DOI QR코드

DOI QR Code

Research on Security Threats for SMEs by Workplace in the COVID-19 Environment

  • 투고 : 2022.05.28
  • 심사 : 2022.06.09
  • 발행 : 2022.06.30

초록

Although telecommuting of SMEs has been activated due to the COVID-19 phenomenon, the security model for this is insufficient. Accordingly, the study was divided into threats centered on smartphones and threats centered on smartphone users. As a result of the study, one-third of SMEs are working from home. At this company with 100 employees, more than 50% of them work from home.and In the metal, machinery and chemical industries with factories, 20% of them work from home. As a result of analyzing the correlation between telecommuting according to the presence or absence of a factory, the correlation coefficient (r=-.385) has a clear linear relationship. And, as a result of the regression analysis, the R-squared value was 0.148, so companies with factories are highly related to telecommuting. In other words, we found that SMEs with factories do not want to work from home. In addition, as a result of analyzing the level of security threats, there were great concerns about theft, hacking, and phone taking during remote work. As limitations of the study, there were difficulties in selecting SMEs from the population in a non-face-to-face work environment, and there were limitations in the questionnaire items for deriving a non-face-to-face work environment.

키워드

참고문헌

  1. S. K. Park, G. Bong. Kim, G. J. Son, W. S. Lee, & J. P. Park, "A study on a security model for the establishment of a non-face-to-face smart work working environment in a physical network separation environment of public institutions", Journal of the Korea Convergence Society, Vol. 11. No. 10, pp. 37-44. 2020. https://doi.org/10.15207/JKCS.2020.11.10.037
  2. D. H. Yu, Y. U. Kim, Y. J. Ha, & Y. S. Ryu, "Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era", Journal of the Korea Convergence Society, Vol. 12, No. 1, pp. 1-9, 2021. https://doi.org/10.15207/JKCS.2021.12.1.001
  3. J. S. Han, "Security Threats in the Mobile Cloud Service Environment", Journal of Digital Convergence, Vol. 12, No. 5, pp. 263-269, 2014. http://dx.doi.org/10.14400/JDC.2014.12.5.263
  4. J. S. Lee, K. M. Park, & S. K. Kim, "A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices", Journal of The Korea Institute of Information Security & Cryptology, Vol. 30, No. 4, 2020.
  5. J. S. Lee, K. M. Park, & S. K. Kim, "A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices", Journal of The Korea Institute of Information Security & Cryptology, Vol. 30, No. 4, 2020.
  6. J. H. Won, J. W. Hong, & Y. Y. You, "A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer", Journal of Convergence for Information Technology, Vol. 8, No. 6, pp.149-157, 2018.
  7. H. J. Mun, G. H. Choi, & Y. C. Hwang, "Countermeasure to Underlying Security Threats in IoT communication", Journal of Convergence for Information Technology, Vol. 2, pp. 37-44, 2026. http://dx.doi.org/10.22156/CS4SMB.2016.6.2.037
  8. S. W. Lee, H. K. Kim, & E. J. Kim, "A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game", Korea Game Society, Vol. 15, No. 1, pp. 77-88, 2015.
  9. Y. J. Choi, J. H. Ra & D. I. Shin, "The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment", Journal of Information Technology and Architecture, Vol. 11. No. 2, pp. 175-185, 2014.
  10. W. R. Jeon, J. Y. Kim, Y. S. Lee, & D. H. Won, "Analysis of Threats and Countermeasures on Mobile Smartphone", The Korean Society Of Computer And Information, Vol. 16, No. 2, pp. 153-163, 2011.