• Title/Summary/Keyword: 보안관리 모형

Search Result 93, Processing Time 0.031 seconds

A Study on the Influence of Organizational Justice on the Industrial Security Supervisors' Compliance Motivations towards Security Policies: With a Focus on Organizational Attachment and Empowerment (조직공정성이 산업보안담당자의 보안정책 준수의지에 미치는 영향 : 조직애착과 임파워먼트를 중심으로)

  • Shin, Hyun-Goo;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.241-268
    • /
    • 2014
  • This paper is a study on the industrial security specialists of organizations in possession of industrial technology and their compliance motivations towards security policies. The focus is on organizational justice, organizational attachment and empowerment based on our hypothesis that compliance motivations are shaped, not only by the organization itself but, also by the attitude and principle of the organization's members. The objective is to propose a direction for administrative security policy to increase prevention of industrial technology leakage by identifying the factors' significance through hypothesis testing and thereafter investigating the influencing relationship. Survey questionnaires are collected from the participants of a regular educational program provided by the Korean Association for Industrial Technology Security (KAITS) and analyzed using SPSS 21.0 and AMOS 21.0 software. Through various statistical analyses, following results are acquired. First, procedural fairness and organizational attachment are found to motivate security supervisors to comply with security policies. Particularly, the relationship between procedural fairness and compliance motivations towards security policies is fully mediated by organizational attachment, suggesting that improved fairness at the organizational level will lead to an increase in organizational attachment, which will encourage the individuals to comply with security policies. Additionally, empowerment of the individuals in organizations partially mediates the relationship between procedural fairness and organizational attachment, confirming that procedural fairness empowers each individual and increases his organizational attachment. Specifically, in order to maximize compliance of security policies, businesses should demonstrate procedural fairness when compensating their employees for their work to empower them and increase their organizational attachment, which can increase their will to comply with existing security policies. This research provides insights into how to encourage security supervisors to comply with security policies by increasing their empowerment and organizational attachment.

  • PDF

A Study of System Design for Management the Confidential Records (비밀기록을 관리하기 위한 시스템 설계 연구)

  • Hong, Deok-Yong
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.277-313
    • /
    • 2017
  • With the enactment of regulations on confidential records management, the management of confidential records has become more important than ever. However, there remains no management method in the field of records management that takes the feature and values of confidential records into consideration. For this, this study processed electronically confidential records managed in a non-electronic environment. In addition, we developed a system that will allow public institutions to manage confidential records independently, that will prevent loss of information because of loss of or damage to the confidential records, and that can be used conveniently in the digital security environment of authorized users to establish a foundation for commercial management. In this study, we analyzed the system configuration requirements according to the international standard for the records management of a confidential records management system and system-related issues such as system design based on the analyzed requirements, system security and encryption, and metadata, the overall process of establishing and outputting secret management records and standard management.

The Comparative Study for the Property of Learning Effect based on Delay ed Software S-Shaped Reliability Model (지연된 소프트웨어 S-형태 신뢰성모형에 의존된 학습효과 특성에 관한 비교 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.73-80
    • /
    • 2011
  • In this study, software products developed in the course of testing, software managers in the process of testing software and tools for effective learning effects perspective has been studied using the NHPP software. The delayed software S-shaped reliability model applied to distribution was based on finite failure NHPP. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than automatic error that is generally efficient model could be confirmed. This paper, numerical example of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and $R^2$(coefficient of determination).

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.

The Effect of Information Privacy Concerns on E-Trust and E-Loyalty : The Moderating Role of Switching Cost (정보보안우려감이 e-신뢰도와 e-충성도에 미치는 영향: 전환비용의 조절효과를 중심으로)

  • Moon, Yun Ji;Choi, Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.131-134
    • /
    • 2014
  • The Internet allows firms to serve customers more effectively than ever before. In the B2C context, we examine the interrelationships among information privacy concerns, e-trust, and e-loyalty. The authors extend prior research by incorporating constructs of information privacy concerns into a more holistic conceptual framework. This study answers three research questions: Will the three components of information privacy concerns have a significant effect on e-loyalty through e-trust?, Does e-trust mediate e-loyalty?, Finally, do switching costs have a moderation effect between e-trust and e-loyalty?, The authors examine data from customers who have booked hotel accommodations online. The results support our hypotheses and confirm both the mediation role of e-trust and the moderation role of switching costs. Conceptually, this study provides an empirical validation of information privacy concerns, e-trust, and loyalty linkage. On the managerial level, this research provides insights into critical drivers of loyalty in the emerging online marketplace.

  • PDF

Study on UAV Flight Patterns and Simulation Modelling for UTM (저고도 무인기 교통관리 체계에서 무인기 비행패턴 분류 및 시뮬레이션 모형 개발)

  • Jung, Kyu-sur;Kim, Se-Yeon;Lee, Keum-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.13-19
    • /
    • 2018
  • In this paper, we classified a flight pattern of unmanned aerial vehicle(UAV) which will be operating in UTM system and analyzed its flight pattern by purpose of use. Flight patterns of UAV are sorted into three patterns which are circling, monitoring and delivery. We considered four cases of industry areas using UAV which are agriculture, infrastructure monitoring, public safety & security(p.s.s) and delivery. It is necessary to build a simulation model as a verification tool for applying the flight pattern according to the use of UAV to the real UTM system. Therefore, we propose the simulation model of UAV with updating states over time. We applied simulation to UAV monitoring flight pattern, and confirmed that the flight was done by the given input data. The simulation model will be used in the future to verify that the UAV has various flight patterns and can operate safely and efficiently for the intended use.

Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory (안전한 스마트공장 구축을 위한 위험우선순위(SFRPN) 기반 최소보안요구사항에 관한 연구)

  • Yi, Byung-gueon;Kim, Dong-won;Noh, Bong-nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1323-1333
    • /
    • 2016
  • According to spreading of smart devices and development of communication technology, the security issues come to the fore in the modern factory. Especially, the smart facpry should be considered the risk management plan how to identify and evaluate, control the risks. In this paper, we suggest the minimum security requirements applying SFRPN(Smart Factory Risk Priority Number) model to domestic smart factory on the basis of the results inspecting factories.

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

The Factors Affecting Acceptance of Mobile App Service : Using Extending UTAUT for Real Estate Service (모바일 앱 서비스에 대한 서비스 수용 : 부동산 중개서비스에 대한 확장된 UTAUT모형 시각에서의 접근)

  • Park, Yoonjoo;Choe, Yoowha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.327-334
    • /
    • 2020
  • Recently, mobile and smart devices are rapidly spreading. As a result, real estate services, which were formerly face-to-face, have now been replaced by mobile environments. This study focuses on the real estate app service and 261 samples were used for the empirical analysis. The results of the hypotheses test using structural equation model are summarized as follows. First, performance expectancy, facilitating conditions, security and aesthetic perceived by users of real estate services have positively influence on positive attitude, but effort expectancy and social influence do not. Second, positive attitude of real estate services have positive effects on service Acceptance. Third, involvement moderated the relationship between positive attitude and service Acceptance. Based on the results of the analysis, it provided meaningful implications for practitioners and researchers in related fields.