• Title/Summary/Keyword: Compliance Management

Search Result 704, Processing Time 0.024 seconds

An Effect of Organizational Security Climate on Individual's Opportunistic Security Behavior: An Empirical Study (조직의 보안 분위기가 개인의 기회주의 행동에 미치는 영향에 관한 실증 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.31-46
    • /
    • 2012
  • Drawing upon Griffin and Neal's safety climate and performance model, this study developed an information security climate model. Research model is composed of three research variables that include information security climate, information security compliance attitude, and opportunistic security behavior. Results of the study strongly support the fundamental proposition that the organizational security climate has significant positive influence on the individual's opportunistic security behavior. However, the study also reveals that the organizational climate may not directly associate with the reduction of opportunistic security behavior. Rather the organizational security climate nurtures the favorable attitude of the employee towards the compliance of information security, which in turn discourages opportunistic security behavior.

A Study on the Effect of Turnover Intention by Psychological Commitments in Mandatory Environments : Focused on the Accounting Information Systems' Users (비자발적 환경하에서 사용자의 심리적 몰입이 이직의도에 미치는 영향에 관한 연구 : 회계정보시스템 사용자를 중심으로)

  • Chang, Won-Kyung;Kim, Tae-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.1
    • /
    • pp.179-202
    • /
    • 2007
  • This paper presents and tests a conceptual model of Technology Acceptance Model (TAM) that explains perceived usefulness, perceived ease of use, organizational commitment and turnover intention in terms of psychological commitments in mandatory environments. The model focuses on the psychological commitments (Kelman's internalization, Identification, compliance) as the primary predictors of perceived usefulness, perceived ease of use and organizational commitment. We discuss our current understanding of technology acceptance as well as the notion of mandated use. The results are as fellows that organizational commitment is negatively related to turnover intention : perceived usefulness is positively related to organizational commitment : psychological commitments are positively related to organizational commitment, perceived usefulness and perceived ease of use : perceived ease of use is positively related to perceived usefulness in mandatory environments. Through this research, psychological commitments are the strong determinants of technology acceptance in mandatory environments. These findings advance theory and contribution to the foundation for future research aimed at Improving our understanding of user adoption behavior in mandatory environments.

  • PDF

Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection (계층분석기법을 활용한 전장관리정보체계 소프트웨어 시큐어 코딩룰 선정 평가 방안)

  • Choi, June-Sung;Kim, Woo-Je;Park, Won-Hyung;Kook, Kwang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.651-662
    • /
    • 2013
  • In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.

Compliance and Implications for Public Officials in Charge of Personal Information Protection by Policy Trends (개인정보보호 정책 동향에 따른 공공기관 담당자를 위한 업무 수행 준수사항 및 시사점)

  • Ju, Gwang-il;Choi, Seon-Hui;Park, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.461-467
    • /
    • 2017
  • Privacy laws are widely enforced throughout the general public and private sector, and the Ministry of Government Administration and Home Affairs is stepping up its annual level of protection and management levels annually. However, in actual field, it has limits to follow the laws that are amended to comply with the privacy laws of the public sector. Therefore, this study should examine the trends of privacy protection and examine items that require adherence to privacy practices in public institutions. In addition, it is hoped to draw implications for the problems arising from the task itself, as well as providing implications for the issues that are closely related to the public in the privacy of the privacy policies.

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

Development of a Fully-Coupled, All States, All Hazards Level 2 PSA at Leibstadt Nuclear Power Plant

  • Zvoncek, Pavol;Nusbaumer, Olivier;Torri, Alfred
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.426-433
    • /
    • 2017
  • This paper describes the development process, the innovative techniques used and insights gained from the latest integrated, full scope, multistate Level 2 PSA analysis conducted at the Leibstadt Nuclear Power Plant (KKL), Switzerland. KKL is a modern single-unit General Electric Boiling Water Reactor (BWR/6) with Mark III Containment, and a power output of $3600MW_{th}/1200MW_e$, the highest among the five operating reactors in Switzerland. A Level 2 Probabilistic Safety Assessment (PSA) analyses accident phenomena in nuclear power plants, identifies ways in which radioactive releases from plants can occur and estimates release pathways, magnitude and frequency. This paper attempts to give an overview of the advanced modeling techniques that have been developed and implemented for the recent KKL Level 2 PSA update, with the aim of systematizing the analysis and modeling processes, as well as complying with the relatively prescriptive Swiss requirements for PSA. The analysis provides significant insights into the absolute and relative importances of risk contributors and accident prevention and mitigation measures. Thanks to several newly developed techniques and an integrated approach, the KKL Level 2 PSA report exhibits a high degree of reviewability and maintainability, and transparently highlights the most important risk contributors to Large Early Release Frequency (LERF) with respect to initiating events, components, operator actions or seismic component failure probabilities (fragilities).

Development of High-level Method for Representing Explicit Verb Phrases of Building Code Sentences for the Automated Building Permit System of Korea (서술부의 함수체계화를 통한 인허가관련 건축법규의 자동검토 응용방안)

  • Park, Seokyung;Lee, Jin-Kook;Kim, Inhan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.3
    • /
    • pp.313-324
    • /
    • 2016
  • As building information modeling (BIM) is expanding its influence in various fields of architecture, engineering, construction and facility management (AEC-FM) industry, BIM-based automated code compliance checking has become possible prospects. For the automated code compliance checking, requirements in building code need to be processed into explicit representation that enables automated reasoning. This paper aims to develop high-level methods that translate verb phrases into explicit representation. The high-level methods represent conditions, properties, and related actions of the building objects and clarify the core content of the constraints. The authors analyze building permit requirements in Korea Building Code and establish a standardized process of deriving the high-level methods. As a result, 60 kinds of the high-level methods were derived. In addition, method classification, analysis, and application are introduced. This study will contribute to the representation of explicit building code sentences and establishment of the automated building permit system of Korea.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Endemic Corruption in Supply Chain and Procurement in the Local Sphere of Government in South Africa

  • Odeku, Kola O.
    • Journal of Distribution Science
    • /
    • v.16 no.9
    • /
    • pp.43-52
    • /
    • 2018
  • Purpose - This article accentuates that there is pervasive corruption in the supply chain and procurement of goods and services in the South African public sector, particularly in the local sphere of government. Consequently, the poor and the indigents who are supposed to receive quality services are affected. Therefore, the article emphasizes the need to strengthen compliance in the supply chain and procurement processes in order to combat corruption. Research design, data, and methodology - This article extensively utilized qualitative literature review approach to address and solve the problem of endemic corruption in the supply chain and procurement being perpetrated by local government officials. Results - The synthesis shows that by strengthening compliance of supply chain and procurement strategies, measures and frameworks, the likelihood of corruption will be drastically reduced if not totally eradicated. It demonstrates that the poor and the indigents who are supposed to receive quality services are being denied due to corruption. It also shows that failure to comply should result to enforcement of punitive sanctions against perpetrators. Conclusions - This study indicates that effective and efficient implementation of supply chain and procurement strategies, measures and frameworks are panacea for curbing corruption in South Africa public sector especially at the local sphere of government.

Fraud Scenario Prevalent in the Banking Sector: Experience of a Developing Country

  • Bhasin, Madan Lal
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.4 no.4
    • /
    • pp.8-20
    • /
    • 2016
  • Banks are the engines that drive the operations in financial sector, money markets and growth of economy. With growing banking industry in India, frauds in Banks are increasing and fraudsters are becoming more sophisticated and ingenious. Shockingly, banking industry in India dubs rising fraud as "an inevitable cost of doing business." As part of study, a questionnaire-based survey was conducted in 2012-13 among 345 Bank employees "to know their perception towards bank frauds and evaluate factors that influence the degree of their compliance level." The study reveals, "there are poor employment practices and lack of effective employee training; usually over-burdened staff, weak internal control systems, and low compliance levels on the part of Bank Managers, Offices and Clerks. Although banks cannot be 100% secure against unknown threats, a certain level of preparedness can go a long way in countering fraud risk. Internal audit professionals should play an integral role in organization's fraud-fighting efforts. Some other promising steps are: educate customers about fraud prevention, make application of laws more stringent, leverage the power of data analysis technologies, follow fraud mitigation best practices, and employ multipoint scrutiny.