• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.024 seconds

Analysis of the effects of Information Security Awareness, Response Efficacy, and Compliance Behavioral Intention on Information Security Behavior: Focursing on Availability and Culture (정보보안 의식과 대처 효능감, 준수의향이 정보보안 행동에 미치는 영향분석: 가용성 차원과 문화 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.211-218
    • /
    • 2021
  • This study is composed of a convergence research design plan as the necessity of information security field dealing with human factors are raised. The purpose of this study is to analyze the effectiveness of the aspect of information security on the cognitive process related to security policy. The research method consisted of the cross-design of the availability dimension and the culture dimension, and the information security process was measured with information security awareness, response efficacy, compliance behavioral intention, and information security behavior. As a result of the study, the dimension of availability had a significant effect on response efficacy, and it was found that the influence of the case-based condition was greater than that of the statistics-based condition. The cultural dimension had a significant effect on information security awareness, response efficacy, compliance behavioral intention, and information security behavior, and the influence of the homogeneity condition was found to be greater than that of the diversity condition. The proposed research model was verified as a multiple mediation model reconstructed with measurement variables. In addition, the discussion describes the necessity of an information security strategy in consideration of individual factors and organizational characteristics.

Development of Measures of Information Security Policy Effectiveness To Maximize the Convergence Security (융합보안 강화를 위한 정보보안 정책 효과성 측정도구 개발)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2014
  • The information security policy is one of the most important tools for organization to manage the implementation and ensure the organizational security. However, we do not have metrics for measuring its effectiveness. The ultimate purpose of this study is to develop the measures of information security policy effectiveness. To do this, this study review data quality and information quality literatures and investigate appropriate subfactors for information security policy. Rooted in these concepts, we suggest accuracy, completeness, interpretability, and relevance from content aspect and understandability, concise representation, and amount from form aspect as factors for information security policy effectiveness.

Grand Strategy Framework for Information Systems Security in Organizations (조직 정보 시스템 보안을 위한 총괄 전략 프레임워크)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.7-21
    • /
    • 2009
  • Strategies have to be employed in information systems security in order to build and operate systems for information systems security in effective and structured manner. It is also essential for the entire organization to participate for successful implementation of the strategies and making them work. Current researches on information systems security strategy in organizations, however, have mainly been focused on deployment and operation of countermeasures based on strategic thinking and decision. In consequence, it is lack of research on overall frame for containing consideration factors required for moving and leading the whole enterprise for the holistic security purpose. Therefore, this paper proposes a framework for use in establishment of organization-wide information systems security strategies based on the concept of grand strategy from the traditional strategy research and on the four dimensional features of it.

  • PDF

A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers (정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구)

  • Kim, Geunhye;Park, Kyudong;Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.451-463
    • /
    • 2019
  • The purpose of this study is to identify the effects of organizational conflict stages and job withdrawal intention of information security organizations. We applied Pondy's conflict theory and analyzed the case of information security workers in public enterprises. We found that the more information security workers emotionally accept the potential factors of organizational conflict, the higher the intention of job change of information security practitioner. On the other hand, the perception mechanism has a moderating effect of lowering the job change-out probability. The result of this study is expected that the manager of the organization will be able to utilize the conflict in the organizational direction.

Smart City Security Management in Three Tier Smart City Management System (쓰리 티어 방식의 스마트시티 관리시스템에서의 보안 관리)

  • Hwang, Eui-Dong;Lee, Yong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.25-33
    • /
    • 2019
  • The security of the data dealt by the smart city system is important because they have many privacy and public information. Therefore, it is necessary to study security in the smart city system. In this paper, we define the security factors for the smart city system composed of three tiers and describe the technologies for each. In addition, the design and implementation of the security layer in the Smart City middleware for the security management of the urban component in the Smart City Infrastructure and middleware, which is one of the most important issues in the Smart City system, is introduced.

Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey

  • Al-Amri, Bayan O;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.245-251
    • /
    • 2021
  • This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software security.

Mediating Role of Empowerment in the Relations to Job and Organizational Factors, and Job Satisfaction and Organizational Commitment - Empirical Evidence from National University Hospital Employees - (직무요인, 조직요인과 직무만족, 조직몰입의 관계에서 임파워먼트의 매개역할 - 국립대학 병원근로자들을 중심으로 -)

  • Lee, Hae-Jong;Yoon, Bang-Seob
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.3
    • /
    • pp.315-324
    • /
    • 2005
  • Objectives : The aim of this study was to examined the mediating role of empowerment in relations to job and organizational factors, and job satisfaction and organizational commitment in hospital organizations. Methods : Job variety, clarity, significance, and fitness were examined as the job factors, and security, reward justice, and organizational support as the organizational factors. Data were collected from 8 national university hospitals with 1,289 data points used for the final analysis. Results : All the job factors were found to positively influence empowerment, as were all the organizational factors, with the exception of reward justice . As hypothesized, empowerment had significant effects on both job satisfaction and organizational commitment, and was the most influential variable of all those examined. Conclusions : In the relations to job satisfaction, empowerment completely mediated job significance, security and organizational support, and partially mediated all other variables, with the exception of reward justice. In the relations to organizational commitment, empowerment completely mediated job variety and job fitness, and partially mediated all other variables, with the exception of reward justice. The theoretical and practical implications of these results have been discussed.

A Study on Factors Influencing Acceptance Intention of Fintech -Focusing on Mobile Payment Service- (핀테크 수용에 영향을 미치는 요인에 관한 연구: 모바일 결제 서비스를 중심으로)

  • Lee, Jae Kwang;Kim, Jong Moo;Lee, Kang Eun;Yoon, So Ra;Jo, Hyeon
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.181-199
    • /
    • 2017
  • Recently, the Fintech industry is growing rapidly, and mobile payment service plays a key role in this growth. The purpose of this study is to investigate factors affecting initial acceptance of mobile payment service using Technology Acceptance Model. In the research model, service-related factors such as economic efficiency and security, user-related factors such as user innovativeness and social factors such as social influence were adopted as external variables, and acceptance intention was introduced as dependent variable. Perceived usefulness and perceived ease of use were selected as mediating variables. The collected data were analyzed using SPSS Statistics v22 and Smart PLS 2.0. The results of the study are as follows. First, service-related factors such as economic efficiency and security did not affect the user acceptance intention. Second, individual innovativeness and social influence have significant effects on perceived usefulness and perceived ease of use respectively. And the perceived usefulness and perceived ease of use, which are mediators, have a significant influence on the acceptance intention of mobile payment service. The results of this study will serve as a useful guide for Fintech industries.

A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network (내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1315-1322
    • /
    • 2011
  • Recently, The Problem of Global Warming around the world, is emerging as a very serious environmental problems, and as a way to fix it 'Green IT' is becoming an Issue. In these situations the evolution of network technologies with a various attacks, it appears, add the different security devices and systems are deployed. But, Deployment methods such a network, the performance and security of the internal network will affect on the greater and it will be increase Carbon Dioxide emissions. Therefore, In this paper, it will be to analyze Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network. and In a future, This paper is expected to serve as a valuable Information for the Network Performance and Security improvements and to reduce Carbon Emissions in the Field of IT.

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.