• Title/Summary/Keyword: 정책 준수

Search Result 290, Processing Time 0.025 seconds

Usage of the International Standards for the Process of Methodological Acts and Software of the Records Management (기록관리 방법론 법제화와 소프트웨어 개발을 위한 국제표준의 활용)

  • Bolortuya, P.
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.1
    • /
    • pp.189-192
    • /
    • 2013
  • Since 2008, the General Archives Authority of Mongolia introduced management standards on international records, such as ISO 15489. GAAM translated the international standards and have trained government records managers with such standards. These international records management standards are also incorporated into the Mongolian records legislations and records management guidance. Complying with the standards are also the requirements for designing records management software in Mongolia.

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step (분석단계에서 취약점 관리의 보안 요건 정의에 관한 연구)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.75-80
    • /
    • 2015
  • Vulnerability management is in compliance with security policies, and then, this is to ensure the continuity and availability of the business. In this paper, the application vulnerability management and IT infrastructure of the system is that it must be identified. And a viable vulnerability management plan should be drawn from the development phase. There are many that are not defined vulnerability in the area of identification and authentication, encryption, access control in identification and classification of vulnerabilities. They define the area without missing much in technical, managerial, and operational point of view. Determining whether the response of the identified vulnerability, and to select a countermeasure for eliminating the vulnerability.

A Research on Applying Copyright Laws and Response Strategies for Academic Libraries (저작권법의 적용과 대학도서관의 대응 전략에 관한 고찰)

  • Kwack, Dong-Chul
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.4
    • /
    • pp.235-254
    • /
    • 2013
  • The purpose of this study is to seek sustainable development plans in which academic libraries comply with copyright laws without withdrawing their information services by focusing on the changes of the relevant regulations since 2000 when copyright laws were revised. The study deals with the followings in detail. First, the issues with library information services is examined, owing to the enactment, revision, and execution of copyright laws. Second, the histories of enacting and amending copyright laws related to libraries are considered. Third, various opinions and response measures as to applying the copyright laws to libraries are analyzed. Forth, based on the previous analysis, the study suggests response strategies that academic libraries accept for copyright laws and keep improving library information services.

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy (정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로)

  • Oh, Jinwouk;Baek, Seung Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks (은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구)

  • Shim, Joonbo;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.

Domestic Radio Waves Propagate Management and Control Systems Investigate the System Status (주요선진국 전파관리제도와 국내 전파관리 제도에 대한 조사)

  • Kim, Sung-Hong;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • There propagate use management paradigm in developed countries is changing as Command & Control ${\Rightarrow}$ Market Based ${\Rightarrow}$ Open Access ${\Rightarrow}$ Manage By Technology & Technical Analysis, that the policy response to environmental changes, such as a variety of new technologies. The emergence of service, the proliferation of propagation users It is to activate the market. However, the basic principles of radio management such that the change of paradigm be used to spread in a range that does not affect the interference, such as the horn is to be observed. Around the world in order to prevent the propagation and utilization Horn interference enacted regulations for managing the radio station, and also discipline.

Design and Implementation of CDMI Interfaces for Cloud Data Management (클라우드 데이터 관리를 위한 CDMI 인터페이스의 설계 및 구현)

  • Ahn, Minje;Jeon, Inbae;Son, Ingook;Li, He;Park, Yonghun;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.297-298
    • /
    • 2013
  • 클라우드 컴퓨팅 산업의 발달로 클라우드 데이터를 관리하기 위한 연구들이 활발하게 진행되고 있다. 그러나 현재 연구되고 있는 다양한 형태의 클라우드 컴퓨팅 플랫폼들은 기술적, 정책적으로 개방성을 띄지 않아 사용자의 구축 환경에 따른 상호 운용성을 보장하지 못한다. 본 논문에서는 클라우드 환경에서 데이터 생성, 검색, 갱신, 삭제하기 위해 CDMI 국제 표준을 준수하는 저장소 인터페이스를 설계하고 구현한다. 이러한 인터페이스는 특별한 제약없이 클라우드 저장소를 구축하거나 사용하려는 개발자에게 필요한 기능을 제공한다.

  • PDF

Method of data processing through polling and interrupt driven I/O on device data (디바이스 데이터 입출력에 있어서 폴링 방식과 인터럽트 구동 방식의 데이터 처리 방법)

  • Koo, Cheol-Hea
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.9
    • /
    • pp.113-119
    • /
    • 2005
  • The methods that are used for receiving data from attached devices under real-time preemptive multi-task operating system (OS) by general processors can be categorized as polling and interrupt driven. The technical approach to these methods may be different due to the application specific scheduling policy of the OS and the programming architecture of the flight software. It is one of the most important requirements on the development of the flight software to process the data received from satellite subsystems or components with the exact timeliness and accuracy. This paper presents the analysis of the I/O method of device related scheduling mechanism and the reliable data I/O methods between processor and devices.

Developing the Framework of IT Governance for Green Business (그린 경영을 위한 IT 거버넌스 체계에 관한 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Lee, Sang-Hak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.369-378
    • /
    • 2011
  • Recently, following increased concern about green, people think that the pollution problems are cause of firm's product activities. So, firm's burden increased to protect nature and save energy during produce the goods. To keep the regulation and use the strategy methods, need to new Green IT Governance Framework(GITGF). FGI(Focus Group Interview) was used to carry out the research that is not mature. In this paper, we proposed the framework that is composed of green IT domain, business purpose, IT purpose and management process. GITFG is useful method to govern the corporate activities in the green IT Governance perspective.

ITU-T SG17/Q.8 X.tpp-1 국제표준화 (텔레바이오메트릭스 환경의 바이오정보 보안대책) 현황

  • Jun, In-Ja;Kim, Ja-Son;Ha, Do-Yoon;Choi, Jae-Yoo
    • Review of KIISC
    • /
    • v.18 no.4
    • /
    • pp.54-60
    • /
    • 2008
  • 바이오인식기술을 이용하는 개인인증을 수행하는 바이오인식 시스템으로 구성되어 물리적 접근제어, 인터넷 접근제어, 전자여권 등 다양한 장소에서 신원확인의 수단으로 이용되어지고 있다. 바이오인식 시스템은 다양한 장소에서 사용되므로, 바이오정보획득, 처리, 정합 등을 수행하는 시스템이 분리되어 구축된다. 이때 각 시스템 및 시스템에서 사용/전달되어지는 정보의 변환, 도용, 훼손에 대한 보호 및 시스템에서 비인가자의 불법적인 원격침입 가능성이 발생한다. 이와같은 공격의 취약성을 방지하기 위하여 텔레바이오메트릭 시스템에 대한 보호절차를 구성하였다. 개인인증을 위하여 생체정보를 수집하거나, 이용하는데 있어서 준수하여야 하는 바이오정보보호에 대한 중요사항을 제시하고, 안전한 이용환경을 제공하기 위하여 네트워크상에서 시스템이 수행될 때 발생하는 공격 취약점을 정의하였으며, 이를 보호하기 위한 가이드라인을 구성하였다. 텔레바이오인식 시스템보호 절차에서 제시하는 가이드라인은 바이오정보 보호 정책 개발방법, 위험분석, 바이오인식 시스템 운영 및 기술 개발시에 활용할수 있다. 본고는 현재 ITU-T SG17 Q.8(Telebiometrics)에서 KISA가 추진하여 년내에 X.tpp로 제정이 예상되는 국제표준을 상세히 설명하고 있으며, 이는 곧 바이오인식 시스템을 이용한 작은규모의 물리적 접근 제어 시스템으로부터 국가적 규모의 바이오인증 시스템까지 응용가능한 텔레바이오인식 시스템 전반에 적극 활용할 수 있다.