks: Trends and Security (APT 공격의 분석 및 향후 보안)

  • Kim, Ki-Hawn;Kim, Hyun-Soo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.234-237
    • /
    • 2013
  • National institutions and companies worldwide are damaged through serious, advanced and persistent attacks. The cyber attack that occurred on March 20, 2013 in South Korea, emerged as a serious problem in highlighting the urgent need for future countermeasures. In this paper, we examine the APT attacks that occurred over the last two years. In particular, we discuss strategies for handling a cyber crisis in Korea, focusing on APT attacks that may occur in the future.

  • PDF

The strategies of disaster countermeasure for cultural properties which leads a Korea-Japanese comparative study. (한일 비교연구를 통한 문화재 방재대책)

  • Kim, Tae-Hwan
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.04a
    • /
    • pp.242-246
    • /
    • 2008
  • The culture property which is designated with the domestic national treasure and the treasure does not manage protection or preservation as value of culture property of national form. South Gate which is a national treasure class culture property (Soong le) put on the large calamity which is lost with this fire. This thesis intends to understand the aspects of security danger from the research on actual condition of safety supervision department in cultural properties of Korea and propose security plans against disasters to cultural properties through the comparative study with Japan which is advanced nation of culture property prevention of disaster.

  • PDF