• 제목/요약/키워드: Information Security Business Model

검색결과 350건 처리시간 0.028초

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

금융회사의 고객정보보호에 대한 내부직원의 태도 연구 (The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea)

  • 정우진;신유형;이상용
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Exploratory Autopsy on Digital Payment Models

  • Wang, Tao;Kim, Chang-Su;Kim, Ki-Su
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.646-651
    • /
    • 2007
  • Secure digital payment is critical in the successful shaping of global digital business. Digital payments are increasingly being used as a substitute to traditional payments, contributing markedly to the efficiency of the economy. The focus of every digital business transaction is to minimize risks arising from transactions. It is essential to ensure the security of digital payment whether used in internal networks or over wireless Internet. This paper analyses secure digital payment methods from the viewpoint of systemic security and transaction security. According to comparative analysis of digital payment models, this paper proposes a comparative analysis framework to investigate and evaluate secure digital payment. In conclusion, the comparative analysis framework, comparison of digital payment models and mobile payment models proposes a useful academic and practical foundation to enhance the understanding of secure digital payment methods. It also provides academic background and practical guidelines for the development of secure digital payment systems.

  • PDF

Adopting e-Government Services in Less Developed Countries According to the Characteristics of Business Intelligence: (Sudan as a model)

  • Adrees, Mohmmed S.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.204-212
    • /
    • 2022
  • In this paper, a contribution is presented covering the data set in improving and developing electronic services provided to citizens through e-government services based on business intelligence in government agencies in the Republic of Sudan. The Business Intelligence Concept Survey was conducted from the perceptions of information department employees in government agencies. The survey was conducted from April to June 2021 using questionnaires. The dataset contains responses about the factors that influence the use of business intelligence and the barriers and limitations to the use of business intelligence. A five-point Likert scale was used to analyze the quantitative data. The opportunities and challenges associated with it were also discussed and explored. As evidenced by the results, the information department employees agree that business intelligence improves the government decision-making process, which helps decision makers and decision-makers to find alternatives and opportunities that contribute to making more accurate and timely decisions. The results also indicate that creating the infrastructure for applying business intelligence in the e-government work model contributes to the successful implementation of business intelligence in Sudan.

안전한 전자상거래를 위한 XML 키 정보 서비스 모델링 (XML Key Information Service Modeling for Secure Electronic Commerce)

  • 박남제;문기영;송유진
    • 한국전자거래학회지
    • /
    • 제8권3호
    • /
    • pp.241-257
    • /
    • 2003
  • XML(eXtensible Markup Language)은 인터넷과 e-비즈니스를 위한 글로벌 표준으로서 전자상거래의 보급 속도에 따라 XML의 활용도가증가하고 있다. 이러한 환경에서 전자상거래시에 교환되는 전자문서의 보다 안전한 보안서비스를 제공하기 위한 방안이 필요하다. XML정보보호기술 중 XML키 관리 규격(XKMS)은 다양하고 복잡한 기능의 전자상거래 애플리케이션에서 전자문서의 서명을 검증하거나 암호화하는 공개키를 관리하는 프로토콜을 정의한다. 본 논문에서는 XML 기반 보안서비스 특성에 착안하여 안전한 전자상거래를 위한 XML키 정보서비스(X-KISS)에 대한 분석과 표준안에 근거한 서비스 참조 모델을 제시하고, 기반 되는 서비스 컴포넌트를 구현하여 서비스 모델링을 수행하였다. 본 논문에서 제시된 참조 모델은 식별정보가 주어졌을 때, 필요로 하는 공개키 위치와 식별자 정보, 공개키 연결 기능을 제공한다. 구현한 클라이언트 서비스 컴포넌트의 요청 및 검색 쓰레드의 비율을 제한하여 실시간 키 검색에 대한 컴포넌트의 최소 성능을 분석하였다. 본 논문의 서비스 모델링은 향후 국내 e-비즈니스 프레임워크 구성 시 표준적 인 보안 모델을 구현할 수 있는 지침을 제공할 것이다.

  • PDF

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.

AHP 기법을 이용한 보안환경을 고려한 COTS 기반 정보시스템의 보안기능 컴포넌트 대체 수준 의사결정 (Decision on Replacing Components of Security Functions in COTS Based Information Systems in Security Environment Utilizing ARP)

  • 최명길;황원주;김명수
    • 한국산학기술학회논문지
    • /
    • 제10권3호
    • /
    • pp.579-588
    • /
    • 2009
  • 기업과 정부기관은 COTS를 사용한 정보시스템을 개발하고 있다. 특히, COTS는 정보보호시스템과 정보시스템의 컴포넌트로 활용되고 있다. 본 연구는 보안기능 개발을 위해서 필요한 COTS의 선택 수준과 비용을 고려할 때 COTS 컴포넌트의 우선순위를 제시한다. 보안기능 컴포넌트 선택과 관련된 비용 효과적인 의사결정을 위하여, 본 연구는 정보보호기술을 계층화하고, 다기준의사결정 기법을 사용하여 COTS 컴포넌트의 우선순위를 제시한다.

Care Cost Prediction Model for Orphanage Organizations in Saudi Arabia

  • Alhazmi, Huda N;Alghamdi, Alshymaa;Alajlani, Fatimah;Abuayied, Samah;Aldosari, Fahd M
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.84-92
    • /
    • 2021
  • Care services are a significant asset in human life. Care in its overall nature focuses on human needs and covers several aspects such as health care, homes, personal care, and education. In fact, care deals with many dimensions: physical, psychological, and social interconnections. Very little information is available on estimating the cost of care services that provided to orphans and abandoned children. Prediction of the cost of the care system delivered by governmental or non-governmental organizations to support orphans and abandoned children is increasingly needed. The purpose of this study is to analyze the care cost for orphanage organizations in Saudi Arabia to forecast the cost as well as explore the most influence factor on the cost. By using business analytic process that applied statistical and machine learning techniques, we proposed a model includes simple linear regression, Naive Bayes classifier, and Random Forest algorithms. The finding of our predictive model shows that Naive Bayes has addressed the highest accuracy equals to 87% in predicting the total care cost. Our model offers predictive approach in the perspective of business analytics.

항공기반시설의 정보보호를 위한 보안관리체계 모델에 관한 연구 (A Study on the Security Management System Model for the Information Security of the Aviation infrastructure)

  • 정창화;이준택;정동근
    • 한국전자거래학회지
    • /
    • 제16권4호
    • /
    • pp.87-96
    • /
    • 2011
  • 항공기반시설(공항, 기상 서비스, 항로 항행시설, 항공교육시설)에 대한 관리적, 물리적 그리고 인적측면과 기술지원 환경 및 인프라측면에서 발생하는 보안사고의 대응을 위한 보안관리체계는 수립단계에서부터 착수하여 분석이 진행됨에 따라 세부적인 평가가 수행되어야 하며, 시설변경이 발생하는 경우, 변경된 시설에 대한 재평가가 실시되어야 한다. 또한 항공기 운용과정에서 발생 가능한 각종 사고에 대한 사전 예방 및 정비를 위해서도 체계적인 보안성 평가가 필수적이다. 보안수준 평가에는 계획(Plan), 활동(Do), 그리고 평가(Check), 조치(Action)업무로 이어지는 생명주기(Life Cycle) 구조가 지속적으로 개선되는 순환적 프레임워크 구조를 가져야 하며, 과거의 사용 또는 경험에 따라 세분화된 보안성 평가 요구조건을 구분하여 적용하여야한다. 특히, 항공기반시설에 대한 보안성 입증과 안전한 운항을 보장하기 위해서는 실시간 지원체계와 국가적 차원의 관리가 필요한데, 이는 공공의 안전을 확보하기 위한 것으로서, 민간항공업체는 해당 법규, 표준서 및 지침 등에 따라 최소한의 보안성을 입증하여야 한다. 따라서 본 논문에서는 항공기반시설에 대한 보안사고 대응을 위한 보안관리체계를 위해 설정된 보안의 목표를 충족하고 있는지를 확인 평가하고, 분석 등을 고려하여 종합적인 보안성 평가기법을 적용할 수 있도록 하는 하늘차형 보안관리체계 프레임워크 기반 모델에 대해 제시하고자 한다.

BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법 (A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base)

  • 노시춘
    • 융합보안논문지
    • /
    • 제13권3호
    • /
    • pp.71-77
    • /
    • 2013
  • 우리나라는 보안산업 현장에 적용할 적합한 비즈모델 분석 방법론을 발견하기 어렵고 단편적 이론은 존재하지만 종합적 분석 방법론은 희소한 실정이다. 정보보안 기업 비즈모델 분석은 외부요인과 내부요인에 관해 수집된 정보를 통합하고 포괄적으로 분석하는 정보시스템 개발이 요구된다. 비즈모델 분석을 위한 정보시스템의 소프트웨어 아키텍처는 시스템 설계의 초기 결정사항으로서 초기 결정은 설계, 개발, 테스트, 유지보수에 지속적인 영향을 미친다. 정보보안 비즈모델 분석시 BMO에 기반한 소프트웨어 아키텍쳐는 정보시스템의 목적이나 사명 수행을 지원 한다. 정보보안 비즈모델 분석을 위한 정보시스템은 여러 이해관계자들이 사명과 환경을 결정하며 그 결과가 아키텍처 기술서로 문서화 되어야 활용될 수 있다. 아키텍처 기술서는 소프트웨어 아키텍처를 결정한 근거를 제시하기 때문이다.