• Title/Summary/Keyword: 내부자적 연구

Search Result 102, Processing Time 0.034 seconds

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A Study on the Mitigation of Information Security Avoid Behavior: From Goal Setting, Justice, Trust perspective (정보보안 회피행동 완화에 대한 연구: 정보보안 관련 목표설정, 공정성, 신뢰의 관점을 중심으로)

  • Hwang, In-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.217-229
    • /
    • 2020
  • Globally, information protection of organization has become an essential management factor, and organizations continue to invest high-level resources for information security. Security threats from insiders are not decreasing. The purpose of this study is to present the antecedence factors to mitigate the role conflict that is the cause of the security avoid behavior. For the study, a survey was conducted for employees of organizations with information security policies, and structural equation modeling was conducted using a total of 383 samples for hypothesis verification. As a result of the analysis, role conflict increased avoid behavior, and goal difficulty, goal specificity, justice, and trust mitigated role conflict. In particular, justice influenced the reduction of role conflict and avoid behavior through trust. The implications were to present the causes and mitigation factors for avoid behavior of employee, and it is judged that it will help the organization to establish a security strategy.

A Exploratory Study of Confidential Document Circulation System Design (기밀문서 유통체계 설계에 관한 탐색적 연구)

  • Chang, Hang-Bae;Kim, Heung-Gook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • Since, Davis(1991) has proposed the TAM(Technology Acceptance Model) through a literature review of informatization promotion, which insists that a user conveniency is judged by the degree of effectiveness caused by IT, the advancement of IT such as the Internet, e-mail, electronic data exchange, and groupware have brought into various changes in ordinary corporations and public institutions. However, with the right function, the advancement of IT has provided various benefits including additional reverse functions. Based on an integrated environment of business process, unauthorized user could access to information and a management of information becomes more difficult than before due to informatization of critical information. Furthermore, external hacking or information leakage by insider becomes easier owing to advancement in communication technology. This study has tried to develop a specified management procedure and implementation method for confidential documents.

An Interpretation of Human View in Daesoon Thought: From the Perspective of Mircea Eliade's New Humanism (엘리아데의 관점으로 본 대순사상의 인간관 연구)

  • Ahn, Shin
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.33
    • /
    • pp.1-30
    • /
    • 2019
  • There have been three trends in the study of the view of humanity in Daesoon Thought: insider theology, outsider theology, and religious studies. This article is intended to interpret the view of humanity in Daesoon Thought from the perspective of Mircea Eliade's New Humanism. We find similarities between Daesoon Thought and Eliade's New Humanism. Daesoon Thought deals with the complexities of life as being labyrinth-like and puts Jeungsan's view of humanity at the center of a Daesoon worldview. Jeungsan examines the existential problems which humans face in the Former World, and gives the religious remedies of Haewonsangsaeng (the resolution of grievances for mutual beneficence) and Boeunsangsaeng (the grateful reciprocation of favors for mutual beneficence) to transform humanity's worldview for usage in the Later World. Jeungsan suggests a way of peace instead of the revolution of Donghak. Through the Reordering Works of Heaven and Earth, Jeungsan changes the mutual contention of the Former World into the mutual beneficence of the Later World. The cosmology of Daesoon Thought recovers the relationship between divine beings and human beings in the three realms, and proposes a system of ethics that promotes virtue and reproves vices and human-centericism. In conclusion, the view of humanity in Daesoon Thought is an unapologetic view of homo-religiosus from within a new humanism.

Information asymmetry and opportunistic behavior of insider : Focusing on fraud event firm (자본시장의 정보불균형과 기업내부관계자의 기회주의적 행태에 대한 실증연구 : 부정사건기업을 중심으로)

  • Lee, Posang
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.345-352
    • /
    • 2019
  • This paper examines the opportunistic behavior of corporate insiders and analyzes the relationship between equity change and the possibility of delisting. The findings are summarized as follows. First, the larger the stake reduction of insider, the greater the negative excess return after announcement. In the delisting firm group, there is a significant decrease in equity and statistically significant results in the difference test between the comparative groups. The logistic regression analysis showed that the regression coefficient of equity change was negatively statistically significant, indicating a significant correlation between insider share change and the possibility of delisting. These findings are expected not only to provide useful information for investors, but also to be evidence of capital market information asymmetry.

A Phenomenological Study on the Lived Experiences of Middle-aged People with Disabilities after a Stroke (중년기 뇌졸중 장애인의 삶에 관한 해석학적 현상학 연구)

  • Kim, Mi Ok;Choi, Jung Min;Kang, Seung Won
    • Korean Journal of Social Welfare
    • /
    • v.65 no.1
    • /
    • pp.33-58
    • /
    • 2013
  • This study aims to explore the lived experiences of middle-aged people with disabilities after a stroke. Using van Manen's phenomenological qualitative method, this study obtained information through interviews with middle-aged people with disabilities after a stroke. The following main themes were extracted from the lived experiences of middle-aged people with disabilities who were interviewed: 'a life broken in half', 'discontinuity and isolation of life', 'being born again', 'fear of stroke relapse', and 'overcoming all difficulties through harmony in a family'. Therefore, the core theme on the lived experiences of middle-aged people with disabilities after a stroke is a shadow of relapse over lives that have to protect families. The implication of this study's results on policy making and actual practices are discussed focusing on the well-being of people with disabilities and their families.

  • PDF

An Efficient Ways of Improving Regulations on Insider Trading (내부자거래(內部者去來) 규제개선(規制改善)의 효율적(效率的)인 방안(方案))

  • Park Sang-Bong
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.611-629
    • /
    • 2000
  • In the legislation interpretation and fundamental viewpoint about the legal system of insider trading, Japan strictly legislate under the proposition, the principle of 'nulla poena,' adopted 'the principle of limited enumeration,' and United states, under 'the principle of comprehension,' has entrusted courts with establishment of concrete concepts and standard, so the courts are very flexible in determining the range of insiders and the importance of inside information to show a strong will to eradicate insider trading. Korea has a legislative position of 'the principle of limited indication' which has been created by the negotiation between those principles of United states and Japan. Though this court has interpreted insider trading, insider trading using non-disclosed information has increased lately, needing the strengthening of its regulations. However, this shows us that sophisticate the regulations may be, the exposure of insider trading has limitations. The most important thing is to change recognition for transparency of the securities market, security of investors and to establish the atmosphere which is that fair stock trading made in a sound capital market to raise funds for corporation. The policies of improving unfair trading, self-regulation bodies, raising the transparency and legality of procedures of supervision and monitoring and applying 'compliance program' to stock companies are very needed to eliminate unfair trading in the securities market and establish the order of trading.

  • PDF

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF