• Title/Summary/Keyword: 보안 교육

Search Result 657, Processing Time 0.035 seconds

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees (기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구)

  • Jung, Jaewon;Lee, Jung-hoon;Kim, Chae-ri
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.51-59
    • /
    • 2016
  • An internal and external threat against an information system has increased, and to reduce it, organization has spent a great deal of money and manpower. However, in spite of such investment, security threat and trouble have happened continuously. Organization has conducted information security activity through various policies. The study classified such activities into prevention-oriented activity and control-oriented activity, and researched how information security activity of organization affects members of an organization and obeys information security policy by using health belief model. As a result of the study, prevention-oriented activity has a meaningful impact on seriousness, and this seriousness affects compliance intention for information security. Control-oriented activity has a meaningful impact on benefits, and the benefits have an effect on compliance intention. When an organization conducts prior activities such as education, PR, and monitoring, this organization should emphasize negative results that can happened because of deviation. In addition, in case of exposure and punishment through post activities such as inspection and punishment, if the organization emphasizes the positive effects of exposure and punishment rather than emphasis of negative parts, information security activity will be more effective.

Studies of Communicational Education Suitable for Security Environment (안보환경에 적합한 해군부사관과의 의사소통 교육방안 연구 - 맥락적 의사소통을 중심으로)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.47-56
    • /
    • 2016
  • This study's goal is to consider deeper about the Context-Communication Study on candidates of future petty officers in community colleagues, therefore the study uses theoretical approaches of the communications based on literature research. The petty officer majors in community colleagues need to set a curriculum to achieve the goal of the Context-Communication Study. The class, which is a continuous class from freshman to sophomore year, needs to be designed as a combination class of command/discipline major classes and communication studies. This study shows the detail ways of the Context-Communication Study to bring student's interests by using simulation studies with writing papers, training interviews, and presentations which all will be checked by their instructors. Instructors will get students to the point that they have upscale communication abilities and language abilities. Finally, this study shows limitations of the Context-Communication Study and suggests the further direction of research.

Study on promoting the educational role of security sector to prevent child missing (아동실종 예방을 위한 시큐리티 분야의 교육적 역할증진)

  • Park, SangKyun;Kim, JinHwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.215-222
    • /
    • 2013
  • This study aims to provide future direction recognizing the educational importance and to present the way ahead that practices correctly for improving an educational role on security sector to prevent child missing. Therefore, it was conducted with questionnaire that is "Research on participation grade of education to prevent child missing and the actual condition" made by researcher of this study which is on 363of parents of pre-chirdren of 6,7 and 8years old in a kindergarten and an elementary school where is located in metropolitan area. It operated to take processing enterprise statistics using SPSS/WIN 12.0 for getting data, and analyzed frequency and t-verification.It investigated correct selection of an education specialist on preventive education and participation grade of education to prevent missing on home, how often, how it is conducted, then what requirement for educationto prevent child missing and participation grade is, whether difference is in accordance with gender of parentsand gender of child.

Plans to Integrate for the Polygraph Institution (거짓말탐지기 교육기관의 일원화 방안)

  • Kang, Dong Beom;Bae, Du Yeol
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.49-57
    • /
    • 2015
  • As the capitalist society was launched, false has been increasing day by day for the personal profit. Study after study since a long time ago has concluded that today's polygraph developed in order to determine these false. In Korea the polygraph has been used actively in current investigation agency, and passively in a private enterprise by a former polygraph examinant from the investigation agency. Each investigation agency is recruiting polygraph examinants through the strict qualifications, training education. Decisions of Supreme Court precedents about the polygraph test results are denying admissibility of evidence in reliability on the efficiency of a test equipment, way to ask, qualities of polygraph examinant, etc. The most fundamental cause of the issues mentioned in the precedents is that examinants of each investigation agency are being trained by dual education not centralized. Because of each investigation agency has its own training and polygraph examinant, each agency can occur variations every agency or every examinant, therefore ensuring the centralized educational system is needed. In this way, ensuring the centralized educational system will contribute to improve the reliability of polygraph test results and make a retrenchment in the educational budget in accordance with examinant training of each agency.

CCTV Video Privacy Protection Scheme Based on Edge Blockchain (엣지 블록체인 기반의 CCTV 영상 프라이버시 보호 기법)

  • Lee, Donghyeok;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.10
    • /
    • pp.101-113
    • /
    • 2019
  • Recently, the intelligent video surveillance technology has become able to provide various services such as predictive surveillance that have not been provided previously. Securing the security of the intelligent video surveillance is essential, and malicious manipulation of the original CCTV video data can lead to serious social problems. Therefore, in this paper, we proposed an intelligent video surveillance environment based on blockchain. The proposed scheme guarantees the integrity of the CCTV image data and protects the ROI privacy through the edge blockchain, so there is no privacy exposure of the object. In addition, it is effective because it is possible to increase the transmission efficiency and reduce storage by enabling video deduplication.

Development of informatics subject education system using cloud-based social platform for maker education (메이커 교육을 위한 클라우드 기반 교육용 소셜 플랫폼을 활용한 정보교과 교육시스템 개발)

  • Yang, Hwan-Geun;Lee, Tae-Wuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.409-412
    • /
    • 2019
  • 본 논문에서는 인공지능과 빅데이터 클라우드 등 다양한 4차 산업혁명시대의 기술과 교육을 융합한 에듀테크를 기초로 하여 에듀테크에 대한 교사의 학습 방향을 제시하며 전체적인 클라우드의 개념 및 분류체계, 교육의 활용을 제시하였고 클라우드 기반 교육용 소셜 플랫폼과 R. M. Gagne(1985)의 9가지 이론을 토대로 정보교과 추상화 단원의 학습 지도안을 설계 후 성취도 평가를 제시하였다. 연구 내용 분석 결과 기술의 발전성과 교육현장에서의 개인정보 교육 및 정보보안 교육의 필요성이 강조되며 확고한 플랫폼 구축과 빅데이터 확보 및 분석하여 개인에게 맞춤형 서비스 제공이 필요하다. 또한 사용자 편의성 극대화 서비스 및 UX 간결이 요구된다. 본 논문을 토대로 에듀테크의 일부분인 클라우드 기반 소셜러닝의 다양하고 체계적인 선행연구 활성화에 시발점이 되었으면 한다.

  • PDF

A Study on Improvement of Higher Informatics Education in Korea (한국 고등정보교육 개선 방안 연구)

  • Woo, HoSung;Kim, JaMee;Lee, WonGyu
    • Proceedings of The KACE
    • /
    • 2017.08a
    • /
    • pp.103-105
    • /
    • 2017
  • IT의 급속한 발달은 교육에 대한 인식과 체계를 변화시키고 있다. 각국은 불확실한 사회 변화에 대처하기 위해 정보교육을 강화하고 있는 것도 IT의 발전이 국가의 경쟁력으로 반영되기 때문이다. 본 연구는 미국의 고등정보 교육과정 표준인 CS2013에 근거하여, 층화표집과 무선추출로 선정된 한국의 7개 대학 정보교육과정 현황을 분석하였다. 분석 결과, 하나의 대학을 제외한 모든 대학은 소프트웨어 개발 기초(SDF)와 프로그래밍 언어(PL)과 관련된 과목개설 비중이 15%이상 29.2%이하로 높은 비중을 차지하였다. 플랫폼 기반 개발과 병렬 및 분산 컴퓨팅 지식영역을 세 곳의 대학만 포함하고 있었으며, 정보 보호와 보안영역은 네 곳의 대학만 포함하고 있었다. 본 연구는 국가수준의 고등정보 표준교육과정이 부재한 상황에서 교육과정 구성을 위한 단초 및 고등교육의 시사점을 제공하기 위한 목적이 있다.

  • PDF

A Study on the Improvement of the Subway Protective Guards System (지하철보안관제도의 활성화 방안에 관한 연구)

  • Lee, Sol-Ji;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.133-154
    • /
    • 2016
  • The Seoul subway system has one of the highest transport shares in the city of Seoul. A high number of passengers means that a high level of crimes of all kinds occur on the city's subway system. As such, Seoul Metro, created the Subway Protective Guards System in 2009, in an effort to enhance safety on the subway. But this innovative new system did not resolve problems. In fact, many citizens came to question the effectiveness of the new system, as it did not yield tangible results. This study seeks to deduce the problems and activation strategy of the Subway Protective Guards System. An in-depth study was conducted by interviewing subway protective guards who were squad leaders with five or more years of relevant work experience. Semi-structured interview analysis was utilized to evaluate their responses. Specifically, their responses were deduced to identify the strengths and weaknesses internal to the system and the opportunities and threats posed by the environment external to the system. This study presents measures to improve the system based on the aforementioned analysis. Measures for improvement focused on the following areas: the adoption of an education system in response to terror; recruitment and the possibility of becoming a permanent employee; obtaining partial judicial powers; improvement of work environment; and intensifying the promotion of the system.

  • PDF

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.