• Title/Summary/Keyword: Information Security Budget

Search Result 122, Processing Time 0.028 seconds

Study on the NCO Acquisition Pragram of Human Strength (부사관 모집제도 연구)

  • Jung, Jae Keak
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.3-9
    • /
    • 2014
  • NCOs of the amy-navy-air force are the foundation in maintaining, developing and leading the army making manpower aquisition very important. Currently, the operation or the recruitment business is being overlapped by each training institutions leading to uneffectively decreasing the curiosities of the applicants regarding their future. Even though the NCO selection policy is strong in the aspect of retaining uniqueness, use of acquired specialist, and statute revision, it is showing insufficiency in publicizing, selection effectiveness, promotion of peoples' conveniency, and budget reduction. Therefore, if the unification regarding the recruitment of each military sectors are run by the MMA(Military Manpower Administration), which is the institute that is fully responsible for the recruitment duty, it can acquire excellent man power while decreasing effort and resources, provide accurate information to the NCO applicants on time, and provide improved services through the convenient facilities and systems.

Establishing and Designing the Financial System for the Research Program of the Deanship of Scientific Research at Northern Border University

  • Hamad, Sofian;Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.35-40
    • /
    • 2021
  • The study aimed to realize one of the basic requirements for designing and building the integrated automated system for scientific research at Northern Border University, which includes the establishment of an automated interconnected system to manage all academic and financial operations of scientific research. From receiving the budget of the funded research courses, then the regular financial regulation of all the research team's rewards, the cost of publishing, translation and equipment, then receiving the research plans and linking them financially, preparing the total and detailed financial value for all stages, then financial disbursement operations, financial closure of research when published, and preparing financial reports The research team used the analytical approach to build the main and subsidiary requirements for designing the financial system, and the study concluded that all the elements required for the stages of financial management for scientific research at Northern Border University can be met based on sufficient by sequencing these processes and how they are sequenced as e It is designed in the research study.

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

The Korea's indiscretion in maritime-terrorism and the counter plan (한국 해양테러의 실태 및 대응방안)

  • Park, Jun-seok;Park, Yu-Deuk;Kim, Gi-sang
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.79-93
    • /
    • 2007
  • With international urgence of terror situation, many methods of terror techniques and skills are appearing and more intense and threatening terror is braking out not only in the air(plane), but also in the sea(ship). Korea is surrounded by 3 sides of sea and is a proud maritime nation that should advance to foreign country through the sea because South Korea and North Korea are confronting. Korea depend on the maritime transportation, 99.7% of exporting, importing material resources. Therefore, acquisition of the marine safety has the great affect on national security and economical life. On the high tension of situation about threat and possibility of maritime terroism, the potential ways of the improvement policy for counter-tactics against big maritime terror are the following. First, we should construct clear and well-organized network for accurate information about maritime terrorism Second, we should have the information of all domestic, foreign passenger's ships Third, national important facilities such as atomic energy plant, thermo-electric power plant, shipyard need policies to manage all emergency situation Fourth, government authorities should improve tactic abilitities by competing with support and budget inside of nation as well as outside of nation. To develop big maritime terror of our country, we will have to hold cooperative training & tactics contest of big maritime terror by cooperating educational industry organization with similar institute, improve the ability of members of big terror and acquire tactics information by excavating and exchanging a new technique through tactics seminar and public hearing.

  • PDF

Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts (신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계)

  • Lee, Hae-Dong;Ha, Hyeon-Tae;Baek, Hyun-Chul;Kim, Chang-Gun;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2649-2656
    • /
    • 2012
  • Today, many enterprises have invested heavily for the part of information security in order to protect the internal critical information assets and the business agility. However, there is a big problem that big budget and too many manpower are needed to set the internal corporate network up to the same high level of defense for all of part. On the distributed enterprise networks in this paper, a defense model for effective and rapid response on the IP spoofing attack was designed to protect the enterprise network through the exchange of information between the trust hosts when an attacker attacked any target system using other trusted host.

Research on John School as a policy to prevent recidivism of online sex trafficking

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.143-149
    • /
    • 2018
  • Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.

Contents application airport security equipment·facility for terror prevention (테러방지를 위한 콘텐츠 응용 공항보안 장비·시설)

  • Kang, maeng-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.228-235
    • /
    • 2008
  • Terror for airplane, airport and passengers of the problems is being threat over the world. and since 9.11 terror of 2001 year, many countries have endeavored to prevent terror and have manipulate airport security part as important field. Especially, The U.S.A made Transportation security Administration in Homeland security adminstration and strongly execute for policies related anti-terror. many countries over the world enforce airport and airplane security facilities with science-technology contents. and with security exploitation for the passengers and freight security inspection level enforcement, many countries also make effort to interupt aviation terror threat. In this process, in the center of developed countries that need science-technology contents adaption, much budget and personals are invested and exploited a security inspection instrument and complimented of many facilities As a result, according to the development of science-technology, prevention of Terror have much developed. The contents using intelligence-communication technology inevitably needed on the goal of terror prevention and safty. From simple monitoring for the people who come in and out airport to boarding process and inspection for the freight, security inspection process for the passengers, bio information input, confirmation, of the level that there is no cases of adaption of contents, The reality have generalized of using contents. The study is going to research contents application situation.

  • PDF

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on cost damage of Cyber Attacks and their Impact on Stock Market (사이버공격으로 인한 기업의 피해 비용과 주식시장에 미치는 영향)

  • Oh Il-Seok;Lee Seok-Yun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.63-68
    • /
    • 2006
  • Cyber Attacks have increased damages constantly in all over the world for several years. A survey said the cost caused by Cyber Attacks had increased 225 times from 1996 to 2003. It is very difficult to calculate the cost by the Attacks exactly but the calculating the cost of cyber attacks would be great helpful for a company to decide how much budget to spend to Information Security. In this research we could reach the conclusion : the cyber attacks has decreased the stock price of the companies, especially pure internet companies. But the stock market has not greatly impacted by the types of Cyber Attacks. Korean stock market also impacted by the Internet Destruction Accident happened Jan. 25. 2003. On the basis of this study we will recommend a policy or a regulation which force board of directors and officers of a company to have information security liability.

Study of Information System Model in University (대학 정보시스템 모델연구)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • This paper is presented a model of management and application of PC, one of the most important computer resources and software and a model for optimal speed of network to organize information budget of University. I propose strategies to promote utilization degree of existing PCs, problems and strategies to maintain PC, effective strategies to expand PC and change into new models, and strategies to utilize effectively and purchase softwares. Also, I propose an optimal model for network environment and management, which is core to establish master plan of information system. Network is divided into internal and external network and formula model is proposed to calculate optimal speed of these. And strategy is proposed to maintain security of University preserving its characteristics.

  • PDF