• Title/Summary/Keyword: 침해

Search Result 2,138, Processing Time 0.025 seconds

The effect of techno-overload and techno-invasion on work-family conflict: mediating effect of psychological detachment and moderating effect of leader-member exchange (테크노 과중과 테크노 침해가 일-가정 갈등에 미치는 영향: 일로부터의 심리적 분리의 매개 효과 및 상사-부하 교환관계의 조절 효과를 중심으로)

  • Se-Hwan An ;Dong-Gun Park
    • Korean Journal of Culture and Social Issue
    • /
    • v.23 no.2
    • /
    • pp.97-129
    • /
    • 2017
  • The purpose of this study was to investigate the influence of techno-overload and techno-invasion on work-family conflict and the mediating role of psychological detachment from work to techno-overload and techno-invasion. In addition, this study examined the moderating role of leader-member exchange in the relationship between techno-overload, techno-invasion and psychological detachment from work. The results from 306 participants provided evidence that (1) techono-invasion was negatively related to psychological detachment from work, (2) psychological detachment from work was negatively related to work-family conflict, (3) psychological detachment from work partially mediated the relationship between techno-invasion and work-family conflict (4) leader-member exchange moderated the relationship between techno-invasion and psychological detachment from work. Based on the results, implications of these findings, limitations, and future research were dicussed in general discussion.

The effect of techno-overload and techno-invasion on emotional exhaustion: mediating effect of psychological contract breach and moderating effect of voice behavior (테크노 과중과 테크노 침해가 정서적 소진에 미치는 영향: 심리적 계약 위반의 매개 효과 및 발언행동의 조절 효과를 중심으로)

  • Sae-Ha-Neul Kang;Hyun-Sun Chung
    • Korean Journal of Culture and Social Issue
    • /
    • v.25 no.1
    • /
    • pp.27-53
    • /
    • 2019
  • The purpose of this study is to investigate the influence of techno-overload and techno-invasion on emotional exhaustion and the mediating role of psychological contract breach. In addition, this study examines the moderating role of voice behavior in the relationship between techno-overload, techno-invasion and psychological contract breach. The results from 296 participants provided evidence that (1) techno-overload and techno-invasion are positively related to psychological contract breach, (2) psychological contract breach is positively related to emotional exhaustion, (3) psychological contract breach partially mediates the relationship between techno-overload, techno-invasion and emotional exhaustion, (4) voice behavior moderates the relationship between techno-overload, techno-invasion and psychological contract breach. Based on the results, implications of these findings, limitations, and future research are discussed in general discussion.

A Study on Improving the Act on Information and Communication Network for Enhancing the Effectiveness of Cyber Incident Reporting (침해사고 신고의 실효성 제고를 위한 정보통신망법 개선 연구)

  • Tae-seung Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.801-811
    • /
    • 2023
  • With the cyber incidents increasing every year, opinions are being raised that legal system relating to incident reporting needs to be revised to improve the cyber incident reporting rate, etc. Accordingly, this paper suggests a legal improvement to enhance the effectiveness of cyber incident reporting. First, by analyzing domestic media coverage, this paper defines the problems which need to be improved regarding an incident reporting system as "unreported" and "not timely reporting". Then, this paper finds four requirements for legal improvement like "a reporting entity", "a starting point of reporting", "a reporting deadline" and "a protection of reporting information" by analyzing the relationship between reporting relating problems and issues published by overseas institutions and additionally by analyzing the need to revise the law. Finally, through an analysis of legislative cases, this paper suggests a legal improvement for the requirements.

PC통신과 명예.프라이버시 침해문제

  • Sin, Gak-Cheol
    • 정보화사회
    • /
    • s.83
    • /
    • pp.48-52
    • /
    • 1994
  • 최근 PC통신 인구가 증가함에 따라 사회 역기능으로 명예.프라이버시 침해가 사회문제로 확산되고 있다. 이번호에는 이에 따른 문제점을 점검하고 해결방안을 현행의 법률체제내에서 살펴본다.

  • PDF

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

A Study on the Factors Influencing Student Athletes' Human Rights Abuse Experience -Focusing on the analysis of environment in team, human right in event and human right in sports using logistic regression (학생선수의 인권침해 경험에 영향을 미치는 요인에 관한 연구 -로지스틱 회귀분석을 이용한 팀 분위기, 소속종목 인권의식, 체육계 인권의식에 대한 분석을 중심으로-)

  • Lee, Youn-Young;Lee, Je-Hun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.295-305
    • /
    • 2022
  • This study aimed to present a realistic policy direction to reduce human rights violations by analyzing the mechanisms of its factors affecting the experience of human rights violations for middle and high school student athletes. The method analyzed the response data of 13,205 student athletes through a structured questionnaire using logistic regression analysis. The independent variable consisted of sexual violence, sexual shame, physical violence, verbal violence, bullying, invasion of privacy and learning rights, and unfair leaders' actions related to exercise. As a result of the analysis, first, the team atmosphere, human rights consciousness in their sports and in the sports field were found to have a significant influence on physical and language violence, bullying, privacy and infringement of learning rights. Second, for the experience of sexual violence, the team atmosphere and the level of awareness of human rights violations in the sports community had a significant effect, but the permission of violence in the sports community and human rights consciousness in their sports did not appear as meaningful variables. Third, it was found that the unfair experience related to exercise had a significant effect on the team atmosphere, the overall level of violence in the sports community, and the its awareness of human rights violations in the sports community.

A Study on Improvement of Cadet's Human Rights Violation (실습선원의 인권침해 개선에 관한 연구)

  • Jeong Seon-Geun;Kim Jong-Kwan;Park Sung-Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.5
    • /
    • pp.470-478
    • /
    • 2023
  • All people have human rights that should be protected, and today, the importance of protecting human rights is emphasized in all areas of society. The industry is also carrying out activities to protect the human rights of workers, such as implementing human rights education for human rights management and preparing a response system for human rights violations. However, due to the closed environment and special working conditions, seafarers on board are often placed in a blind spot in human rights protection. In particular, a number of cases of human rights violations concerning beginner seafarers, including cadets, have been identified, and relevant research is insufficient compared to other occupational groups. Jobs that restrict basic human rights cannot be envied by anyone. In this study, implications and problems were derived based on the results of a human rights survey of cadets, and cases of human rights violations, and improvement measures were proposed. The cadets had a very negative perception of human rights violations before boarding. However, it was found that their perception changed after boarding. It was confirmed that cadets have unnecessary fears and concerns before boarding. Improvement measures include the establishment of a legal system for the status of cadets, measures to alleviate non-physical human rights violations, improvement of human rights violations handling procedures and response systems, and enhancing the effectiveness of human rights education.

Information Security Investment and Security Breach: Empirical Study on the Reverse Causality (정보보호 투자와 침해사고의 인과관계에 대한 실증분석)

  • Shin, Ilsoon;Jang, Wonchang;Park, Heeyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1207-1217
    • /
    • 2013
  • This study utilizes raw data from "Research on the actual condition of firms' information security" of KISA (2010) and constructs panel dataset to analyze a causal relationship between information security investment and security breach. Using Difference in Difference estimation method we find the following results. First, while the usual causality that information security investment reduces security breach is not supported, the reverse causality that security breach increases information security investment is well explained. Second, contrary to the conventional wisdom, firms in the finance/insurance business sector show the most significant reverse causality pattern.

Research about the Identification and Gathering of Digital Forensic Evidence by Cyber Intrusion Accident Types (사이버 침해사고 유형별 디지털 포렌식 증거의 식별 및 수집에 관한 연구)

  • Shin, Kyung-Jun;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.93-105
    • /
    • 2007
  • A digital forensic technology and tools are used much in the rapidly increased cyber intrusion accident investigation. But, almost the identification and gathering tools of digital forensic evidence are very difficultly integrated and simply poor-skill. Thereby, Important digital evidences at intrusion accident investigation of public institution and a private enterprise can be omitted or demaged. In this paper, therefore, we refer to 'The digital forensic tool for identification and gathering evidence' based only Window OS by using 'Log Parser', discuss the methodology for the identification and gathering of digital forensic evidence by cyber intrusion accident types.

  • PDF

Improvement of Computer Security Check Program and User Inspection Items In Response To Military Cyber Security Breachment(For Army sector) (국방 사이버 침해 대응을 위한 전산보안점검 프로그램 및 사용자 진단항목 개선 연구(육군 중심))

  • Kim, Jee Won;Jung, Ui Seob;Jung, Chan Gi
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2017
  • Recent cyber attacks on South Korea, including hacking and viruses, are increasing significantly. To deal with the cyber invasion of cyber aggression, the Ministry of National Defense defined the necessary procedures for cyber security with guidelines for cyber security. In spite of, based on the analyses the cyber defense operations published, the number of violations are increasing. To address issues stated above, the safety check items should be reviewed and revised. This paper will revisit current safety check items and provide new guidelines to prevent cyber security breaches, which will provide more safe and efficient cyber environment.