• Title/Summary/Keyword: Enterprise security

Search Result 378, Processing Time 0.027 seconds

Investigation into the Factors Affecting the Voluntary Information Security Compliance Behavior: Compliance Behavioral Belief, Compliance Knowledge, and Compliance Relevance to Job (자발적인 정보보안 컴플라이언스에 영향을 미치는 요인에 관한 연구: 준법에 대한 신념, 준법 관련 지식, 그리고 업무의 준법 연관성을 중심으로)

  • Kim, Sang Soo;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.127-149
    • /
    • 2016
  • Based on a comprehensive literature review on Theory of Planned Behavior and Social Cognitive Theory, this study proposes and empirically examines a structural model consisting of factors affecting voluntary information security compliance behavior. To test the proposed research model, the study analyzes survey results from employees of a major Korean energy company, which employs an enterprise compliance support system. Results indicate three factors: compliance behavioral belief and compliance knowledge affect compliance behavior; compliance knowledge works as a mediator in the relationship between compliance behavioral belief and compliance behavior; and the more relevant the compliance is to an employee's job, the more the employee prioritizes compliance knowledge. This study suggests methods for encouraging employees to embrace voluntary, positive information security compliance standards. By doing so, this article aims to promote a more effective corporate compliance system for information security and enhance sustainable management practices.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

Process Model for 6 Sigma(${\sigma}$) in Construction Management(CM) (건설사업관리(CM)에서의 6시그마(${\sigma}$) 적용 조건 분석을 통한 추진 모델 구축)

  • Kim, Chan-Gyo;Lee, Jea-Sauk;Chun, Jae-Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.478-482
    • /
    • 2006
  • The domestic enterprises in order to secure the freshness location of market from the international competition which is keen are propelling a price and a quality high position strategy steadily. It is put in competitive situation with the overseas enterprises and even from construction industry it follows in construction market opening and there is not another idea to the research the management strategies, directions and focus competitive elements of the enterprise against, what it sees consequently and to rise to the priority where the competitive power reinforcement of the enterprise is important, it becomes. Competitive power of like this enterprise for a reinforcement the technique which induces a big interest 6 Sigma is technique from the many companies. 6 sigma preceding researches of manufacturing and service industry the fact that it is accomplished with the object which will carry most. The research which relates with construction industry is staying to an introduction of 6 sigma the investigation phase, the actual introduction introduces and "S" construction there is not only a possibility against the application result of having a limit because it is applying. It is like that but like referring to a minute description for the international competitive power security which it follows in the change which market environment is sudden 6 sigma the introduction will judge, indispensability development of the logical propriety against hereupon and it will reach and it verifies the question investigation for to lead, 6 sigma of the construction companies it confirms the application possibility and presents the propulsion model as 6 sigma the fact that overcoming the limit characteristic of that introduction application as objective of sample research means it will do.

  • PDF

A Study on the Third Party Logistics Service Enforcement of Inland Container Depot at Busan area (부산지역 ICD의 TPL(Third Party Logistics) 서비스의 기능 강화에 관한 연구)

  • Choi, Young-Bong;Lee, Chun-Su
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.3
    • /
    • pp.165-182
    • /
    • 2009
  • The purpose of this paper is to study on the third party logistics service enforcement of inland container depot at Pusan area. The main results of this paper are as follows: First, the inland container depot related to location selecting factor researches analyzed and korean TPL market reviewed. Second, the TPL service function reinforcement method and investments are mentioned. In detail the 9 factors are as follows: competitive high position and improvements of harbor back complex, ICD goods enterprise investment strategies, the harbor back which is inexpensive only the rent, taxes benefit and incentive, site security and base facility expansion, the goods service provision which is flexible, connection plan construction of goods enterprise, the incentive strategic establishment which is discriminated, the marketing activity which is long-term. and lastly the ICD and TPL Policy are needed that government and logistic enterprise's cooperation gains competitive advantage.

  • PDF

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

A Study of The Secure Mobile Healthcare System for Medical Grid Devices (메디컬 그리드 장치를 위한 안전한 모바일 헬스케어 시스템에 관한 연구)

  • Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.89-95
    • /
    • 2008
  • The introduction of wireless information technology gives rise to new mobile services in all kinds of areas of out daily life. Mobile healthcare system is a production of composite ICT (Information and Communication Technology) which focused on signal sensing, processing, and communication in wireless environment. The mobile and wireless revolution promises not only expanded access to patient health information, but also improved patient care. In this paper, we describe a surrogate host based mobile healthcare information system which utilized Grid computing for real-time ECG signal processing. The surrogate host provides seamless interface between mobile device and Medical Grid portal. The security extension of GSI (Grid Security Infrastructure) allows mobile users to access Grid portal in a secure and convenient manner. The presented system architecture can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

A Process Algebra for Modeling Secure Movements of Distributed Mobile Processes (분산 이동 프로세스 이동의 안전성 모델링을 위한 프로세스 대수)

  • Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.314-326
    • /
    • 2016
  • Some process algebras were applied to enterprise business modelling for formal specification and verification. ${\pi}$-calculus and mobile ambient can be considered for the distributed and mobile, especially to represent the movements of distributed real-time business processes. However there are some limitations to model the movements: 1) ${\pi}$-calculus passes the name of port for indirect movements, and 2) mobile ambient uses ambient to synchronize asynchronous movements forcefully. As a solution to the limitations, this paper presents a new process algebra, called ${\delta}$-calculus, to specify direct and synchronous movements of business processes over geo-temporal space. Any violation of safety or security of the systems caused by the movements can be indicated by the properties of the movements: synchrony, priority and deadline. A tool, called SAVE, was developed on ADOxx metamodelling platform to demonstrate the concept.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.