• Title/Summary/Keyword: security cognition

Search Result 45, Processing Time 0.026 seconds

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Study on BAD USB Detection Technique based on User Cognition (사용자 인지 기반 BAD USB 탐지방안 연구)

  • Nam, Soyeon;Oh, Insu;Lee, Kyungroul;Yim, Kangbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.93-94
    • /
    • 2016
  • 사용자가 편리하게 사용하는 USB 인터페이스를 지원하는 컨트롤러 내부에 저장된 펌웨어를 조작하여 악의적인 행위를 수행하는 BAD USB가 출현하였다. BAD USB의 경우에는 악의적인 코드가 호스트에 존재하는 것이 아니라 장치 내부의 펌웨어에 존재하기 때문에 현재의 안티 바이러스 제품이 탐지하지 못하므로 그 대응방안이 시급하다. 이에 BAD USB를 탐지하고 대응하기 위한 연구가 활발히 진행되는 추세이지만, 아직 해결책으로는 미비한 실정이다. 따라서 본 논문에서는 사용자 인지를 기반으로 BAD USB를 탐지하는 방안을 제안한다.

  • PDF

A Basic Survey for Management of Elderly Day Care Centers (노인주간보호시설의 운영을 위한 기초조사)

  • Nam, Ki-Seok;Hwang, Ok-Nam;Hwang, Hye-Yeon;Yoon, Sook-Rye
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.5 no.2
    • /
    • pp.180-192
    • /
    • 2002
  • The purpose of this study was to survey basic data for management of elderly day care centers. In this study, occupation, leisure life, and food, clothing and habituation, as well as social relationship, health state and behavior, and general characteristics of subjects were examined to identify the factors affecting their cognition, need and preference of the day care centers. The subjects of this study were 392 elderly, aged 60 years or over, living in Gangnung and neighboring districts. Data were collected by educated interviewers from November 4 through November 22, 2002. The subjects were interviewed face to face, one for one after the interviewee's agreements on the survey. The collected data were analysed with logistic regression analysis by SAS (statistical analysis system). Logistic regression analysis was done to identify affecting factors for cognition, need and preference of the elderly day care centers. The major findings are as follows: 1. The factors affecting cognition for the day care centers were analysed. The subjects with an occupation and a lower satisfaction level of living environment and friendship, who were economically secure enough to manage a sudden accident, showed a higher level of cognition of the day care centers. The subjects with a higher level of mental health state and a lower level of IADL also showed a higher level of cognition. On the general characteristics younger female subjects showed a higher level of cognition. 2. The subjects with a lower level of perceived economic condition who did not own their housing and were not economically safe enough to manage a sudden accident, had showed a higher level of need for the day care centers. It showed that the subjects with a high level of mental health state, a bad eye sight and dental condition, a good perceived health condition, and a lower level of IADL, needed the centers. 3. The subjects who had an occupation, however, not capable of making their own daily expenses, and a low occupation satisfaction level, and who did not own their housing, and were economically poor not enough to manage a sudden accident, showed a higher preference for the day care centers. The subjects with higher levels of friendship satisfaction and perceived health condition, not living with their spouse, and a higher education level, showed a higher preference for the centers. In conclusion, the common factors affecting their cognition, need and preference of the day care centers were occupation, economic security enough to manage accidents, and friendship satisfaction level. Especially, the subjects who had an occupation, however, not economically secure enough to manage accidents, and who did not live in their own housing with a good perceived health condition, showed high levels of need and preference for the day care centers. These results can be used as basic data to develop the efficient elderly day care centers, thus contribute to the elderly welfare in a local community.

  • PDF

Regulation of International Economic-Legal Cooperation in the Field of Agricultural Production through the Prism of Information Technology Development

  • Matvieiev, Petro;Baadzhy, Nataliia;Gurenko, Maria;Myroshnychenko, Volodymyr;Feofanova, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • International economic and legal cooperation can ensure the transition of agriculture to the trajectory of sustainable development. The paper considers in detail the set of common goals and problems of an international nature, the solution of which is aimed at global legal regulation of cooperation between states. It is also noted about the impact of information technology on agricultural development. The following methods of scientific cognition are used: a historical, systematic approach to research, method of analysis, and synthesis. Research results: a scientific idea of the importance of international cooperation in general and global collaboration in the field of agricultural production in particular. It is stated that states are obliged to cooperate, regardless of differences in their political, economic, and social systems, in various areas of international relations to maintain international peace, security and promote worldwide economic stability and progress, the common good of peoples. It is emphasized the need to build such relations in the agricultural sector, which take into account the interests of all states.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

A Study on a Plan for Adaptation according to the Change of a Bodyguard's Social Cognition (경호직 근무자의 업무능력 증대방안에 관한 고찰)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.65-83
    • /
    • 2004
  • In modern society, the enterprises or the public organization have devised consistent means and methods with keen competition in high intelligence, high specialization and high competition for surviving in the struggle for existence. In the rapidly changing modern society like that, guard services are not free any more in the simple business. It will be survived only with consistent self-development and various abilities. Recently, it is on a trend that the enterprise including venture business requires the man of ability having many-sided thought, knowledge and capacity. That is, the era of a man with multi-function has come. The guards engaged in their present posts have to make efforts self-development consistently. And they have to work for self-development with theoretical knowledge acquirement about the expert knowledge escaping from simple function and business. The constitution including universities that train the guard should not adjust to the demand of quantitative manpower required in the enterprise organization with the training of the guard with simple functions only. It needs settlement as a curriculum with technology like ideology and knowledge breaking from short curriculum centered on function only in order to come to stay the recognition about guard services as expert services that the industrial society requires. The education centered on simple function should be replaced in the use of a high school, private academy and special guard institution. In addition, it requires a quality as the auxiliary, division, decision-making and spokesman according to the business role. Also, it requires the martial arts capacity, the communicative capacity, the sports or reports capacity, the guard driving capacity, the policy and assistant capacity and the information and analysis capacity, etc in individual. Lastly, it need each guard's change of cognition most of all. As part of the guard's adaptive plan according to the social change, it was enumerated like the mentioned above. It is important for the guard to prepare for the change of era and to build up quality and capacity before anything else.

  • PDF

Impact of Philosophical Anthropology and Axiology on the Current Understanding of the Institution of Human Rights

  • Buglimova, Olga V.;Goncharov, Igor;Malinenko, Elvira;Matveeva, Natalya;Stepanenko, Yuri;Chernichkina, Galina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.327-331
    • /
    • 2022
  • The article aims at studying the institution of human rights in an ever-evolving world in the context of the interdisciplinary approach. The main scientific method was deduction that allowed examining the specific interdisciplinary approach in relation to the institution of human rights on the global scale. To solve the issue set, it is necessary to study legal foundations and features of the interdisciplinary approach to the institution of human rights in the modern world. The article proves there is no theoretical anthropological understanding of the institution of human rights. It has been concluded that the appeal to anthropological jurisprudence requires the identification of the initial theoretical and methodological principles, parameters and axioms of cognition, the integration of a person into the subject field of legal science, linking jurisprudence with the chosen external environment (philosophy, sociology, theology, etc.), predetermining the existence (understanding) of a person, causing qualitative differences and the structure of subject-methodological phenomena. In addition to the identification of such hypotheses, prerequisites and axioms, the basic method (principle) of cognition and its heuristic potential are also being searched (defined). The terminological designation of the formed subject-methodological phenomenon (legal anthropology, anthropology of law, anthropological approach, etc.) reveals its role in the system of interdisciplinary relations of legal science.

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

A Study for New Paradigm Settlement on Business Security Management: Focus on Global Business (산업보안관리에 관한 뉴패러다임의 정립: 글로벌 비즈니스를 중심으로)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.355-386
    • /
    • 2014
  • Current business environment asks the fundamental changes about business security. The essences of these changes are that the security management of today's global business is important task of managers and the security practitioner is professional who needs very specialized education and training with business thinking. Rapid process of globalization of global village tore down the business limit that was restricted on the geological areas' limitation. Rapid business environments' change that is driving depends on development of science and technology with globalization needs new paradigm to keep business continuity. With the process of globalization, Korea, which importance is gradually increasing in the national economy, has trade dependent economic system, which keeps power of national economy through trade, so Korean economic tendency is accelerating. To keep competitiveness in global market, new strategy that is different with existing domestic business management is necessary. That is, capacity of coping with outside risk in domestic business management is established in some degree, but business activities in foreign countries faces at numerous unexpected risks that differ from country to country such as difference with the custom, changes of corporate governance etc. To cope with these new risks effectively, new paradigm for business risk is necessary. Especially, flexibility of thinking like new paradigm is necessary to cope with new security risk effectively. To cope with security risk that occurs in the new business environment effectively and competes against international company in global market, company management and members' changes of cognition about security and innovative changes in security policy is necessary. In the basement of these changes, there is expansion of business security tasks, improvement of report line, enhancement of professionalism and status of security officers, variation of hands-on workers and increasing of investment to the security etc.

  • PDF

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.