• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.027 seconds

Influence Factors and the Introducing Outcomes over IT Outsourcing in the Government Offices (공공기관의 정보시스템 아웃소싱에 미치는 영향 요인과 도입 성과)

  • Jun, Je-Man;Yi, Seon-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.339-351
    • /
    • 2013
  • In this research, we analyzed the influence factors and introducing outcomes empirically. The influencing factors over IT Outsourcing set up organizational factors(maturity of information system, the support of CEO), dealing factors(asset speciality, uncertainty, degree of using of information system), and risk factors(risk of safety/security. cost increase, loss of autonomy). The result of this study are as follows. In the organizational factors, degree of a maturity of the information system and the support of CEO were analyzed as the variables affecting the introducing outcomes positively. In the dealing factors, however, the degree of using information system was only analyzed as the variables affecting the introducing outcomes positively, while the speciality of asset and the uncertainty factors were analyzed as the variables not affecting the introducing outcomes. In the risk factors, the risk of safety/security and the increase of cost were only analyzed as the variables affecting the introducing outcomes positively, therefore loss of autonomy, was not analyzed as the affecting variables.

Determinants of ASP Effectiveness in Small-Medium Enterprises (중소기업 ASP 효과의 결정요인에 관한 연구)

  • Mun, Yong-Eun
    • Journal of Digital Convergence
    • /
    • v.4 no.1
    • /
    • pp.93-109
    • /
    • 2006
  • Several studies have investigated the success of ASP from various perspectives. This study, thus, investigated factors affecting ASP effectiveness in various literature relevant ASP and outsourcing. By applying the basic ideas of the IS success model, this study proposes a research model of the factors affecting the success of ASP, in term of internal factors(Top Management Involvement, User Participation, Size of Organization, IS Maturity) and Reliability factors(Transaction Reliability, After-Sale Reliability, System Reliability, Security). The proposed model is expected to provide a guideline to researchers and practitioners extend their understanding of the success factors of the ASP effectiveness.

  • PDF

Investigating of Psychological Factors Affecting Information Security Compliance Intention: Convergent Approach to Information Security and Organizational Citizenship Behavior (정보보안 준수의도에 대한 사회심리적 요인 분석: 정보보안과 조직시민행동이론 융합)

  • Han, Jin-Young;Kim, Yoo-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.133-144
    • /
    • 2015
  • In digital convergence environment, information security management plays crucial role in maintaining firms' competitiveness. Organizational citizenship behavior(OCB) enables informations security countermeasures to be more effectively worked by helping employees to have much knowledge of information security policy, by facilitating employees to participate in information security education/training. Thus, the purpose of this study is to investigate the mediating effect of OCB on the relationships between information security countermeasures and compliance intention. Questionary was designed based on prior information security research, and survey was conducted among companies' employees across the industry. Results showed that information security policy and information security education/training were found to be key predictors of compliance intention. In addition, OCB was proven to mediate the relationships between information security countermeasures and compliance intention.

A Study on Private Security in the 1980s (1980년대의 민간경비연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.43-51
    • /
    • 2016
  • In the 1980s, private security was established in the framework of institutional framework with the Security Industry Act which was enacted in 1976. The agents who brought in the development of the private sector in 1980 enjoyed a boom in the global economy, affected by its high-flying dollar value, low international interest rate, low oil prices, and the blooming economy. In addition, the semiconductor, computers and communications equipment that was promoted in accordance with the e-Literacy plan were raised. Following the economic development of various events such as Seoul International Trade Fair, "86 Asian Games," and "88 Seoul Olympic Games," private security expenses were enhanced by increasing awareness of civilian expenses. Also, in the 1980s, Korean investment in foreign companies, including Japan's Secom, or Korean technology, brought many changes to the private security. Meanwhile, the cost of security, which has been centered around human expenses, has brought about the era of mechanized spending, or machine security expenses. The purpose of this study is to systematically analyze the social environment surrounding the private security in the 1980s and systematically analyze the important factors that contribute to private security.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

A Study on Women's Casino Security Employees (여성 카지노 시큐리티 종사원에 관한 연구)

  • Kim, Hyeong-seok
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.135-158
    • /
    • 2020
  • In casinos, security personnel who manage the safety of customers and employees play a very important role. In particular, there is a high percentage of female employees in casinos, and because the ratio of female and male employees is similar, the probability of female customers or female employees experiencing accidents may be similar to or higher than that of males. Women's security agents who handle women's case accidents can provide female customers and employees with a security service that only women can do. However, most of the agents doing security work at casinos are male, and the proportion of women is very low. Therefore, this research is about employees who are currently working as women in casinos and conducted qualitative research to find out about various experiences they experienced while working in the casino. A total of five study participants were interviewed three times to analyze and categorize the data collected. The first question is the professor's recommendation, his personal information search and his acquaintance's recommendation. The second question, the factors behind the necessary skills at work, are various athletic skills, good physical conditions and foreign language skills. In the third question, the satisfaction factors of the task are the scarcity value of the work, the satisfaction of the pay, the suitability of the individual and the expectation of the future, and the unsatisfactory factors of the work are the risk of the work, the stress on the customer, the discrimination against the sex, the gaze around, the tiredness of the shift work. In the fourth question, factors on the need for female casino security agents are providing differentiated services to female customers, protecting female employees and providing opportunities for women in related majors. The results of this study were interviewed by an expert of more than 20 years in the casino security business, and female casino security agents said that since it is a necessary requirement, they should seek a direction for development through institutional and cognitive improvement.

A Study for Analysing Key Factors for Establishing the Omni-Channel Customer System in a Financial Enterprise Using ANP (ANP 모형을 이용한 금융기업의 옴니채널 고객 시스템의 중요 구축 요소 분석)

  • Hwang, Hyun-Cheon;Kim, Woo-Je
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.50-60
    • /
    • 2020
  • The omni-channel customer system is the communication system between enterprise and customer via multiple channels such as mail, email, SMS, and mobile. The omni-channel customer system complements each other channel through the integration of each channel. The purpose of this research is to derive key factors and calculate the weights that a financial enterprise considers when adopting the omni-channel customer system. For this research, we analyzed the request for proposal documents used for the omni-channel customer system implementation projects in the financial enterprise. Also, we derived, classified, and stratified the key factors to be considered for the introduction of the omni-channel customer system in the financial enterprise. As a result of analyzing the key factors, customer experience, operations, and security were identified as the components of the top category in introducing the omni-channel customer system in the financial sector. Furthermore, the weight for each key factor was calculated by using ANP. As a result of ANP, operations, customer experience, and security were important in order. Also, the degree of easiness for connecting with other systems and the various abilities for representing the contents of the omni-channels were derived as the important key factors.

Formation of Scenarios for The Development of The Tourism Industry of Ukraine With The Help of Cognitive Modeling

  • Shelemetieva, Tetiana;Zatsepina, Nataly;Barna, Marta;Topornytska, Mariia;Tuchkovska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.8-16
    • /
    • 2021
  • The tourism industry is influenced by a large number of factors that affect the development scenarios of the tourism in different ways. At the same time, tourism is an important component of the national economy of any state, forms its image, investment attractiveness, is a source of income and a stimulus for business development. The aim of the article is to conduct an empirical study to identify the importance of cognitive determinants in the development of tourism. The study used general and special methods: systems analysis, synthesis, grouping, systematization, cognitive modeling, cognitive map, pulse method, predictive extrapolation. Target factors, indicators, and control factors influencing the development of tourism in Ukraine are determined and a cognitive model is built, which graphically reflects the nature of the influence of these factors. Four main scenarios of the Ukrainian tourism industry are established on the basis of creating a matrix of adjacency of an oriented graph and forecast modeling based on a scenario approach. The practical significance of the obtained results lies in the possibility of their use to forecast the prospects of tourism development in Ukraine, the definition of state policy to support the industry that will promote international and domestic tourism.

Emerging Trends in Cloud-Based E-Learning: A Systematic Review of Predictors, Security and Themes

  • Noorah Abdullah Al manyi;Ahmad Fadhil Yusof;Ali Safaa Sadiq
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2024
  • Cloud-based e-learning (CBEL) represents a promising technological frontier. Existing literature has presented a diverse array of findings regarding the determinants that influence the adoption of CBEL. The primary objective of this study is to conduct an exhaustive examination of the available literature, aiming to determine the key predictors of CBEL utilization by employing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology. A comprehensive review of 35 articles was undertaken, shedding light on the status of CBEL as an evolving field. Notably, there has been a discernible downturn in related research output during the COVID-19 pandemic, underscoring the temporal dynamics of this subject. It is noteworthy that a significant portion of this research has emanated from the Asian continent. Furthermore, the dominance of the technology acceptance model (TAM) in research frameworks is affirmed by our findings. Through a rigorous thematic analysis, our study identified five overarching themes, each encompassing a diverse range of sub-themes. These themes encompass 1) technological factors, 2) individual factors, 3) organizational factors, 4) environmental factors, and 5) security factors. This categorization provides a structured framework for understanding the multifaceted nature of CBEL adoption determinants. Our study serves as a compass, guiding future research endeavours in this domain. It underscores the imperative for further investigations utilizing diverse theoretical frameworks, contextual settings, research methodologies, and variables. This call for diversity and expansion in research efforts reflects the dynamic nature of CBEL and the evolving landscape of e-learning technologies.

A Suggestion on the Traffic Flagger System in Japan (일본 교통유도 경비제도의 시사점)

  • Kim, Il-Gon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.200-203
    • /
    • 2010
  • The obstructive factors of the smoothly running traffic are street improvement, major commercial buildings like department stores, the large markets, the stadiums, the concert buildings, a lot of steady cars for using parking lot. The accident of cost many lives and traffic congestion from these factors cause the result that it enables to pay the enormous expenditure socially and financially. For solving these problems, Japan adopts the Traffic Flagger System in 1972. This task has the effects of improving traffic flow in the traffic jam and mitigating risk of car accidents as leading pedestrians and vehicles thereby the task carries into effect in the area where the accident took place. Moreover, this security task is rapid growth after adopting and 59.6%(5,317) of the whole security company 8,924 in Japan based on December 2009 registered as the traffic leading security business. While South Korea is demanded of the measures about obstructive factors of the smoothly running traffic, it represents the limitation of the system and the safety management. Thus the current study suggests the we will analyze South Korea's actual condition and then discuss the law and education system for a realizable plan reached the public-Private cooperation for adopting Japan's Traffic Leading Security System.

  • PDF