• Title/Summary/Keyword: 정보보호 교육기관

Search Result 106, Processing Time 0.025 seconds

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

Development of environmental education virtual content using VR devices: Focusing on household waste separation methods (VR 기기를 활용한 환경교육 가상 콘텐츠 개발 : 생활폐기물 분리수거법을 중심으로)

  • Ye-ram Lee;Su-ah Lee;Sangyoon Kang;Junbae Kim;Seong-hwan Jeon;Seok-Hun Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.241-242
    • /
    • 2024
  • 환경오염으로 인한 문제는 매년 발생하고 있다. 그러나 환경오염의 심각성을 인식하고 있는 비율에 비해 환경보호 실천보다 생활의 편리함이 더 중요하다고 생각하는 비율이 높으며, 올바른 환경보호 지식을 습득하고 있는 수가 적다. 유년기, 청소년기에 초중고교에서의 교육을 통해 올바른 환경 지식을 습득하고 환경을 보전하려는 태도를 갖추는 것이 중요한데, 환경 교과목을 채택한 교육기관의 수는 14.1%로 절반도 채 되지 않는다. 본 논문은 가상공간 내에서 올바른 분리수거 방법을 습득하고, 학습자가 이를 실생활에 적용하기 용이한 게임기반의 체험형 VR 환경교육 콘텐츠를 제시하고자 한다.

  • PDF

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

Are There Any Solutions for the Cybersecurity Education Gap in the Public Sector? (공공부문의 사이버보안 교육격차 해소를 위한 탐색적 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.973-985
    • /
    • 2021
  • South Korea has been guaranteed the efficiency and the convenience of administrative work based on long-term experience and well-established ICT infrastructure. Vice versa, South Korea is always exposed to various scale cyber-attacks. It is an important element of national competitiveness to secure cybersecurity resilience and response in the public sector. For this, the well-trained cybersecurity professionals' retention and support for their capacity development through retraining are critical. As the Special Act on Balanced National Development, most public agencies moved to provincial areas, but the provincial areas are not ready for this, thus the workforce can't get enough retaining courses. We study to analyze whether there is a gap in cybersecurity educational opportunities or needs in the public sector depending on regions, institution type, and personal traits. This paper aims to suggest solutions for the cybersecurity education gap in the public sector based on the empirical analysis results.

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

정보보안경영 전문가 자격요건

  • Oh, Kyeong Hee
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.51-56
    • /
    • 2015
  • 적절한 능력을 보유한 정보보안경영 전문가를 확보하는 것은 전세계적으로 많은 조직의 관심사가 되고 있다. 정보보안 경영체계 관련 표준을 다루는 ISO/IEC JTC 1 SC 27/WG 1에서는 이러한 요구를 다루기 위하여 2014년 10월 ISO/IEC 27021 정보보안경영 전문가 자격 요건에 대한 국제표준을 개시하였다. 9월까지 2차 WD가 개발될 예정인 본 표준은 2년간의 연구기간을 거치면서 표준의 범위에 관해 이미 많은 논란을 거쳤으며, 현재는 정보보안경영 전문가가 보유해야 할 비즈니스 관련 전문성에 대한 논쟁이 진행되고 있다. 본 논문에서는 이 표준이 개시되기까지의 배경과 진행 현황, 주요 현안들을 살펴본다. 본 표준은 국제 정보보안 인력 및 교육 시장에 상당한 영향을 미칠 것으로 예상되며, 이에 대한 해외의 대응을 살펴보고 활용 방안을 제시한다. 또한 국내 보안 전문가 및 인력 양성 기관들의 관심과 참여를 촉구한다.

Implementing Jewelry B2B E-Commerce : A Case of Jewelry Korea (귀금속 소비재 분야 B2B 전자상거래 연구 : 쥬얼리코리아의 사례)

  • 김도연;이영재
    • Proceedings of the Korea Database Society Conference
    • /
    • 2001.11a
    • /
    • pp.515-525
    • /
    • 2001
  • 글로벌 시대에 있어서 우리나라 귀금속 분야의 국제적인 경쟁력을 높이기 위해서는 전자상거래를 도입하여 유통경로를 간소화하고 거래의 투명성을 확보하는 것이 필수적이라 할 수 있다. 이는 각 기업의 경쟁력제고 및 소비자를 보호할 수 있으며, 국가 자원 관리적 측면에서도 효율성을 기할 수 있을 것이다. 이러한 관점에서 본 논문에서는 귀금속 소비재 분야의 B2B 전자상거래 모델을 쥬얼리코리아의 사례를 통해 제시하였다. 쥬얼리코리아는 귀금속 소비재 부문의 e 마켓플레이스를 구성하여 귀금속 생산업체가 각각 독립적인 입점업체로 참여하고, 국내 소매상과 해외바이어가 구매자로 참여하여 기존의 메이커(제조업체)-도매상-중상인-소매상의 4 단계 유통경로를 축소하여 각 생산업체에서 소매상간 직거래가 가능하도록 하는 것이 핵심이다. 여기에 금, 나석 등 원자재 공급업체와 각종 설비 및 기계장치의 공급업체, 귀금속 제조관련 교육기관, 여행사 등이 참여하여 다양한 제품 정보와 서비스를 제공함으로써 기존의 폐쇄적인 유통체계와 정보체계를 해소하고 귀금속의 종합적인 정보창고로서의 역할도 수행한다. 또한 해외바이어 정보와 Inquiring 정보, 해외쥬얼리쇼정보 등을 제공함으로써 해외시장 개척과 수출 증대에도 기여한다.

  • PDF

Mother's Knowledge of Eye Health-related for Young Children (유아기 어머니의 안보건관련 지식에 대한 연구)

  • Kim, Hye-Gum;Lee, Ok-Jin
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.12 no.3
    • /
    • pp.59-63
    • /
    • 2007
  • This study examined prevailing parents' knowledge of eye health for young children. 139 mothers responded to a questionnaire developed by the researchers. Mothers had general eye health knowledges regardless of their age, education level, and job, but they had less knowledges about children's eye health in some items. Therefore there is a need to develop education programs and materials for eye health as well as a need to provided for young children's parents.

  • PDF

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

Development of the Cyber University's Admission Quota Policy Model (사이버대학 학생정원 관리모형 개발)

  • Lee, In-Sook;Suh, Soon-Shik
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.493-503
    • /
    • 2011
  • The Korea Ministry of Education, Science and Technology (MEST) determines admission quota of cyber universities. MEST's decision is made based on each university's physical and administrative capacity for handling admission numbers. However, the unique characteristics of cyber universities (e.g., online teaching and learning environments) are not considered in MEST's current decision process. MEST also lacks specifics in their policies that are required to ensure university's autonomous control for admission number as well as learners' rights and quality assurance. This study intended to improve decision making process on admission quota of cyber universities so as to increase quality assurance of education. The alternative admission quota decision frameworks have been formulated based on (a) the analysis of the current practices of cyber universities, (b) focus group interviews, and (c) recommendations of the expert.

  • PDF