• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.031 seconds

Culture Influence on Enterprise Planning Resource (ERP) Implementation In Saudi Arabia's Public Sector

  • Alzahrani, Ahmed Omar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.397-403
    • /
    • 2022
  • Enterprise resource planning (ERP) is widely adopted among enterprises and organizations. In recent years, researchers have become increasingly interested in factors related to ERP implementation success. In this paper, top management members, IT professionals, and end-users were interviewed in the study. The study used Hofstede's main cultural dimensions as a theoretical framework to identify cultural characteristics and their influence on ERP implementation within public organizations in Saudi Arabia. The study followed a qualitative methodology approach to carry on the study to investigate the national culture characteristics in Saudi Arabia that may influence ERP implementation success. The study found some culturally related factors that could influence success in ERP implantation projects in Saudi Arabia..

Design of Smartphone Secure Keypad Using Indirect Pattern (간접 패턴을 이용하는 스마트폰 보안 키패드 설계)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.7
    • /
    • pp.932-944
    • /
    • 2022
  • Smartphones, are currently equipped with high-performance hardware to process large amounts of data and provide most of the functions provided by desktop PCs. In addition, the smartphones enable quick user authentication through biometric information collected from embedded sensors. However, the biometric authentication method is sometimes rejected due to social and cultural environment, security vulnerabilities, and misrecognition rate. Thus, conventional authentication methods such as PIN and pattern authentication are still mainly used. Consider the latest foldable and bendable smartphones. These devices may be vulnerable to social engineering attacks as they use conventional authentication methods without considering their form factors. In this study, therefore, we propose an authentication method using partial elements of PIN and pattern authentication as a way to increase the security of the conventional authentication methods and consider the recent form factors. According to the performance evaluation results, our method provides improved safety compared to the conventional methods.

A Study on the Influence of Organizational Justice on the Industrial Security Supervisors' Compliance Motivations towards Security Policies: With a Focus on Organizational Attachment and Empowerment (조직공정성이 산업보안담당자의 보안정책 준수의지에 미치는 영향 : 조직애착과 임파워먼트를 중심으로)

  • Shin, Hyun-Goo;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.241-268
    • /
    • 2014
  • This paper is a study on the industrial security specialists of organizations in possession of industrial technology and their compliance motivations towards security policies. The focus is on organizational justice, organizational attachment and empowerment based on our hypothesis that compliance motivations are shaped, not only by the organization itself but, also by the attitude and principle of the organization's members. The objective is to propose a direction for administrative security policy to increase prevention of industrial technology leakage by identifying the factors' significance through hypothesis testing and thereafter investigating the influencing relationship. Survey questionnaires are collected from the participants of a regular educational program provided by the Korean Association for Industrial Technology Security (KAITS) and analyzed using SPSS 21.0 and AMOS 21.0 software. Through various statistical analyses, following results are acquired. First, procedural fairness and organizational attachment are found to motivate security supervisors to comply with security policies. Particularly, the relationship between procedural fairness and compliance motivations towards security policies is fully mediated by organizational attachment, suggesting that improved fairness at the organizational level will lead to an increase in organizational attachment, which will encourage the individuals to comply with security policies. Additionally, empowerment of the individuals in organizations partially mediates the relationship between procedural fairness and organizational attachment, confirming that procedural fairness empowers each individual and increases his organizational attachment. Specifically, in order to maximize compliance of security policies, businesses should demonstrate procedural fairness when compensating their employees for their work to empower them and increase their organizational attachment, which can increase their will to comply with existing security policies. This research provides insights into how to encourage security supervisors to comply with security policies by increasing their empowerment and organizational attachment.

  • PDF

The Influence of Private Security Guard's Stress Coping on Job Burnout (민간경비원의 스트레스 대처방식이 직무소진에 미치는 영향)

  • Lee, Man-Jong;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.209-232
    • /
    • 2013
  • As time goes by, the diversity of crime has become a serious social problem in modern society, and the policing is increasing the role of private security guards in order to fill the policing. But Private guards stressful experience to perform the actual work is exposed to various crisis situations. Then, private security guards should be management because of private security impact on job burnout. This study aims to determine the empirical work experience in the field of private security guards to cope with stress according to the degree of job burnout. The results are as follows: First, it was the negative effects of the stress coping strategies of private security guards on physical and psychological burnout, and the statistic effects of the wishes coping strategies of private security guards on physical and psychological burnout. Second, stress coping strategies of private security guards, were not found to affect the dehumanization of job burnout. Third, the center of the problem of private security guards of the ways to cope with stress coping was lacking in a static(+) affecting the accomplishment of the job burnout. Therefore, the different types of stress that may arise private security guards physically exhausted, psychologically exhausted, lack of accomplishment in the course of the private security business perform. Finally, Managers of the private security guards, job burnout occurs should be focused on the factors pre-management and co-ordination.

  • PDF

An Improvement in Level of Facility Security Operation (시설보안 운영수준 향상방안)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.205-225
    • /
    • 2012
  • This study is to present an improvement of facility security through the evaluation of facility security operation level. To fulfill the purpose of the study, a survey of some facilities was conducted and the result was analyzed as follows; First, although security personnels were deployed in the facilities, the level of security personnel operation was relatively low. Second, job education training level was relatively proper, that is relevant to the result that show the level of service mind and the working mind of security personnel were proper, also relevant to the relatively good work shift system. Third, although situation room was operated well, the level of restricted area set-up and access control of visitor were low, and the level of article inspection and vehicle access control were very low. Forth, the level of security manual application that include detailed security method and procedure was proper. But accident prevention and response manual application was lower than security manual application, that show preparation for fire and negligent-accident is passive. For the improvement of facility security, the high level part and low level part in the survey result could be merged. For example, we could specify factors that show low level in the survey such as security personnel operation, access control of visitor and vehicle, article inspection, accident prevention and response in the security manual and promote education circumstance that show high level.

  • PDF

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Understanding Relationships Among Risk Factors in Container Port Operation UsingBayesian Network

  • Tsenskhuu Nyamjav;Min-Ho Ha
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.93-99
    • /
    • 2023
  • This study aimed to determine relationships among risk factors influencing container port operation using Bayesian network. Risk factors identified from prior studies were classified into five groups: human error, machinery error, environmental risk, security risk, and natural disasters. P anel experts discussed identified risk factors to fulfil conditional probability tables of the interdependence model. The interdependence model was also validated by sensitivity analysis and provided an interrelation of factors influencing the direction of each other. Results of the interdependence model were partially in line with results from prior studies while practices in the global port industry confirmed interrelationships of risk factors. In addition, the relationship between top-ranked risk factors can provide a schematic drawing of the model. Accordingly, results of this study can expand the prior research in the Korean port industry, which may help port authorities improve risk management and reduce losses from the risk.

Security Technology in Tactical Internet (전술용 인터넷의 보안 기술 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.59-66
    • /
    • 2006
  • There is a tendency that next-generation tactical information network for the military has been developed from tactical environment based on commercial Internet technology to Tactical Internet(TI) of which purpose is providing various informations such as data, voice and image. On the other side, with an introduction of commercial information communication technology onto Tactical Internet had progressed rapidly on the basis of U.S. Army, threats and attack patterns against Tactical Internet have changed into various types gradually. In this paper, we will examine security factors and technologies to be considered in case of accepting Tactical Internet as a next-generation tactical information network, and discuss its countermeasures with those technologies for a basis.

  • PDF

Analysis of the GOP Border security systems of the ROK Army by Using ABMS and NOLH design (ABMS와 NOLH을 이용한 한국군 GOP 경계시스템에 관한 분석)

  • Oh, Kyungtack
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • In this study, the border security problem of the ROK Army is examined by applying the agent-based modeling and simulation (ABMS) concept as well as its platform, MANA. Based on the approximately optimized behavior of the infiltrator obtained using genetic algorithm (GA), we evaluate the GOP border security system which consists of human resources, surveillance, as well as command and control (C2) systems. We use four measures of effectiveness (MOEs) to evaluate its performance, and we apply a near optimal latin hypercube (NOLH) design to deal with the large number of factors of interest in our model. By using a NOLH design, our simulation runs are implemented efficiently. We hope the results of this study provide valuable data for deciding the configuration of the border security system structure and the number of soldiers assigned in the platoon.