• Title/Summary/Keyword: 내부자적 연구

Search Result 104, Processing Time 0.027 seconds

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

The Documentary Pictures on the Back Stage of Musical '42nd Street' from the Insider and Observer Point of View (내부자와 관찰자의 중첩된 시각으로 본 뮤지컬 백스테이지의 다큐멘터리 사진 연구)

  • Park, Sang Won;Yang, Jong Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.638-645
    • /
    • 2018
  • '42nd Broadway' is one of the most authentic, genuine and renowned musical pieces among the numerous musicals. By approaching every element in the Backstage from the perspective of an actor who is apart of the show, not a professional photographer, rather than an the usual objects on the Front Stage which is imprinted in the minds of the ordinary people through the media or the numerous flyers sent from the theaters, intented to describe the life as it is in the Back Stage by examining various elements such as the sets or make-up rooms, rather than the momentary, technically staged imageries. In the industrial aspect as well, the implication of this documentary would be that a more realistic set of photography was provided instead of the existing ones that usually focused on the'staged,' or 'guarded' images of the musical as shown in the promotional materials or the Front Stage still cuts.

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Reading the Landscape through the Perception of Residents of Banwol and Bakji Island - Based on the Change before and after the Purple Island - (반월·박지도 주민의 인식과 태도를 통해 경관 읽기 - 퍼플섬(Purple Islands) 사업 전후의 변화를 중심으로 -)

  • Hamm, Yeonsu;Seo, Hwahyun;Cui, Yuna;Sung, Jong-Sang
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.51 no.4
    • /
    • pp.56-75
    • /
    • 2023
  • As of 2019, for the 'Island I Want to Visit' project, Banwol and Bakji Islands, located in Shinan-gun, started color marketing to create a tourist attraction by painting roofs, buildings, and facilities purple. As this landscape change was evaluated as a 'dangerous but beautiful attempt,' it was recognized as the 'World's Best Tourism Village' in 2021, drawing attention from domestic and foreign tourists. However, the residents of the islands, who created and enjoy the benefits of the landscape, were alienated from the planning stage. This study investigated the meanings and symbols of residents' perceptions of the purple landscape. The cultural landscape frame of new cultural geography, which interprets the landscape's symbolic meaning and ideological signs, was utilized. In addition, a holistic approach was applied to understand the residents' perceptions of the multi-layered environment. Therefore, the perception of purple, the main color of the islands, the overall landscape and individual places, and the general perception of the Purple Island project were investigated. After the Purple Islands Project, the main senses for recognizing the villages focused on sight, and the residents were satisfied with the purple landscape as it improved the underdeveloped village environment. This satisfaction was based on lessening the negative memories experienced as an island rather than a value judgment on the purple color. In addition, the perception of the symbolic landscape, which has a social and universal system, has been subdivided and reorganized, including for tourism functions. It can be understood as an aspect of the spectacle landscape that appears in cosmopolitanism. However, in the process of transforming into a tourist attraction, it was discovered that the residents recognize the value of local resources and create a new cultural landscape. In addition, the perception of the relationship between Banwol and Bakji has also changed around tourism.

The Study on Possibility of Strategic Trade using Disclosure Interval (공시시차를 이용한 전략적 매매의 개연성에 관한 연구)

  • Ko, Hyuk-Jin;Park, Seong-Ho;Lim, Jun-Kyu;Park, Young-S.
    • The Korean Journal of Financial Management
    • /
    • v.26 no.4
    • /
    • pp.165-189
    • /
    • 2009
  • According to disclosure regulation, insider can hide their trading until disclosure day, because there be interval between trading time and disclosure time. To accommodate strategic trade, they have an incentive to be brought disclosure interval as long as possible. This research investigate whether strategical behaviour of informed traders using disclosure intervals exists in domestic stock market.ls xt, we aney he whether they can get abnormal return through stealth strategy after announcement date. We also evaluate the effect of mimicking trading on price impact with the assumption of existence of mimicking trading. Our major research results are as follows: In case of main shareholder without having no prompt disclosure duty, the frequency of trading started at the beginning of month is shown significantly higher than others. This result shows a direct evidence that informed traders buy or sell their equity strategically using disclosure intervals. Also, we find the result that the coefficient of strategic variables has highest value in middle size information. However, the empirical evidence that informed trader get abnormal return through strategic trading was not shown in this study. Meanwhile, stock price over-reacts for selling transaction on trading point and is recovered after disclosure date., so we assume possibility of mimicking trading exists in domestic stock market.

  • PDF

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Qualitative Study on the Mental Health Social Workers' Experiences Concerning Client's Self-determination (클라이언트의 자기결정에 관한 정신보건사회복지사의 실천 경험에 대한 연구)

  • Kim, Gi-duk;Jang, Eun-sook
    • Korean Journal of Social Welfare Studies
    • /
    • no.39
    • /
    • pp.83-113
    • /
    • 2008
  • The purpose of the study is to explore the mental health social workers' experiences concerning client's self-determination by grounded theory, one of the qualitative method. Although a lot of previous studies has proved that the practitioners have suffered from the ethical considerations in their practice, on which the matter of client's self-determination is centered, little attention is paid to deep exploration of practitioners' real experience about those aspects. To carry out the research question, first, through literature reviews focusing on clarify the underlying issues about client's self-determination, three intrinsic clues are found out; incompetence, medical benefits, the harm to the third party. Data obtained by in-depth interview with 10 participants are analyzed by employing the methode developed by Corbin and Strauss, which could categorize the raw data into several high-level concepts and constructs. The findings of the study show that most practitioners would consider the clients as the intrinsic subject of self-determination. Therefore, in practice, they are trying to support the client's self-determination even within the some constraints. In addition, they also experience the clients' latent potential in actualizing autonomy and self-determination, and identifies the positive effect of self-determination not only on the client's self-help and mental health but also on the practitioners themselves. The results of the study clearly suggests that it is critical to provide the practitioners with adequate ethical education and training to help them to overcome their ethical suffering concerning clients self-determination.