• Title/Summary/Keyword: 내부자적 연구

Search Result 103, Processing Time 0.021 seconds

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

The Effect on the IS Psychological Empowerment on the Mitigation of IS Policy Resistance Through IS Role Stress: Focusing on the Moderation of IS Justice Climate (정보보안 심리적 권한이 업무 스트레스를 통해 정책 저항 완화에 미치는 영향: 공정성 분위기의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.1-12
    • /
    • 2022
  • An insider's information security incidents continue to occur, there is a growing demand for strengthening information security within the organization. However, when strict information security policies and rules are applied to employees of the organization, it can result as an information security stress and resistance behavior. The purpose of this study is to suggest the causes of insiders' negative information security behavior and factors that mitigate the cause. In particular, the study identifies how the mutual influence of individual (psychological empowerment) and organizational (justice climate) factors mitigates negative behavior. In this study, a sample was obtained by surveying workers of organizations that reflect information security policies to insiders, and hypothesis testing was performed by structural equation modeling. As a result of the analysis, role stress had a partial mediating effect on the effect of psychological empowerment on security policy resistance, and the justice climate strengthened the effect of psychological empowerment. Our results suggest a direction for reducing insider information security policy resistance, so it helps to establish a strategy for achieving internal information security goals.

The Influence of Manager's Wealth on Adopting Anitakeover Measures (경영자의 부가 기업의 반인수조치 선택에 미치는 영향)

  • Choo, Hyun-Tai
    • The Korean Journal of Financial Management
    • /
    • v.12 no.1
    • /
    • pp.167-186
    • /
    • 1995
  • 기업인수합병(M&A) 시장의 활성화에 따라 적대적 공개매수를 방어하기 위한 반인수조치(Antitakeover Techniques)들에 관한 관심도 고조되고 있다. 지금까지 널리 알려져 있는 대표적인 반인수 조치들은 Fair Price Amendment(FPA), Classified Board Amendment(CBA)와 Poison Pills(PP) 등이다. 이들 대표적 세 반인수조치들 중에서 FPA와 CBA 채택의 경우는 주주들의 사전 승인이 요구되는데 반하여 PP는 주주들의 사전 승인없이 채택이 가능한 반인수조치이다. 이처럼 상이한 반인수조치들의 채택은 채택기업의 가치에 상이한 부의 효과를 미치는데, 이 분야의 많은 실증적연구 결과들이 보고되고 있다. 본 연구에서는 표본기업으로 현재까지 상호개별적으로 연구되어 왔던 두가지 반인수조치(FTA, CBA)에 PP와 비채택기업도 포함시키고 있다. 지금까지의 반인수조치 채택에 따른 기업가치에 미치는 부의 효과에 관한 연구결과를 확인해보고, 반인수조치 채택에 관한 경영자의 의사결정과 경영자의 부 사이에 체계적인 관계가 존재하는지를 실증분석하고자 한다. 여기서 경영자의 부는 기업내부자 지분율과 기업내 경영자를 위한 Golden Parachute의 존재 유무로 측정한다. 본 연구에서는 3개의 가설을 설정하였다. 가설1: 만일 경영자가 주주의 이익을 희생하면서 자신의 이익을 위한 반인수조치를 채택한다면, 반인수조치 채택의 공표는 평균적으로 기업가치에 부(-)의 효과를 보일 것이다. 가설2: 경영자의 내부지분율이 낮을때 경영자들은 주주에게 가장 해로운 반인수조치를 선택할 것이다. 가설3: Golden Parachute가 존재하지 않을때 경영자들은 주주에게 가장 해로운 반인수조치를 채택할 것이다. 본 연구의 대상기업들중에서 반인수조치 채택 기업들은 IRRC 1990년도판에서 수집되었고, 대칭표본 기업으로 반인수조치를 채택하지 않은 기업들은 CRSP 파일에서 기업규모, SIC 코드를 대응시켜 선정하였다. 임원, 관계이사들과 친인척을 포함하는 내부자의 지분과 Golden Parachute 존재 여부는 이 연구의 표본기업들의 Proxy Statement에서 수집하였다. 최종 표본기업은 FPA 채택기업, CBA 채택기업, PP채택기업, 그리고 비채택기업으로 4개의 상호 배타적인 기업 그룹으로 구성되었다. 본 연구는 Event Study와 Multinomial Logistic Regession의 두가지 실증분석 방법을 사용하였다. Event Study방법론은 반인수조치 채택 공표시 초과수익률을 조사하기 위해 사용하였다. Multinomial Logistic Regession은 선택된 반인수조치 종류와 설명 변수들(내부자 지분율, Golden Parachute)간에 체계적인 관계가 존재하는지를 검증하기 위해 사용되었다. 반인수조치들을 채택하는 기업들은 반인수조치를 채택하고 있지 않은 기업들에 비해 내부자 지분율이 낮게 나타났으며, 반인수조치 중 PP를 채택한 기업에서 가장 낮은 내부지분율을 보이고 있다. GP 채택을 보면 PP를 선택한 기업의 50%가 GP를 채택하였다. 본 연구에서 반인수조치 채택 발표일 하루 전후의 초과수익률을 조사한 결과는 반인수조치 미채택기업, CBA, FPA 채택기업들의 초과수익률은 통계적으로 의미가 없었으나, PP채택에 따른 초과수익률은 의미 있는 부(-)의 값을 나타냈다. 이와같이 CBA와 FPA채택기업들은 주주의 부를 감소시키지 않았으나 PP채택기업들은 주주의 부를 감소시켰다. 따라서 경영자는 주주의 이익을 희생시키면서 자신의 이익을 위해 PP를 선택하고 있음을 보여 주고 있다. 연구결과는 내부자 지분율의 크기가 경영자와 주주간의 이해를 효과적으로 일치시키고 있음을 제시하고 있다. 즉, 내부자 지분율이 큰 기업일수록 반인수조치를 채택하지 않거나 반인수조치 채택시에 주주의 이익에 반하지 않은 반인수조치를 선택하는 경향이 높다. Golden Parachute이 존재하는 기업은 FPA를 채택하거나 반인수조치를 채택하지 않는 것보다 PP나 CBA를 채택하는 경향이 더 높다. 한편 기업에서의 GP의 존재가 경영자의 가장 해로운 반인수조치 선택을 억제하지 못함을 보여주고 있는데, 이는 GP가 비효과적인 계약메카니즘임을 제기한다. GP가 경영자와 주주간의 이해를 일치시키도록하는 계약이라기 보다는 차라리 기업방어전략이 비효과적일때 경영자 자신의 안전판으로 제공되고 있음을 보여준다. 이 논문의 주요공헌은 기업내부자 지분율의 크기와 GP의 존재가 반인수조치 선택에 체계적인 영향을 미치고 있음을 보여준 것이다. 여기서 사용된 Multinomial Logistic모델은 내부지분을 크기와 GP의 존재가 PP또는 CBA가 채택될 것인지를 예측할 수 있게 한다.

  • PDF

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC (제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구)

  • Ahn, Jong-seong;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.321-330
    • /
    • 2019
  • Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.

Study on Insider Pattern Monitoring System for Secure Smart Building Operations (안전한 스마트빌딩 운영을 위한 내부자 패턴 모니터링 시스템 연구)

  • Kim, Jeong-Ho;Chung, Hague;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.288-289
    • /
    • 2016
  • 최근 사물인터넷(Internet of Things)의 발달로 인해 사물과 사물간의 통신을 이용해 사용자가 어느 곳에서나 집 또는 사무실 등의 장소의 정보를 얻을 수 있게 되었다. 하지만 IoT기기들을 스마트빌딩에 활용하는데 있어서 내부에서 공격이 발생했을 경우에 효과적으로 방어할 수 있는 방어체계가 갖추어져 있지 않아 위험하다는 점이 존재한다. 따라서 본 논문에서는 IoT 네트워크를 구축한 스마트빌딩에서 내부 사용자 접근에 대한 누적 정보를 바탕으로 스마트빌딩 내부에서 발생할 수 있는 불법적인 내부자 공격에 대하여 스마트빌딩을 안전하게 운영할 수 있는 내부자 패턴 모니터링 시스템을 제안한다.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

Seniority Based Pay System and the Relational basis of Workplace Inequality (연공성임금을 매개로 한 조직내 관계적 불평등: 내부자-외부자 격차에 대한 분석)

  • Kwon, Hyunji;Ham, Sunyu
    • Korean Journal of Labor Studies
    • /
    • v.23 no.2
    • /
    • pp.1-45
    • /
    • 2017
  • This study aims at explaining organizational mechanisms of inequality that has been rising rapidly alongside the proliferation of irregular employment in the post-crisis Korean labor market. It argues that inequality is not sufficiently explained by individual gap in human capital or widespread marketization as such. Social categories into which each individual worker falls seems more important as a source of labor market inequality. Employment types that are composed of regular and irregular employment do not simply indicate the different economic meanings of employment contracts but have rather been institutionalized as a social category of status in the context of inequality over the past two decades. They are also often matched with other social categories such as gender that have created and reproduced greater labor market inequality. We pay attention to the organizational practice of dominant incumbents who make claims for advantages of return based on their exclusive accessibility to limited organizational resources and explain how that particular practice plays a role to increase relational inequality between those insiders who achieve advantageous returns and outsiders mostly irregular workers who are excluded from those resources because of the social categories that they belong to. In this study, we identify seniority based pay as the key organizational practice that justifies categorical differences within the workplace and examine how that particular practice contributes to organizational level segmentation and income ineqaulity.

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

A Study on the Change of Security Level of Military Organizations Applying Grounded Theory (근거이론을 적용한 군 조직의 보안수준 변화요인 연구)

  • Park, Jae-Gon
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.283-303
    • /
    • 2017
  • This study which was started to identify the factors that change the security level of military organizations, analyzed the data collected from articles written by the active officers in the Defense Daily Journal hoping to improve the military security level by the qualitative research method called Grounded Theory, and establish causal relationship how organizational members respond to insider security threats. As a result of the analysis, the causal condition is 'the security threat of the insider', the contextual condition is 'the specificity of the military organization', the central phenomenon is 'the conflict of values as a soldier', the arbitrary condition is 'the security consciousness', Strategy is 'the responds to security threats', and the result was 'security level change'. The core categories can be presented as 'the degree of conflict of values on insider security threats' and two hypotheses have been derived. First, the members of the military organization strongly felt the conflict of values about security threat as the tendency to emphasize security was strong, and they helped to develop the security level of organization by responding strongly. Second, the stronger the tendency to focus on colleagues, respond weakly to security threats. And it undermines the security level of the organization. Finally, in order to improve the security level of the organization, it is necessary to establish a solid security consciousness and to make institutional development to support it.

  • PDF

The Influence of IS Technology and Communication Uncertainty on IS Voice Behavior: The Role of Susceptibility to Informational Influence of Employee (정보보안 기술 및 커뮤니케이션 불확실성이 제언 행동에 미치는 영향: 개인의 정보 영향 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.165-175
    • /
    • 2023
  • As the reduction of information exposure threats by organization insiders contributes to achieving information security(IS) goals, organizations are establishing strict IS policies applicable to insiders and increasing investment in IS systems. However, since IS incidents cause damage to an organization even by malicious information exposure by one person, psychological support for strengthening IS compliance behavior by insiders. This study aims to confirm how the uncertain organizational environment related to IS affects individual IS-related behavior. We surveyed insiders of organizations operating IS policies and tested the hypothesis using 440 samples. As a result, IS technology and communication uncertainty reduced IS voice behavior through IS prospective anxiety, and individuals' susceptibility to information influence moderated the relationship between IS technology, communication, and prospective anxiety and IS voice behavior. Our results suggest the necessity and direction of supplementing the uncertain IS environment in practice.