• Title/Summary/Keyword: Information Protection Policy

Search Result 532, Processing Time 0.031 seconds

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

College Students' Cognitive and Behavioral Attitude toward Digital Behavioral Advertising and Personal Information Protection through In-depth Interview (디지털 맞춤형 광고와 개인정보 보호에 대한 대학생들의 인식 및 행동연구)

  • Um, Namhyun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.73-82
    • /
    • 2022
  • As digital advertising industry grows, consumers' concerns over personal information protect also rise. Thus, the current study is designed to explore college students' perspectives on digital behavioral advertising and personal information protection through in-depth interviews. According to study results, importance of personal information protection is highly regarded among college students and interviewees suggest individuals, companies, and government organizations work together to protect personal information. College students' behavioral level of personal information protection can be divided into three levels such as 1) no-action taken, 2) passive response, and 3) active response. The study found that college students' attitude toward digital behavioral advertising is positive and also negative at the same time. Lastly, the study suggests that college students have positive attitude toward companies' personal information collection and use for the marketing purpose such as digital behavioral advertising. At the discussion section this study puts emphasis on the need for digital media literacy education and suggests practical implications for personal information collection and its procedures.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.

A Study on the Protection Methods for Students from Inappropriate Internet Sites (불건전(不健全)한 인터넷 자원(資源)으로부터의 청소년(靑少年) 보호방안(保護方案)에 관한 연구(硏究))

  • Joo, Young-Ju;Kwak, Eun-Soon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.6 no.1
    • /
    • pp.5-20
    • /
    • 1999
  • With the advent of internet, the modern society is enjoying the benefits of the information age. As one of undesirable side effects of utilization of internet, however, it is often mentioned that young students are helplessly exposed to inappropriate and unqualified information. Therefore, in this paper, we will clarify the nature of inappropriate information to the younger generation and will argue for the needs of protecting the youth from inappropriate information. Especially the merits and limits of often motioned five different protective and regulatory measures are presented and analyzed, those are, establishment of acceptable use policy, active utilization of supervisory organization, promotion of Internet rating system, installation of filtering software, and legal and regulatory protection. As a fundamental means of resolving the problems, however, enforcement of systematic information literacy education, promotion of active utilization of sound information, development of search engines for the youth, design of diverse filtering softwares which can be selected by users, and increased attention by parents and teachers are suggested.

  • PDF

A Study on the Activation of the Technology Trade to Changing Trade Environment - Focusing on the Intellectual Property Rights - (통상환경 변화에 따른 기술무역 활성화 방안 - 지식재산권을 중심으로 -)

  • Seo, Gab-Sung;Kim, Jong-Sung
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.165-188
    • /
    • 2008
  • Some developed countries have already long been adapted to these changes in the international economic environment would improve productivity rather than traditional technology based on more high value-added business and increased investment. IPR protection is not just a national interest in the creation and growth of dimensions beyond the country's national competitiveness and a driving force to decide whether to challenge the core of the matter. Therefore, the importance of IPR in the country to raise awareness of IPR protection, and for systematic and comprehensive policy that will continue to be prepared.

  • PDF