• Title/Summary/Keyword: security effectiveness

Search Result 820, Processing Time 0.025 seconds

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

A Study on Weight of the Factors for Improvement of Air Passenger Security Screening Performance and Service (승객보안업무 성과 개선과 서비스 수준 향상을 위한 업무 책임 주체에 관한 연구)

  • Shin, H.S.;Yoo, K.E.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.4
    • /
    • pp.29-42
    • /
    • 2005
  • The passenger security screening is a mandatory procedure for boarding the aircraft according to ICAO standard as well as national law of each country. The enhanced threat of terrorism have had the security procedure strengthened since 9/11 events. However the effectiveness of passenger screening is not satisfactory and the service level for passenger is getting worse because of tightened security measurements. This research studied the responsibility issue for the enhancement of the effectiveness and service quality in passenger security screening. The study concluded that a desirable responsibility assignment for passenger screening is to the airport authority at normal time and to the government authority at the time of high threat.

  • PDF

Effects of Job Characteristics and Organizational Effectiveness of Security Guard on Martial Arts of Security Service Guard (경호무도 수련이 민간경비원의 직무특성과 조직효과성에 미치는 영향)

  • Jung, Sung-Sook;Chang, Ye-Chin;Choi, Hyeon-Sik;Choi, Dong-Bok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.449-464
    • /
    • 2007
  • The Guard might focus on a king's personal safety in the wake of the system of the Silla and Taebong dynasties until the establishment of the Goryeo Dynasty's unique political system. The purpose of this research is to examine gob characteristics and organizational effectiveness of security guard on martial arts of security service guard. The subjects of this study are private guard as working security companies of Seoul and Kyongi area and 250 persons. It was a method of questionnaire for this study and used a questionnaire developed by Hackman and Oldham(1976) for gob characteristics and used a questionnaire developed by Tymon(1988) for organizational effectiveness that translated and modified from Kim, Ilsoon and measured by 5 point likert. It used to analyze the data for one-way ANOVA and multiple regression analysis. There are conclusions of this study. First, there was a partially difference on god characteristics and organizational effectiveness of population statistical character. Depending on sex, 'female' group was high, depending on the age, '46 year-old+ group' was high, depending on the educational level, 'bachelor group' was high, depending on the income, '400manwon+ group' was high. Second, it becomes positive result to the period, the frequency and the intensity of security martial arts practice. Third, it happened that gob characteristics is increase and organizational effectiveness is also positive way.

  • PDF

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

The theoretical study of Organizational Effectiveness (Indicators developed for the military security personnel evaluation) (조직효과성의 이론적 고찰(군사보안 담당자 평가를 위한 지표개발))

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.91-97
    • /
    • 2015
  • When we estimate any organization, we can use scientific tool such as organizational effectiveness. It is very difficult to know the level of organizational goal. If you plan how to assess the effectiveness of your organization, It is a complex and difficult problem, because a few social scientist think that there are many point of view of an concept of organizational goals based on the relatively concrete concept of organizational effectiveness. Social scientist Campbell insist that it is impossible to estimate organizational effectiveness accurately. So we should develope the perfect method to measure the organization as a system, the member's self satisfaction, the efficiency of the team. To achieve a good organizational effectiveness, we should study the method of approach about organizational effectiveness. This is theoretical study and show that the concept and method of approach about organizational effectiveness.

A Security Evaluation Model On Multiple Protection Countermeasures (다중보호대책에 대한 보안성 평가모델)

  • 오경희
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.3-15
    • /
    • 1998
  • 본 논문에서는 다중보호대책으로 구성된 정보보호시스템의 보호효과를 평가하기 위한 새로운 모델을 제안한다. 제안한 모델은 정보보호시스템이 요구되는 보호수준에 부합하는지 결정할 수 있게 하며, 또한 구축된 정보보호시스템의 위혐분석을 위하여 활용될 수 있다.

The Psychometric Properties of Effectiveness Scale in Distance-Digital

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.149-156
    • /
    • 2021
  • This study intended to test the structure of the latent factor of an effectiveness scale and the stability of invariance across groups of students' classifications (gender and levels of education). In the large, non-clinical sample (850), students completed the effectiveness scale. The (CFA) confirmatory factor analysis was used to investigate the factor-structure of the measure, and multiple-group confirmatory factor analysis (MGCFA) model was used to test the stability of invariance across groups of students' classifications. The findings of the CFA indicated support for the original four-factor model. Additional analyses of the MGCFA method support the measurement (configural, metric and strong) invariant and practical invariant components of this model. There was an invariant across gender. There was partially invariant across groups of levels of education. The scale exists in groups of levels of education assess the same concepts of, excluding Items 15 and 10. Given that this study is the first investigation for the structure of the effectiveness scale.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

A Plan to Improve Core Job Skills through the Level Management System : Focusing on the X-ray Screening Rating System (수준관리체계를 통한 핵심 직무역량 향상 방안 - 보안검색요원 판독등급제 중심으로 -)

  • Kim, Dong Min;Baek, Jeong Seon
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.677-689
    • /
    • 2023
  • Purpose: The purpose of this study is to design a x-ray screening rating system to improve X-ray screening ability, which is a core job competency of security screener at Incheon International Airport, and to verify its effectiveness through empirical analysis to suggest ways to improve the level management system. Methods: In this study, the effectiveness of the research model was analyzed using T-test tests for effect analysis based on the empirical analysis results derived through the competency evaluation model, the screening rating system. Results: The results of this study are as follows. The average score for regular education before the implementation of the x-ray screening rating system was 94.1 points, but after the implementation of the x-ray screening rating system, the average score for regular education was 95.5 points, an average of 1.4 points increased. In addition, the proportion of those with 95 or more points classified as high scorers also increased significantly from 51.1% to 69.3%. Conclusion: The X-ray screening rating system of security inspectors will systematically manage the level of screening ability, which is a key job competency, and play a strong role in improving competency, while preventing security accidents through early identification and intensive training of level-lowers.

Establishment and Effectiveness Analysis of Emergency Vehicle Priority Signal Control System in Smart City and Directions for ISMS-P Technical Control Item Improvement (스마트시티 내 긴급차량 우선신호 제어시스템 구축과 효과성 분석 및 ISMS-P 기술적 통제항목 개선 방향성 연구)

  • Yoon, TaeSeok;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1166-1175
    • /
    • 2021
  • We investigate the current situation and development trend of domestic smart city and emergency vehicle priority signal control system analyzing the existing effectiveness of 1) emergency vehicle priority signal control system and 2) control emergency vehicle priority signal, based on domestic and foreign prior research for signal control system security. The effectiveness of time reduction was analyzed through actual application and test operation to emergency vehicles after establishing the system. In addition, for security management and stable service of real-time signal system control we propose improvement for the technical control items of the ISMS-P certification system to secure golden time to protect citizens' precious lives and property in case of emergency by classifying and mapping the existing ISMS-P certification system and the Korea Internet & Security Agency's cyber security guide according to the items of security threats.