• Title/Summary/Keyword: Information Security Culture

Search Result 236, Processing Time 0.027 seconds

A Study on Effective Methods to Enhance the Role of Private Security Firm for security Management in the Site of Performing Arts Events (공연장 안전관리 실태 및 개선에 따른 민간경비 역할증대에 관한 연구)

  • You, Young Il
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.2
    • /
    • pp.158-170
    • /
    • 2012
  • Citizens'income has been increased along with the trend of rapid changes in society, and the quality of their lives has been improved as well. As much as the degree of increase of quality of life, the number of spectators for performing art events, etc. who desire to fulfill their needs for enjoyment of varied cultural performances have been increasing, and also a large number of spectators enjoys a variety of festivals being held in each provincial area as well as international events: we still remember such frantic rooting shown by citizens during 2002 World Cup drawing attention and interest of entire nation. There are always risks of loss of human lives if accidents occur as there sult of close-packed crowd gathered at the same time. Therefore, it is required to prepare adequate security measures in order to prevent various accidents before hand. It is hoped that this research work would be of help for further efficient and systematic security management for the performing arts centers or public theaters encouraging the event organizer and the private security firm and the Korea Private Security Association to exert great effort and investments in further projects for development of security technology. Also, it is required to build a performance culture to consider audience's safety first from the beginning to the end of the event on the basis of efficient security management. Furthermore, spect at or sare required to recognize the fact that safety in the site for performing arts should be guaranteed for everyone's sake, and, to achieve this, they are obliged to be more cooperative with the event organizer and the private security firm, forming a trinity all together, in order not to have safety threatening situations in the site of performing arts events.

AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups

  • Kim, Jonghak;Yang, Joonhyuk;Wohn, Kwangyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1071-1092
    • /
    • 2014
  • Annotating images with tags that describe the content of the images facilitates image retrieval. However, this task is challenging for both humans and computers. In response, a new approach has been proposed that converts the manual image annotation task into CAPTCHA challenges. However, this approach has not been widely used because of its weak security and the fact that it can be applied only to annotate for a specific type of attribute clearly separated into mutually exclusive categories (e.g., gender). In this paper, we propose a novel image annotation CAPTCHA scheme, which can successfully differentiate between humans and computers, annotate image content difficult to separate into mutually exclusive categories, and generate verified test images difficult for computers to identify but easy for humans. To test its feasibility, we applied our scheme to annotate images of human faces with their age groups and conducted user studies. The results showed that our proposed system, called AgeCAPTCHA, annotated images of human faces with high reliability, yet the process was completed by the subjects quickly and accurately enough for practical use. As a result, we have not only verified the effectiveness of our scheme but also increased the applicability of image annotation CAPTCHAs.

De-identification Policy Comparison and Activation Plan for Big Data Industry (비식별화 정책 비교 및 빅데이터 산업 활성화 방안)

  • Lee, So-Jin;Jin, Chae-Eun;Jeon, Min-Ji;Lee, Jo-Eun;Kim, Su-Jeong;Lee, Sang-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.71-76
    • /
    • 2016
  • In this study, de-identification policies of the US, the UK, Japan, China and Korea are compared to suggest a future direction of de-identification regulations and a method for vitalizing the big data industry. Efficiently using the de-identification technology and the standard of adequacy evaluation contributes to using personal information for the industry to develop services and technology while not violating the right of private lives and avoiding the restrictions specified in the Personal Information Protection Act. As a counteraction, the re-identification issue may occur, for re-identifying each person as a de-identified data collection. From the perspective of business, it is necessary to mitigate schemes for discarding some regulations and using big data, and also necessary to strengthen security and refine regulations from the perspective of information security.

Factors affecting social commerce acceptance - Perceived risks and social networking sites (SNS) use -

  • Park, Hansil;Babicheva, Eva;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.26 no.4
    • /
    • pp.547-562
    • /
    • 2018
  • As social media penetrates more deeply into people's everyday lives, social commerce (a type of commerce that combines SNS features and possibility for commercial transactions) has enjoyed unprecedented growth. Shopping on Facebook is a representative example of social commerce platform that allows consumers to interact with other users, exchange information and purchase products without leaving a Facebook page. Social commerce presents great opportunities for marketers in terms of leveraging social aspects of shopping experience. It also offers a large potential for Korean companies to reach various target markets, as well as establish their presence abroad. Yet, acceptance of social commerce as a legitimate shopping channel has been slow, and consumers are still hesitant to shop via Facebook. This study draws on uses and gratification theory and the concept of perceived risk to examine how different motives for SNS use and the associated types of perceived risks can affect the purchase intention on the platform. Empirical data from 288 young users of Facebook were analyzed. Findings identified two main motives for SNS use: information-related motive and communication-related motive. Information-related motive significantly affected the intention to shop on Facebook, whereas communication-related motive did not have any significant influence. Risks associated with shopping via Facebook included delivery risk, security risk, social risk and economic risk. Overall, consumers perceived a higher level of security and social risk associated with shopping on Facebook. However, only social risk had a significant negative influence on the purchase intention. Awareness and previous experience of buying via social commerce platform positively affected consumers' purchase intention.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

The Impact of Snapchat and YouTube Influencers on the Consumption Behaviour of Saudi Consumers

  • Al-Ajlan, Monirah;Alsadhan, Afnan;Mirza, Abdulrahman
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.423-430
    • /
    • 2022
  • The emergence of social media platforms has changed the culture of business marketing. Their impact has increased considerably since the emergence of social media influencers or content creators. The phenomenon of social media influencers has been adopted as one of the most effective marketing strategies among global and local organizations. Those celebrities attract business owners, who seek to use them as means to reach a large number of potential consumers. Today, the user bases of Snapchat and YouTube in Saudi Arabia are growing fast and becoming very popular, unlike other social media platforms. Consequently, the impact of these applications' influencers on the purchasing habits of individuals cannot be underestimated. This survey paper intends to investigate the impact of Snapchat and YouTube influencers on the consumption behaviour of Saudi consumers. Results suggest that Snapchat is not only more popular but also more rusted and credible. Moreover, influencers' impact on purchasing behaviour is prevalent and powerful; furthermore, its influence is more effective in persuading Saudi consumers to buy certain products, such as food, than other products, like jewelry.

Applying Information and Communication Technologies as A Scope of Teaching Activities and Visualization Techniques for Scientific Research

  • Viktoriya L. Pogrebnaya;Natalia O. Kodatska;Viktoriia D. Khurdei;Vitalii M. Razzhyvin;Lada Yu. Lichman;Hennadiy A. Senkevich
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.193-198
    • /
    • 2023
  • The article focuses on the areas of education activities in using techniques for teaching and learning with information and communication technologies (ICTs), researching and analyzing the available ICTs, gearing the technologies to the specific psychological and pedagogical conditions, independently building and modeling ICTs, enlarging and developing their use in the learning environment. The visualization of scientific research has been determined to be part of the educational support for building students' ICT competence during teaching and learning and is essential to the methodology culture. There have been specified main tasks for pedagogy technologies (PTs) to develop the skills of adaptability to the global digital space in students, their effective database operation and using the data bases as necessary elements for learning and as part of professional training for research. We provided rationalization for implementing the latest ICTs into the Ukrainian universities' curricula, as well as creating modern methods for using the technologies in the learning / teaching process and scientific activities.

Experiments and Analysis for Security Vulnerabilities on Teredo (Teredo 보안 취약점 실험 및 분석)

  • Cho, Hyug-Hyun;Kim, Jeong-Wook;Noh, Bong-Nam;Park, Jong-Youll
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1158-1161
    • /
    • 2007
  • IPv6는 IETF가 IPv4를 대체하기 위해 제안한 프로토콜이다. 하지만 현재 모든 네트워크를 IPv4에서 IPv6로 전환하는 것은 비용과 시간적인 측면에서 힘들기 때문에 상당 기간 IPv4와 IPv6가 공존하는 IPv4/IPv6 혼재 네트워크가 유지될 것이다. IPv4/IPv6 혼재 네트워크에서 통신을 위해 다양한 메커니즘들이 개발되었다. Teredo는 이러한 메커니즘들 중에 하나로 NAT 내에 위치한 IPv4 호스트가 IPv6를 이용할 수 있게 하고, 향후 다수의 사용자에 의해 사용이 예상되는 윈도우 비스타에서 기본적으로 이용할 수 있기 때문에 혼재 네트워크에서 상당히 오랜 기간 동안 사용될 것이다. 하지만 Teredo 메커니즘은 NAT 내의 보안 장비 우회, Teredo 구성 요소의 신뢰성 등 보안 취약점을 가지고 있다. 본 논문에서는 Teredo를 이용하는 네트워크에서 발생 가능한 보안 취약점들에 대해서 기술하고, 그 중에서 캐쉬 오버플로우 공격에 대한 실험 결과를 기술한다.

Developing an Archive for the 'Heungtaryeong' (흥타령 아카이브 개발)

  • Kim, Tae-Eun;Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.35-40
    • /
    • 2010
  • Heungtaryeong Archive is a massive information date base warehouse which systematically stores digital dates in relation to dance, such as traditional dance, modem dance, dance sports and etc. The Heungtaryeong Archive is a research that cannot be conducted in a short period of time, in which the dances may be forgotten. Therefore, this is a meaningful research that the forgettable traditional culture is stored in the date base (warehouse). 'Heungtaryeong Archive in this research' presents the possibility of advertisement, education, research and development, and popularization of dance through on-line network system.

Model Of Formation Of Digital Competence On The Basis Of Pedagogical Proceedings At The Present Stage Of Development Of Digitalization Of Society

  • Lytvyn, Valentyna;Khlystun, Olena;Prykhodkina, Nataliia;Poluboiaryna, Iryna;Bevz, Maryna;Kopeliuk, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.219-223
    • /
    • 2021
  • The article discusses the pedagogical support for the formation of ICT competence assumes the individualization of students' training, due to their personal and professional needs and interests, and the provision of the necessary conditions and means to implement this process. A theoretical analysis is carried out and an analysis of experimental work on the implementation of the developed model for the formation of ICT competence is generalized specialists on the basis of pedagogical support.