• Title/Summary/Keyword: Cyber Capability

Search Result 81, Processing Time 0.023 seconds

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

The effects of the organizational characteristics and interorganizational network level on social welfare organizations' effectiveness -Focused on resource capability of women's welfare organization- (사회복지조직의 특성과 네트워크 수준이 조직효과성에 미치는 영향 -여성복지조직의 자원확보능력을 중심으로-)

  • Jang, Yeon Jin
    • Korean Journal of Social Welfare Studies
    • /
    • v.44 no.3
    • /
    • pp.147-175
    • /
    • 2013
  • The purpose of this study is to examine the effects of the organizational characteristics and interorganizational network level on social welfare organizationas' effectiveness using structural equation model. For achieving this purpose, this study defined organizational effectiveness as financial, human and physical resource capability according to resource systems approach. Organizational characteristics variables included the number of qualified staff, degree of resource dependency, the proportion of government subsidies, the main organizational philosophy, establishment year, the attitude of top manager and the number of informal ties. Interorganizational network variables were divided by outdegree centrality and indegree centrality. The data collected from women's welfare organizations in Seoul through survey method. The analysis tools used the UCINET 6.245 for the network analysis and AMOS 18.0 for the structural equation model. The results of this study are as follows. The factors affected on the financial resource capacity were the number of qualified staff, the proportion of government subsides and the indegree centrality. Meanwhile, only indegree centrality directly influenced on the human resource capability. The significant affecting factors on physical resource capacity were the number of qualified staff, the attitude of top manager and informal ties. Based on these results, the implications of this study and the ways to enhance social welfare organization's effectiveness were discussed.

A Study on the Perception of Elementary School Students and their Parents on Internet Ethics(Focusing on the Influences of the Parents on the Internet Usage of their Children) (초등학생과 학부모의 인터넷 윤리의식에 관한 연구 (부모가 자녀의 인터넷 이용에 미치는 영향을 중심으로))

  • Kang, Sung-Hee
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.2
    • /
    • pp.213-222
    • /
    • 2008
  • The information society based on Internet has positive effects to provide us with abundance and comfort as well as enhancement of quality of life. But it also has negative effects which bring about more serious social problems than real life. These negative effects of the cyber space are especially critical to elementary school students who do not have good judgment capability and clear concept on cyber space. To solve these problems, we have to let them have ethical sense to respond to the dysfunctions of Internet. We need to enforce Internet ethics education at home and in school so that they can behave as responsible and moral behaviors in this information society. Because the most of the elementary school students usually use Internet at home, the role of their parents can be particularly important factor in Internet ethics education. The purpose of this paper was to identify the current status of the consciousness on Internet ethics of the elementary school students who are the creators of new culture on Internet and their parents who make great influence on their education, and to study what influence the consciousness on the Internet ethics of parents has made on the Internet usage of their children. Through this study, we try to provide the desirable direction for Internet ethics of elementary school students.

  • PDF

A Study on the Implementation of Law Information Retrieval System (법령 정보검색 시스템 구현에 관한 연구)

  • Min, Jae-Hong;Cho, Pyung-Dong;Yang, Jin-Hyuk;Park, Pyung-Koo;Chung, In-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3702-3713
    • /
    • 2000
  • Telecommunications standards have two different types of regulations: one is a law. enacted by government which all telecommunications related industries must observe. The other is a recommendatory standards. formulated by either government agency or some standardization organizations. Observation of these standards is not obligatory. However, technical standards are strict laws and ordinances based on common judgement and various conditions for evaluation of levels and limits. This paper deals with enhancing productivity of enactment and revision of technical standards. Through database of above related information we secure information continuity and public property of cyber space for the public. In this paper. we also classify recent data within the website in and out of the country offering four different methods of information retrieval and management system. The four retrieval methods suggested in this paper are itemized keyword retrieval. hierarchical retrieval, regulatory keyword retrieval and chronological keyword retrieval. These various retrieval methods provide the public with information of enactment and amendment of laws and regulations in the cyber space. thereby guarantees the sharing of information. Finally the important feature of the information retrieval system implemented in this paper is the online updating capability of law and regulations through the internet.

  • PDF

The Effect of Business and Digital Capabilities of Small Businesses on Business Satisfaction : The Moderating Effect of Personal Media Education Performance (소상공인의 사업역량과 디지털역량이 사업만족도에 미치는 영향 : 1인 미디어 교육성과의 조절효과)

  • Park, Jung-ok;Ha, Kyu-soo
    • Journal of Venture Innovation
    • /
    • v.5 no.4
    • /
    • pp.75-90
    • /
    • 2022
  • This study was conducted to empirically analyze the relationship between business and digital capabilities of small businesses on business satisfaction. To this end, business capabilities were subdivided into industry expertise and customer management expertise. Digital capabilities were subdivided into SNS activity, ease of ICT usability, and business utilization of ICT. At the same time, we examined how the moderating effect of performance of personal media education. A survey was conducted to empirically analyze this, and 200 sample who received personal media education were analyzed. SPSS 24.0 and Macro Process 4.0 were used for statistical analysis. As a result of the empirical analysis of this study, industry expertise, customer management expertise, SNS activity, and business utilization of ICT, all had a positive (+) significant effect on business satisfaction. On the other hand, the significant influence relationship on the ease of ICT usability was not tested. Industry expertise and business utilization of ICT were found to be variables that had a great influence. It was analyzed that personal media education performance plays a moderating role between SNS activity, business utilization of ICT and business satisfaction. The results of this study are meaningful in that they empirically analyze that these capabilities affect business satisfaction even for small businesses at a time when the importance of digital capabilities increases.

A Study on the Current Status and Development Plan of Private Security Industry (현행 민간경비업 관련법상의 문제점과 입법론적 고찰)

  • Kwon, Sang-Ro
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.317-321
    • /
    • 2006
  • Endless criminal act has serious effect on safety of the nation and lives of the citizens and it is causing major disorder in ruling of the nation and the society. Also internet generalization in public put country's information foundation on the latest trend on the other hand, due to lack of security concept, cyber crime is on the rise such as hacking and viruses. But with various crime occurrence and increased desire for safety of citizens, there is limit to provide high quality public security service with just police force and equipments. To solve the problems, advanced crime prevention system, not on the nation's level but on the private level was activated private security business some time ago. And now it has its firm place as a corresponding existence with crime prevention capability of police force. Still private security industry of Korea has relatively many weak points when compared with advanced countries and it should be backed up with improvement of the law and the system.

  • PDF

The Strategies for Cyber Shopping Mall Business: A Comparative Case Study (사업 기반에 따른 인터넷 종합쇼핑몰 고객전략에 관한 연구)

  • 조남재;정연준;박상혁
    • Journal of Information Technology Application
    • /
    • v.3 no.2
    • /
    • pp.83-102
    • /
    • 2001
  • Internet-based shopping business spread rapidly in Korea. Companies are trying to develop and use various strategic competences. The strategies employed by those companies include activities related to the design of shopping site, market positioning, assistance of purchasing process, payment mechanism, and provision of various consumer services. However, the success of these strategies depends on various environmental factors and internal capability of the companies. In this study, I examined four successful Internet shopping mall companies and compared them to draw useful guidelines for Internet-based intermediary business. These four companies were selected because they are all considered successful by now, but brought different background. We found follows. First, each company tried to economize their own historical and developmental background. All of the selected companies were alike in their focus on the whole Internet user group. Customer needs analysis was performed more systematically. The Importance of customer information and the use of it are not sufficient. Second, Each companies consistently emphasized the importance of market-related activities. Despite the differences in initial states, all companies used similar strategies and had similar focus in target market and products. Conclusively, implications from this research for Internet shopping business can be summarized as follows. First, One of the important future directions for Internet shopping mall business is to broaden target market. Second, the provisions of carefully designed customized services are one success factor. Third, As customer traffic increased, the provision of differential customer service becomes a key success factor.

  • PDF

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.