• Title/Summary/Keyword: Information Security Attitude

Search Result 101, Processing Time 0.029 seconds

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

Use form by age-based of Smart phones and Necessity of Security (스마트 폰의 연령별 이용 형태와 보안의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.89-97
    • /
    • 2015
  • The Smart phone is the mobile phone added to mounted equipment miniaturized operating system of PC and wireless phone possible hardware, software modules. This study is examine about Smart phone supply spreading process and characteristic by age. And this study is wish to investigate about age-based features of the media usage attitude via a Smart phone as a reference questionnaire of KISA and KISDI. Smart phone is easy-to-use and excellent portability and mobility like Pocket PC. It is easy to information and data search anytime and anywhere unaffected by time and place. It is to possible a variety of information exchange with several acquaintances and easy to photos and video photography. Wish to improve the life satisfaction with widely using for smart phones at all ages.

Effects of Flipped Classroom Strategy on Students' Achievements in the Computer and Information Technology Course and Their Attitudes Towards It

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.157-164
    • /
    • 2021
  • This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.

A Study of Customer Attitude on Internet Shopping Malls : a Comparison with Singapore Customer (인터넷 쇼핑몰에서의 소비자 태도에 관한 연구 : 싱가포르 소비자와의 비교를 중심으로)

  • Lee, Sang Chul;Lee, Hyung Seok;Kim, Jae Kyung;Suh, Young Ho
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.63-77
    • /
    • 2004
  • The purpose of this research is to identify what factors influence a customer's purchasing intention and to identify if customer's attitudes are different between an Internet shopping mall in Singapore and Korea. To perform a cross-nation analysis between Singapore and Korea, this research reapplied the finding of Liao and Cheung(2001) in a Singapore Internet shopping mall, including transactions security, Internet usage, price, shopping experience, vendor quality, network speed. The empirical results of this research indicate that all hypotheses in our model are significant; therefore, Internet usage, price, vendor quality and network speed influence customer's purchasing intention positively and transactions security and shopping experience negatively. The results of a cross-nation analysis indicate that customer's attitudes in both Singapore and Korea are the same. Therefore, Asia's with similar cultures are the same factors In Internet shopping mall. In Conclusion, with the rapid growth of the Internet market in Asia, many cross-nations researches based on Asia culture must be published. Therefore, this research will be the foundation of these researches.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

A Study on Acceptance of Public Recording for SNS Post (SNS 게시물에 대한 공공기록화 수용에 관한 연구)

  • Yun, Sung-Uk;Chang, Jun-Gab;Kim, Geon
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • This study explored the factors affecting the acceptance of public recording in SNS post. Using SPSS 21.0 program and AMOS 21.0 program, major results were derived through exploratory factor analysis, confirmatory factor analysis, correlation analysis, and path analysis. The results are as follows: First, the risk of personal information leakage on SNS posting has a significant negative impact on the attitude toward SNS posting. Second, the security of the SNS posting has a significant effect on the attitude toward the SNS posting. Third, the concern about privacy of SNS posting has a significant negative impact on the attitude toward SNS posting. Fourth, the attitude toward SNS posting has a significant effect on the intention to accept the SNS posting. The above results suggest that the SNS post recording should be able to collect opinions of SNS users from a long-term viewpoint.

A Study on the Applicability of Anonymous Authentication Schemes for Fine-Grained Privacy Protection (개인정보보호를 위한 익명 인증 기법 도입 방안 연구)

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Shim, Mi-Na;Jeong, Dae-Kyeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.195-208
    • /
    • 2010
  • As information communication technologies have highly advanced, a large amount of user sensitive information can be easily collected and unexpectedly distributed. For user-friendly services, a service provider requires and processes more user information. However known privacy protection models take on a passive attitude toward user information protection and often involve serious weaknesses. In reality, information exposure by unauthorised access and mistakenly disclosure occurs frequently. In this paper, we study on the applicability of anonymous authentication services for fine-grained user privacy protection. We analyze authentication schemes and classify them according to the level of privacy newly defined in this paper. In addition, we identify security requirements that a privacy protection scheme based on anonymous authentication can achieve within legal boundary.

Intellectual Talent Of Higher Education Seekers: Theoretical Principles

  • Aryna Kharkivska;Viktoria Beskorsa;Svitlana Nikulenko;Oksana Onypchenko;Violetta Panchenko;Iryna Tolmachova
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.71-76
    • /
    • 2023
  • In order to achieve this goal, we consider the following issues: a retrospective analysis of the concepts of "giftedness", "intellectually gifted personality"; the experience of working with gifted youth abroad is analyzed; features of work with gifted student youth are revealed; educational and methodological support and practical work with gifted students are analyzed; an empirical study was conducted to determine the attitude of gifted youth to organizational forms of work with them; developed a scientific circle as a form of work with intellectually gifted student youth. A set of methods is used, in particular: theoretical methods: comparison, analysis, synthesis and generalization; empirical methods: analysis of documentation and results of pedagogical activity, observation.