• Title/Summary/Keyword: Technical Security

Search Result 943, Processing Time 0.024 seconds

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Empirical analysis on Information Management Performance Impact of Information Security activities (정보보호 활동이 정보경영성과에 미치는 영향에 관한 실증분석)

  • Son, Tae Hyun;Park, Jung Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.205-213
    • /
    • 2015
  • This study aims to verify the structural correlation empirically between information security performance and information management performance. To verify the correlation, three factors such as managerial controlled activity, technical controlled activity, and physical controlled activity are divided for the information security activities variable. the security performance are divided into accident prevention and accident response variables. As a result, security organization activity is a unique factor being positively significant to information security and management performance. And three activities such as human security, security training, development security do not affect at all on both information security and management performance.

Information Support for Economic Growth and Security under the Influence of COVID-19

  • Shenderivska, Lina;Lazorenko, Taisiіa;Butkevych, Oksana;Khomenko, Andrii;Shuprudko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.206-212
    • /
    • 2022
  • The main purpose of the article is to study the peculiarities of the formation of information support mechanisms for economic growth and security under the influence of COVID-19. The cyclical nature of economic growth is a well-established and proven fact. In this context, one of the main tasks of the state is to develop measures to mitigate the impact of economic crises on the entire economic system of the state, individual economic entities, as well as to introduce anti-crisis mechanisms and tools to support the economy. When the cyclical nature of economic crises coincides with destabilizing processes in society, such as natural disasters, military actions or epidemics, the role of the state and adequate information support for economic growth is sharply actualized. As a result, an analysis was made of the main aspects of information support for economic growth and security in the context of COVID-19.

INTELLECTUAL CAPITAL AS THE BASIS FOR THE DEVELOPMENT OF CREATIVE INDUSTRIES

  • Hanna Kostromina;Olha Potishchuk;Tamara Rudenko;Maryna Pushkar;Oksana Romaniuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.208-214
    • /
    • 2023
  • Globalization and the development of technology have turned creativity into a necessity. Numerous countries consider creativity to be the major model of economic development. In this era of the knowledge-based economy, creativity is becoming a catalyst for the development of millions of people around the world. Irina Bokova, the former Director General of UNESCO, has stated that the cultural and creative industries have a capital of 2 250 billion US dollars, almost 30 million jobs worldwide in the economies of advanced countries and developing countries (Cultural Times, 2015). Copyright is a branch of intellectual property with a wider scope, forasmuch as it applies to every product of literary, scientific and artistic works in all forms of expression, relating to certain levels of originality.

Digital Transformation Requirements at Saudi Universities from Faculty Members' Perspectives

  • Taha Mansor Khawaji
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.8-20
    • /
    • 2023
  • The current study aims to determine digital transformation (organizational, technical, and human resources) requirements at Saudi universities from Umm Al-Qura University faculty members' perspectives. The researcher used a quantitative approach based on the descriptive analytical design. To answer the questions of the study, the researcher used the questionnaire as a data collection tool. The questionnaire was sent electronically to faculty members working in colleges and institutes affiliated with Umm Al-Qura University in Makkah Al-Mukarramah, Saudi Arabia. The questionnaire consisted of the three dimensions of digital transformation: organizational; technical; and human resources requirements. The results showed that requirements related to human resources came first with an average of 2.25 then the organizational requirements with an average of 1.95, and in the last, technical requirements came with an average of 1.64. In addition, some suggestions were given by the participants (faculty members) related to the mechanism that could contribute to implementing digital transformation at Saudi universities. Likewise, at the end of the study, the researcher has given some suggestions related to the implementation of digital transformation requirements at Saudi universities.

The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO) (개인정보관리자의 책임과 벌칙의 형평성)

  • Kim, Beom-Soo
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2011
  • The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

The Order of Formation of Information Signals in IIoT

  • Alla Jammine;Serkov Alexandr;Bogdan Lazurenko;Nait-Abdesselam Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.139-143
    • /
    • 2023
  • In this article we propose using mathematical models of signals in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals.

An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance (정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구)

  • Kim, Hye Jung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.147-164
    • /
    • 2013
  • For the continuous information security governance, we have to focus on not just technical aspects like access control and DRM, but informal level management like information security(IS) behavior, culture, and personal value. But there are few informal level studies, while many formal level studies of IS governance or technical means. This study is an empirical test that how IS culture, normal beliefs, personal behavior and value affect employee's deviant behavior. And we define a lack of an awareness of value and importance on IS regulations in organizations as "Information Security Anomie" with the concept of anomie, a viewpoint on social organization.