• Title/Summary/Keyword: 보안규범

Search Result 48, Processing Time 0.033 seconds

Factors Affecting the Security Ability of Port Logistics Organization Members (항만물류조직구성원들의 보안능력에 영향을 미치는 요인)

  • Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.179-185
    • /
    • 2019
  • Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

Anomie Social Environment and Juvenile Delinquency (아노미(Anomie)적 사회환경과 청소년 범죄: 소셜 미디어를 중심으로)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.37-44
    • /
    • 2015
  • There appears a variety forms of crime type and age in accordance with the change of social structure. In this paper it is described for combining the Anomie theory of Emile Durkheim. Anomie refers to the absence of dual standards or norms. In other words, while weakening the existing norms prevailing when the new rules has not been established. That situation would cause social chaos. Rules on the dissemination and utilization of SNS due to the development of information and communication technology undermine the social norms while online regulations are being a weak state not established. In the confusion of these norms it has been shown to increase in juvenile delinquency. Social media has characteristics such as openness, accessibility, relationships, and content diversity. The social media itself is not subject to the general mechanisms of consumption and production due to growing as a kind of organism. It has characteristic to make the most content by utilizing the users to voluntarily share information. Social media using as communication, contact and information in the youth, thus the possibility of crime is high. Social media is also direct and indirect influence on youth crime but no apparent systemic regulation of this situation.

The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees (정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.27-38
    • /
    • 2013
  • There are two elements of security policy that can have a bearing on its effectiveness: content and form. While the content of the security policy has been investigated extensively in the most of the previous studies, there is very little literature on the form of the security policy. Since the form of the policy influences its success, it is important to understand how to articulate the form of a security policy. Thus, the aim of this study is to investigate the relationship between security form and policy compliance of employees. Research results find that dimensions of security form have effect on attitude towards security compliance, subjective norm, perceived behavioral control, and perceived response costs, and besides attitude towards security compliance and subjective norm have an effect on persistent security compliance intention. The conclusions and implications are discussed.

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior (청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구)

  • Park, KyungA
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.79-98
    • /
    • 2019
  • In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance (정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구)

  • Kim, Hye Jung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.147-164
    • /
    • 2013
  • For the continuous information security governance, we have to focus on not just technical aspects like access control and DRM, but informal level management like information security(IS) behavior, culture, and personal value. But there are few informal level studies, while many formal level studies of IS governance or technical means. This study is an empirical test that how IS culture, normal beliefs, personal behavior and value affect employee's deviant behavior. And we define a lack of an awareness of value and importance on IS regulations in organizations as "Information Security Anomie" with the concept of anomie, a viewpoint on social organization.

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.

Study on Private Security Ideology (민간경비 이념에 관한 연구)

  • Seo, JinSeok
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.207-213
    • /
    • 2013
  • As the axis of the private security maintain social order in order to achieve the original purpose of all society must move in the direction of motion, and so in order to be a private security based philosophical values and ideological composition should be based. In this process, to be followed by private security value or direction, philosophy private security is the norm. In this regard, this study pursued by the private security justification ever truly normative principles are intended to establish. The public nature of the ideology of private security, public, efficiency, legality, responsiveness and the like. Conflict occurs between the value of these ideals, although complementary are in harmony.

Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior (경영진 역할과 보호동기 요인이 정보보안정책 준수 의지에 미치는 영향: 계획행동이론을 기반으로)

  • Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.69-84
    • /
    • 2018
  • This study examines antecedents of the intention of compliance with information security policies based on Ajzen's Theory of Planned Behavior. The study conducted the following: Verification of casual relations between role of management and protection motivation and the antecedents of planned behavior as parameters to determine the effect on the intention of compliance with information security policy, and comparative analysis between the research model and a competition model. The result of the study disclosed that, in the research model, attitude and subjective norm took an intermediary role on management beliefs, response efficacy, response cost, self-efficacy, and compliance intention, and perceived behavior control on management beliefs, self-efficacy and compliance intention.

  • PDF

Factors Influencing on the Compliance of Information Security Policy of Workers of Shipping and Port Organization (해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.1-23
    • /
    • 2012
  • Advances in information technology has brought many benefits to businesses, but at the same time, businesses are facing serious problems caused by its use such as information leakage. In order to cope with problems, companies have established information security policies, demanding workers of a company to be compliant with the policies. This study proposes a research model that includes information security awareness, information security attitude, self-efficacy, standard belief and social influences as factors that affect the compliance of information security policy among the workers of shipping and port organization. The results of this study showed that there was a positive relationship not only between the information security awareness and the information security attitude, but also between the information security attitude and the information security policy among the workers of shipping and port organization. It was also found that there was a positive relationship between the self-efficacy and the compliance of information security policy, and between the social influence and the compliance of information security policy. However, there was no meaningful relationship between the standard belief and the compliance of information security policy. This study examined to what extent the workers of shipping and port organization that have a high possibility of the information leakage were compliant with the information security policy. The findings will contribute to organizations of shipping and port who attempt to establish strategies related to information security.