• Title/Summary/Keyword: 보안 위험성향

Search Result 9, Processing Time 0.022 seconds

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.

CSO 양성기 - 바람직한 CSO(Chief Security Officer)의 역할 모델

  • Lee, Hui-Myeong
    • 정보보호뉴스
    • /
    • s.136
    • /
    • pp.30-33
    • /
    • 2009
  • 본 기고는 기업에서 지난 6년 동안 정보보호 관련업무 실무책임자로서의 경험을 토대로 어떻게 하면 보다 더 효율적이고 안정적인 정보보호활동을 수행할 수 있을까 하는 관점에서 바람직한 CSO의 역할 모델을 정리해 본 글이다. 전혀 보안에 신경을 쓰지 않아도 보안사고가 발생하지 않으면 100점짜리 보안수준이 되는 것이고, 제아무리 보안교육과 점검을 실시하고 취약점을 개선하기 위한 다양한 보안투자를 시행하더라도 보안사고가 터지는 순간, 보안수준은 순식간에 빵점짜리로 전락한다. 때문에 필자는 종종 정보보호 책임자는 안전고리를 벗겨낸 폭탄을 가슴에 품고 언제 터질지 모르는 지뢰밭에 서있는 사람이라고 역설한 바 있다. 최근 급속한 IT기술의 발전과 극심한 개인주의 성향 등으로 그 어느 때보다 보안사고의 위험성과 피해규모가 크게 증대되고 있으며, 이에 따라 기업에서 정보보호 업무 수행부서의 역할과 책임범위 역시 과거와 달리 매우 광범위하게 확장되고 있는 실정이다. 특히 우리나라는 90년대 말 IMF 당시 구조조정의 여파로 중국을 비롯한 해외 경쟁회사로 국내 기술자들이 이직함으로써 핵심 산업기술의 유출이라는 피해를 경험한 바 있다. 그런데 최근 미국에서 시작된 세계경기의 위축으로 또 한 차례의 보안사고 위험성에 크게 노출되어 있는 상황이다. 각 국의 문화 및 산업의 다양성만큼이나 수많은 위험성이 산재하고 있는 현대 사회에서 바람직한 CSO가 되기 위한 몇 가지 착안사항들에 대하여 논해 보고자 한다.

  • PDF

A study on the influence of information security in selecting smart-phone (정보보안이 스마트폰 선택에 미치는 영향에 관한 연구)

  • Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.207-214
    • /
    • 2014
  • Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior (청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구)

  • Park, KyungA
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.79-98
    • /
    • 2019
  • In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

Impacts of Individual and Technical Characteristics on Perceived Risk and User Resistance of Mobile Payment Services (개인 및 기술 특성이 모바일 결제 서비스의 지각된 위험과 수용저항에 미치는 영향에 관한 연구)

  • Kim, Sanghyun;Park, Hyun-Sun
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.239-253
    • /
    • 2017
  • This study investigates to investigate the factors that influence user resistance of mobile payment services. We suggested individual and technical characteristics of mobile payment services as factors influencing perceived risk and user resistance. In addition, we suggested negative security recognition as moderating variable. To test the proposed hypotheses, we collected 349 survey responses from the users of mobile payment services and conducted structural equation modeling with SmartPLS2.0. The results show that, first, negative social influence, risk aversion and distrust in existing services had an effect on the perceived risk. Second, the pace of change and vulnerability had an effect on the perceived risk. Third, perceived risk affected the user resistance while negative security recognition is related to the relationship between perceived risk and user resistance.

The Effect of Privacy Policy Awareness on the Willingness to Provide Personal Information in Electronic Commerce (전자상거래의 프라이버시 정책 인식이 개인정보제공의도에 미치는 영향)

  • Jongki Kim;Dawoon Oh
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.185-207
    • /
    • 2016
  • This study investigated the relationship between privacy policy awareness and willingness to provide personal information. Online privacy policies published on the Internet aim to build the trust of consumers and reduce their concerns about the provision of providing personal information. This study uses FIP(FIP; Fair Information Practices) principles to measure awareness of privacy policy. The result of the survey indicates significant relationships among awareness of privacy policy of e-commerce websites, privacy trust, and privacy risk. Privacy policy aims to improve transparency of collection and use of personal information. A high level of privacy trust is related to a high level of willingness to provide personal information on an e-commerce website. A low level of privacy risk is related to a high level of willingness to provide personal information on an e-commerce website. This study found that disposition to trust moderates the relationship between privacy policy awareness and privacy trust. This study contributes to further research on the relationships among privacy policy awareness, privacy trust, and privacy risk. The result of this study can be used by companies that aim to build privacy trust and reduce privacy risk.

The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties (비용편익분석 프레임워크를 통한 개인정보가치에 대한 연구: 개인적 특성, 거래 상대방 특성, 상황적 특성을 중심으로)

  • Jaehyun Park;Eunkyung Kweon;Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.155-177
    • /
    • 2017
  • The purpose of this study is to investigate those factors that are influenced when a user recognizes his/her private information value as an economic asset. The relationship among these factors will also be discussed. This research targets Internet users, and the value of their private information will be converted into economic figures. How economic value changes in relation with individual attributes, dealer's traits, and circumstantial properties will also be studied. The changes in the factors of private information value under different situations will be analyzed from an economic perspective. By using the cost-benefit analysis framework, this work hypothesizes that the user's private information value can be influenced by individual attributes and situational properties. in the business aspect, this study can help users recognize the true value of their personal information and minimize the cost resulting from private information security incidents. This work also highlights the necessity of estimating the scale of investments for protecting private information. Overall, this research will proceed under the hypothesis that the users' recognition of their private information value is influenced by the attributes of the individual, dealers, or situations.

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.