• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.039 seconds

An Understanding of Impact of Security Countermeasures on Persistent Policy Compliance (보안 대책이 지속적 보안 정책 준수에 미치는 영향)

  • Park, Chul-Ju;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.23-35
    • /
    • 2012
  • The goal of this study is to identify factors that influence on the persistent information security compliance intention of employees. Antecedents suggested in research model are security awareness training and perceived effectiveness of information security policy. Research results show that security awareness training has a positive effect on persistent information security compliance intention as well as effectiveness of information security policy. While policy breadth, which is one of the effectiveness of information security policy, influences on persistent information security compliance attitude and intention, policy brevity does not effect on persistent information security compliance intention. Conclusions and implications are discussed.

Factors Influencing on the Compliance of Information Security Policy of Workers of Shipping and Port Organization (해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.1-23
    • /
    • 2012
  • Advances in information technology has brought many benefits to businesses, but at the same time, businesses are facing serious problems caused by its use such as information leakage. In order to cope with problems, companies have established information security policies, demanding workers of a company to be compliant with the policies. This study proposes a research model that includes information security awareness, information security attitude, self-efficacy, standard belief and social influences as factors that affect the compliance of information security policy among the workers of shipping and port organization. The results of this study showed that there was a positive relationship not only between the information security awareness and the information security attitude, but also between the information security attitude and the information security policy among the workers of shipping and port organization. It was also found that there was a positive relationship between the self-efficacy and the compliance of information security policy, and between the social influence and the compliance of information security policy. However, there was no meaningful relationship between the standard belief and the compliance of information security policy. This study examined to what extent the workers of shipping and port organization that have a high possibility of the information leakage were compliant with the information security policy. The findings will contribute to organizations of shipping and port who attempt to establish strategies related to information security.

FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization (FDANT-PCSV: Parallel Coordinates 및 Sankey 시각화를 이용한 신속한 이상 트래픽 탐지)

  • Han, Ki hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.693-704
    • /
    • 2020
  • As a company's network structure is getting bigger and the number of security system is increasing, it is not easy to quickly detect abnormal traffic from huge amounts of security system events. In this paper, We propose traffic visualization analysis system(FDANT-PCSV) that can detect and analyze security events of information security systems such as firewalls in real time. FDANT-PCSV consists of Parallel Coordinates visualization using five factors(source IP, destination IP, destination port, packet length, processing status) and Sankey visualization using four factors(source IP, destination IP, number of events, data size) among security events. In addition, the use of big data-based SIEM enables real-time detection of network attacks and network failure traffic from the internet and intranet. FDANT-PCSV enables cyber security officers and network administrators to quickly and easily detect network abnormal traffic and respond quickly to network threats.

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.

Improvements of Legal System for Security Enhancement of Korean National Assembly' Attending System (국회 방청제도의 보안강화를 위한 법·제도 개선방안)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2017
  • The purpose of this study is to analyze any hinderance factors for successful attending system of Korean National Assembly and to provide improvement plans of legal systems to ensure security of National Assembly. First, the conceptualization and functions of Korean National Assembly attending system were discussed and related regulations and laws were also examined. Second, hinderance factors, such as sharp increase in 1) illegal behaviors, 2) bring in prohibited items, and 3) possibility of National Assembly terror, for successful attending systems were analysed. Third, improvements of legal system for security enhancement of National Assembly Attending System were discussed: 1) new legislation for providing National Assembly's security officers with special judicial police power is needed to deal with criminal behaviors and to protect human rights, and 2) legal reforms are required to provide right to command to National Assembly's Security Planning Office rather than National Assembly security office under Seoul Metropolitan Police Agency in order to unify commanding system.

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

Inner and Outer Resources of Coping in Newly Diagnosed Breast Cancer Patients : Attachment Security and Social Support

  • Woo, Jungmin;Rim, Hyo-Deog
    • Korean Journal of Biological Psychiatry
    • /
    • v.21 no.4
    • /
    • pp.141-150
    • /
    • 2014
  • Objectives The purpose of this study is to evaluate the effects of attachment security, social support and health-related burden in the prediction of psychological distress and the mediation effects of social support and health-related burden in relationship between attachment security and psychological distress. Methods Finally, 161 patients were included for the analysis. Chi-square test and independent samples t-test were used for comparing differences between depressive/anxious group and non-depressive/non-anxious group. For evaluating the relationship among attachment security, social support, psychological distress and health-related burden, structural equation modeling analysis were performed. Results 40.7% and 32.0% of the patients have significant depressive symptoms and anxiety symptoms, respectively. In the analysis for testing the differences between groups who have psychological distress and who have not, there were no significant differences of sociodemographic factors and medical characteristics between groups, except for association between depressive symptoms and type of surgery (p = 0.01). Contrary to sociodemographic and medical characteristics, there were significant differences of health-related burden and two coping resources (attachment security and social support) between groups (all p < 0.01), except for the support from medical team in between anxious group and non-anxious group (p = 0.20). In the structural equation model analysis (Model fit : chi-square/df ratio = 0.8, root mean square error of approximation = 0.000, comparative fit index = 1.000, non-normed fit index =0.991), attachment security and social support emerged as an important predictor of psychopathology. Conclusions Attachment security and social support are important factors affecting the psychological distress. We suggest that individual attachment style and the social support state must be considered to approach the newly diagnosed breast cancer patients with psychological distress.

Comparison of Health Status and Life Satisfaction According to Food Security in Single-Person Households of Elderly Population

  • Dong Hoon Jung;Jae Won Han;Wonha Kim;Hee-Sook Lim
    • Clinical Nutrition Research
    • /
    • v.13 no.1
    • /
    • pp.42-50
    • /
    • 2024
  • This study analyzed the 2019 Community Health Survey data to compare and analyze the health levels and life satisfaction of single-person elderly households based on food security. The final study subjects were 15,606 single-person elderly individuals aged 65 and above. These subjects were classified based on their response to food security into three groups: food sufficient-diverse, food sufficient-not diverse, and food insufficient. The study results showed that the proportion of the food insufficient group among single-person elderly households was 7.4% for men and 10.6% for women, with a slightly higher rate for female elderly. Both male and female elderly over 80 years of age, with low education levels, and basic living support recipients showed significantly higher proportions in the sufficient-not diverse and food insufficient groups. For male elderly, significant differences were observed in subjective health status and oral health level in the food insufficient group, and for female elderly, stress levels also showed significant differences. Life satisfaction scores were generally lower for female elderly compared to male, and significant differences were found in both male and female elderly based on food security. Common factors that significantly influence life satisfaction among single-person elderly households, both male and female, include food security, subjective health status, and living environment satisfaction, with food security being the most impactful factor. The study suggests that it is necessary to include these significant factors in the development of various social activity programs, such as dietary programs, to enhance life satisfaction and food security of single-person elderly households.

Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)

  • Urunov, Khamdamboy;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.506-523
    • /
    • 2015
  • The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.

A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks (은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구)

  • Shim, Joonbo;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.