Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.4.897

Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness  

Moon, Kunwoong (Center for information Security Technologies(CIST), Korea University)
Kim, Seungjoo (Center for information Security Technologies(CIST), Korea University)
Abstract
This paper focuses on how the protection of information security incident is effective in via Information security awareness when conducting information security activities of enterprises. Research models have theorized that the information security activity and the information security awareness will reduce the incidence of information security. The general characteristics of analysis targets have been carried out in the frequency analysis, and the reliability of the measuring tool has been utilized to calculate the coefficient of Cronbach's information protection. Evidence has been demonstrated regarding the relationship between information security activities and information security awareness and information security incidents.
Keywords
Information security; information protection; information activities; information awareness;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Jooy-young Kim, Chan-Hyung Cho, and Jung-Hun Lee, You-Jin Lee, "2015 Survery on information security(business)," KISA, 34205, pp. 27-28, 30, Dec. 2015.
2 ISO(International Organization for Standardization)/IEC(International Electronical Commission), "ISO/IEC 27000:2009 - information security - Security techniques - information security management systems - overview and vocabulary," ISO/IEC, 2009.
3 CNSS(Committee on National Security System), "National information assurance (IA) glossary, CNSS instruction," 4009, Apr. 2010.
4 ISACA(Information Systeam Audit and Control Association), "Glossary of terms 2008," ISACA, p. 10, p. 25, p. 51, 2008.
5 Behrouz A. Forouzan, "Cryptography and network security," Mcgraw Hill Korea, 2, pp. 2-3, Dec. 2010.
6 Uh-han Kim, Jung-Sup Cho, and Kwan-Hee Hong, "Present condition of infringement accident of information technology and response system," Journal of The Korean Institute of Communications and Information Science, 21(9), pp. 38-47, Sep. 2004.
7 Chul-Soo Lee, "Information security auditing framework in industrial control system," Journal of the Korea Institute of Information Security & Cryptology, 18(1), pp. 139-148, Feb. 2008.
8 Jung-ho Lee, "Prevention of infringement of electronic finance and reinforcement for action," Journal of the Korea Institute of Information Security & Cryptology, 18(5), pp. 1-20, Oct. 2008.
9 Mean-Sun Noh and Sam-Youl Lee, "Explaining industrial security of SMEs in Korea: An Ordered Logit Analysis," Korean Public Administration Review, 44(3), pp. 239-259, Aug. 2010.
10 Hang-Bae Chang, "The design of information security management system for SMEs industry technique leakage prevention," Journal of Korea Multimedia Society. 13(1), pp. 111-121, Jan. 2010.
11 Pan-Am Choi, "The effects of corporate information protection activities on industrial secrets leakage prevention," Graduate School, Kyonggi University, Jun. 2012.
12 Sang-hyun Kim and Geuna Kim, "A firm's environmental determinants impacting the information security management and the moderating effects of regulatory influence," Korean Operations Research And Management Society, 37(3), pp. 79-94, Sep. 2012.   DOI
13 Il-soon Shin, Won-chang Jang and Heeyoung Park, "Information security investment and security breach: empirical study on the reverse causality," Journal of the Korea Institute of Information Security & Cryptology, 23(6), pp. 1207-1217, Dec. 2013.   DOI
14 Cho-Ho Lim, "Effective way of awareness-raising of information security," Journal of the Korea Institute of Information Security & Cryptology, 16(2), pp. 30-36, Apr. 2006.
15 Sung-Bae Cho, Do-Soon Kwon and Mi-Young Lee, "A study on the information security behavior of corporations using health belief model," Asia Pacific Journal of Small Business, 36(2), pp. 241-263, Jun. 2014.
16 Tae-Hyun Son, "The effects of corporate information security activities on the performance of information security and information management," Graduate School, Myongji University, Feb. 2015.
17 OhJ-un Yoon, Bok-Dong Han, Jeong-Keun Park, Hyung-Jun Seo and Yong-Tae Shin, "A study on models for strengthening infrastructure protection through analysis of cyber intrusions," Convergence security journal, 15(6), pp. 29-36, Oct. 2015.
18 Jong-ki Kim and Day-eon Kang, "The effects of security policies, security awareness and individual characteristics on password security effectiveness," Journal of the Korea Institute of Information Security & Cryptology, 18(4), pp. 123-133, Aug. 2008.
19 Choong-Hee Lee and Min-soo Shin, "A study about a relationship between internal & external motivation and security action and influence of security recognition," Journal of Korea society of management information system, pp. 437-442, Aug. 2010.
20 Min-Jung Baek and Seyung-Hee Sohn, "A study on the effect of information security awareness and behavior on the information security performance in small and medium sized organization," Asia Pacific Journal of Small Business, 33(2), pp. 113-132, Jun. 2011.
21 Myung-Hee Chang and Da-Yeon Kang, "Factors affecting the information security awareness and perceived information security risk of employees of port companies," Journal of Korean Navigation and Port Research, 36(3), pp. 261-271, Apr. 2012.   DOI
22 Von Solms, B, "Information security-the fourth wave," Computers & security, vol. 25, no. 3, pp. 165-168, Mar. 2006.   DOI
23 Young-su Son, "A study on the relationship between cognition of personal information protection and following protection activities," Sang Myung University, Feb. 2015.
24 Un-kyung Kwon, Han-sol Lee, Sang-mi Chae and Kyung-won Lyu, "An empirical study of relationship between information security education and information security incidents," Journal of Korea society management information system, pp. 342-348, Aug. 2016.
25 Sung-Uk Park and Sang-Ho Lee, "An analysis on information security industry in Korea," Study of industry innovation, 24(2), pp. 1-22, Sep. 2008.
26 Baron, R. M. and Kenny, D. A, "The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations," Journal of personality and social psychology, vol. 51, no. 6, p. 1173, Dec. 1986.   DOI
27 Fornell and Larcker, "Factor analysis and discriminant validity: a brief review of some practical issues," Aston Business School, May. 1981.
28 Il-soon Shin, "Effects and causality of measures for personal information : empirical studies on firm and individual behaviors and their implications," Journal of the Korea Institute of Information Security & Cryptology, 26(2), pp. 523-531, Mar. 2016.   DOI
29 Suk-Hun Shin, "Issues and tasks of exemplary damages and class action system," Korea economic research institute, p. 16, Oct. 2016.