• Title/Summary/Keyword: Information Security Culture

Search Result 236, Processing Time 0.029 seconds

A Study on the Information Security Related Organizational Citizenship Behavior: From Prospect Theory and Goal Orientation Theory Perspective (정보보안 관련 조직시민행동에 대한 연구: 개인 전망, 조직 목표지향성 관점을 중심으로)

  • Hwang, In-ho;Hu, Sung-ho
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.89-97
    • /
    • 2021
  • The purpose of this study is to verify the influence of the cognitive process related to the organizational citizenship behavior. The research method consisted of the cross-design of the prospect dimension and goal orientation dimension, and information security factors consisted of distributive justice, response efficacy, self efficacy, and organizational citizenship behavior. As a result of the study, the dimension of prospect had a significant effect on response efficacy and self efficacy, and it was found that the influence of the gain condition was greater than that of the loss condition. The goal orientation dimension had a significant effect on response efficacy and self efficacy, and it was found that the influence of the growth condition was greater than that of the validation condition. The research model that explained the relationship between information security factors appeared as a partial mediating model between distributive justice, response efficacy, and organizational citizenship behavior. The implications of this study suggest that it is necessary to establish an information security strategy in combination with individual decision-making factors and organizational culture factors.

Policy-based Query Translator Design and Implementation for the Privacy Protection in Database (데이터베이스에서 개인정보보호를 위한 정책기반 쿼리 변환기 설계 및 구현)

  • Kim, Mi-Yeong;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1112-1115
    • /
    • 2008
  • 인터넷으로 대표되는 정보통신망 및 컴퓨터를 이용한 개인 정보 수집과 활용이 일반화됨에 따라 수집된 개인정보의 불법적인 접근 유출 사례가 증가하고 있다. 현재의 개인정보 이용 환경은 데이터 접근 시 사용자의 질의 내용과 그에 대한 결과가 그대로 노출되어 사용자의 프라이버시를 침해하는 문제를 안고 있다. 본 논문에서는 데이터베이스에서 개인정보보호를 위해 접근제어 정책 기반 쿼리 처리시스템인 보안 게이트웨이를 설계하고 구현한다. 이 시스템은 클라이언트가 TDS 프로토콜을 이용하여 DBMS에 접근해 정보를 요청할 때 보안 정책을 반영함으로써 단순한 차단은 물론 변환된 쿼리 응답을 한다. 본 시스템은 불법적인 접근에 대한 제어는 물론이고, 정당한 인증자의 실수나 고의적인 개인정보 유출로 인한 경제적, 사회적 손실을 방지할 수 있다. 또한 주민등록번호 등 보안 대상 정보를 제외한 기타 정보에 대한 접근을 허용함으로써 데이터베이스 가용성을 보장한다.

A Study on a Distributed Data Fabric-based Platform in a Multi-Cloud Environment

  • Moon, Seok-Jae;Kang, Seong-Beom;Park, Byung-Joon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.321-326
    • /
    • 2021
  • In a multi-cloud environment, it is necessary to minimize physical movement for efficient interoperability of distributed source data without building a data warehouse or data lake. And there is a need for a data platform that can easily access data anywhere in a multi-cloud environment. In this paper, we propose a new platform based on data fabric centered on a distributed platform suitable for cloud environments that overcomes the limitations of legacy systems. This platform applies the knowledge graph database technique to the physical linkage of source data for interoperability of distributed data. And by integrating all data into one scalable platform in a multi-cloud environment, it uses the holochain technique so that companies can easily access and move data with security and authority guaranteed regardless of where the data is stored. The knowledge graph database mitigates the problem of heterogeneous conflicts of data interoperability in a decentralized environment, and Holochain accelerates the memory and security processing process on traditional blockchains. In this way, data access and sharing of more distributed data interoperability becomes flexible, and metadata matching flexibility is effectively handled.

Cybercrime as a Discourse of Interpretations: the Semantics of Speech Silence vs Psychological Motivation for Actual Trouble

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;PASKO, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.203-211
    • /
    • 2021
  • The article studies the discourse and a legal uncertainty of the popular and generally understandable concept of cybercrime. The authors reveal the doctrinal approaches to the definition of cybercrime, cyberspace, computer crime. The analysis of international legal acts and legislation of Ukraine in fighting cybercrime is carried out. The conclusion is made about the need to improve national legislation and establish international cooperation to develop the tools for countering cybercrime and minimizing its negative outcomes. The phenomenon of nicknames is studied as a semantic source, which potentially generates a number of threats and troubles - the crisis of traditional anthroponymic culture, identity crisis, hidden sociality, and indefinite institutionalization, incognito style, a range of manifestations of loneliness - from voluntary solitude to traumatic isolation and forced detachment. The core idea is that it is the phenomenon of incognito and hidden name (nickname and other alternatives) that is the motivational stimulus for the fact of information trouble or crime.

Study on Image Processing Techniques Applying Artificial Intelligence-based Gray Scale and RGB scale

  • Lee, Sang-Hyun;Kim, Hyun-Tae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.252-259
    • /
    • 2022
  • Artificial intelligence is used in fusion with image processing techniques using cameras. Image processing technology is a technology that processes objects in an image received from a camera in real time, and is used in various fields such as security monitoring and medical image analysis. If such image processing reduces the accuracy of recognition, providing incorrect information to medical image analysis, security monitoring, etc. may cause serious problems. Therefore, this paper uses a mixture of YOLOv4-tiny model and image processing algorithm and uses the COCO dataset for learning. The image processing algorithm performs five image processing methods such as normalization, Gaussian distribution, Otsu algorithm, equalization, and gradient operation. For RGB images, three image processing methods are performed: equalization, Gaussian blur, and gamma correction proceed. Among the nine algorithms applied in this paper, the Equalization and Gaussian Blur model showed the highest object detection accuracy of 96%, and the gamma correction (RGB environment) model showed the highest object detection rate of 89% outdoors (daytime). The image binarization model showed the highest object detection rate at 89% outdoors (night).

A Comparative study of Korea and US Intelligence Systems: Focusing on Environment, Intelligence Organizations and Activities (한국과 미국의 정보체계 비교연구 - 환경, 정보조직 및 활동을 중심으로 -)

  • Seok, Jaewang
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.107-135
    • /
    • 2019
  • The purpose of this paper is to compare and analyze the similarities and differences between the security environment, information organization and information activities of Korea and the United States. The comparison will provide insight into Korea and other national intelligence agencies, as well as methodological advances in information research, by providing insight into the overall information and a broad understanding As the history, culture and national power of Korea and the U.S. are different, the organization and activities of intelligence agencies are also different. First of all, in terms of environment, the U.S. carries out intelligence activities for national interest and security in a wide range of areas ranging from North American continental countries to South America, the Middle East, Asia and Asia, while South Korea's intelligence activities are mainly aimed at North Korea and neighboring countries around the Korean Peninsula. In terms of information organization, U.S. intelligence agencies are separate, whereas domestic and foreign intelligence agencies are separate, whereas Korean intelligence agencies are a type of integrated intelligence agency that combines information and investigation, unlike the U.S. In the U.S., the U.S. also operates as an intelligence community, and there are many flexible organizations such as non-tier organizations and centers. Intelligence activities by U.S. intelligence agencies are mainly focused on analysis and overseas processing activities, while Korean intelligence agencies still account for a large portion of domestic information activities. Despite these differences, Korea's intelligence agency was created by imitating U.S. intelligence agencies, and thus has similar aspects in terms of evaluation of security, organization and activities. However, this similarity is shared by all intelligence agencies, so the article will focus on analyzing differences. Finally, for the development of Korean intelligence agencies, the establishment of an intelligence community and efficient control of the National Assembly will be proposed.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

New Trends and Strategies For the Integration of Information and Communication Technologies in Educational Activities

  • Vasіutina, Tеtіana;Cherednyk, Lidiia;Klymenko, Oksana;Sokur, Olena;Shevchuk, Anatolii;Zatserkivna, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.169-172
    • /
    • 2021
  • The article discusses the results of a quantitative analysis of open educational resources in the field of information technology. Study is based on a study of the content of ten platforms that provide access to open resources (OPs). To achieve this goal, we used the following methods: theoretical analysis and generalization of Internet sources to determine the popularity of educational platforms and resources on them; quantitative data analysis to determine the relative proportion of IT courses in various parameters: the relative weight of courses in the IT field in general and on each platform in particular, the language of instruction, the quantitative content by thematic areas. The following platforms providing access to open educational resources were subjected to quantitative analysis: Coursera, Edx, Udemy, MIT OpenCourseWare, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Maidan Open University.