• Title/Summary/Keyword: Information Security Decision Making

Search Result 190, Processing Time 0.031 seconds

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

Recent Trends on Smart City Security: A Comprehensive Overview

  • Hyuk-Jun, Kwon;Mikail Mohammed, Salim;Jong Hyuk, Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.1
    • /
    • pp.118-129
    • /
    • 2023
  • The expansion of smart cities drives the growth of data generated from sensor devices, benefitting citizens with enhanced governance, intelligent decision-making, optimized and sustainable management of available resources. The exposure of user data during its collection from sensors, storage in databases, and processing by artificial intelligence-based solutions presents significant security and privacy challenges. In this paper, we investigate the various threats and attacks affecting the growth of future smart cities and discuss the available countermeasures using artificial intelligence and blockchain-based solutions. Open challenges in existing literature due to the lack of countermeasures against quantum-inspired attacks are discussed, focusing on postquantum security solutions for resource-constrained sensor devices. Additionally, we discuss future research and challenges for the growing smart city environment and suggest possible solutions.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

Cost Risk Analysis for Preparing Budgets of Information Security using Fuzzy AHP (정보보안 예산 수립에서 퍼지 AHP의 적용을 통한 위험 비용 분석)

  • Ryu, Si-Wook;Her, Duk-Gyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.119-126
    • /
    • 2012
  • Recently, the breakdown of online banking servers and the leakage of customer information give rise to much concern about the security of information systems in financial and banking companies in Korea. The enforcement of security for information system becomes much more important issue than earlier. However, the security reinforcement of information system is restricted by a budget. In addition, the activities' cost to secure information system from threatening are under uncertain circumstances and should be established by a human decision maker who is basically uncertain and vague. Thus, making the budget for information system is exposed to any extent of the risk for these reasons. First, we introduce brief fuzzy set theory and fuzzy AHP (Analytic Hierarchy Process) methodology. Then, the cost elements that comprise yearly budget are presented and the priorities among the cost elements are calculated by fuzzy AHP. The cost elements that are exposed to risk are evaluated from the both perspectives of the risk impact and risk occurrence possibility which are expressed as linguistic terms. To get information on the risk profiles-pessimistic, most likely, and optimistic-for each cost element, the evaluation is accomplished and the result is presented. At last, the budget ranges-minimum, mode, maximum-for each cost element are estimated with the consideration of the risk profiles.

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

A Study on the Career Decision-Making Patterns of Fisheries High School Students (수산고등학교(水産高等學校) 학생(學生)들의 직업결정형태(職業決定形態)에 관한 연구(硏究))

  • Park, Kwang-Chun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.4 no.1
    • /
    • pp.16-29
    • /
    • 1992
  • 1. Purpose of the study: This study was to investigate and analyse the career decision making patterns of students, which would enhance vocational guidance activities for the students. The specific purposes of the study are as follows. 1) To find how much the fisheries high school students are satisfied with the school. 2) To find out the factors which would influence the fisheries high school students in their career decision making. 3) To find out the person who plays the most important role in the career decision making of the students 4) To find out the patterns of behavior taken by the fisheries high school students in their career decision making. 2. Hypotheses: The following hypotheses were tested for this study. 1) There would be significant differences in the extent of school-satisfaction, depending on the class level and major. 2) There would be significant differences in the value criterion with which the fisheries high school students make decisions on their careers, depending on the grades, majors, and the levels of school-satisfaction. 3) There would be significant differences in the human factors which affect their decision-making on their career, depending on the class levels, majors, and the levels of school satisfaction. 4) There would be significant differences in the patterns of behavior they take when they make decisions on their careers depending on the grades, majors and the levels of school satisfaction. 3. Methods of the study: For the verification of the above hypotheses, a questionaire was developed by the researcher, and the questionaire was answered by the total 440 students from three fisheries high schools, located in the rural and urban areas, out of 8 fisheries high schools in Korea. The questionaire was composed of two major parts: school-satisfaction (10 items) and career decision making patterns (39 items). The career decision-making patterns include 16 value criterion items, 10 human category items, and 13 behavior category items. 4. Results of the study: 1) School satisfaction; There was no significant difference in school satisfaction depending on the class level and major. 2) Value criteria; a) Almost of the fisheries high school students think that the potential for advancement, job security, and salary are important factors for their job. b) The seafarer-students rated the salary, prestige of the occupation and leadership to be important than the nonseafarer-students. The nonseafarer-students rated the stabilization of their livelihood and opportunity to use their creative ideas than the seafarer-students. c) The students unsatisfied with their school emphasize the working environment, variety of work duties and leisure more than the satisfied ones. 3) Human factors: a) The fisheries high school students are affected most by their homeroom teachers, major teachers and their parents, but they are less influenced by their counselor. b) The seniors are more affected by their friends or classmates than the freshmen, and especially seafarer-students are more affected by major teachers. c) The persons, who are working in the occupation they are interested in, exert more influence on unsatisfied students than class-teachers do. 4) Behavior patterns; a) Most of them want test their abilities. b) The nonseafarer-students and seniors tend to depend on their own intuitions. c) The seafarer-students, the freshmen, and the satisfied with their school tend to discuss with other persons, and the unsatisfied tend to be influenced by the information that they collect for themselves.

  • PDF

A Better Prediction for Higher Education Performance using the Decision Tree

  • Hilal, Anwar;Zamani, Abu Sarwar;Ahmad, Sultan;Rizwanullah, Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.209-213
    • /
    • 2021
  • Data mining is the application of specific algorithms for extracting patterns from data and KDD is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories or data streams. Data mining can be used for decision making in educational system. But educational institution does not use any knowledge discovery process approach on these data; this knowledge can be used to increase the quality of education. The problem was happening in the educational management system, but to make education system more flexible and discover knowledge from it huge data, we will use data mining techniques to solve problem.

A Study on the Significant Factors Affecting the Adoption of Enterprise Cloud Computing (기업의 클라우드 컴퓨팅 도입 의사결정에 영향을 미치는 요인에 관한 연구)

  • Rim, Seong-Taek;Kong, Da-Young;Shim, Su-Jin;Han, Young-Choon
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.173-196
    • /
    • 2012
  • Cloud computing is provided on demand service via the internet, allowing users to pay for the service they actually use. Since cloud computing is emerging stage in industry, many companies and government consider adopting the cloud computing. Actually a variety of factors may influence on the adopting decision making of cloud computing. The objective of this study is to explore the significant factors affecting the adoption decision of enterprise cloud computing. A research model has been suggested based on TOE framework and outsourcing decision framework. Based on 302 data collected from managers in various industries, the major findings are following. First, the benefit factors of cloud computing service such as agility and cost reduction have direct and positive effects on adoption of the service. Second, lock-in as a risk factor of cloud computing service has a negative effect while security has not. Third, both internal and external environment factors have positive effects on adoption of the service.

The Role of Reputation in Ubiquitous Healthcare System

  • Yuan, Weiwei;Guan, Donghai;Lee, Sung-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.847-848
    • /
    • 2007
  • In this work, we analyze the role of reputation in ubiquitous healthcare system as well as the relationship of security, trust and reputation in this environment in details. In addition, an example is given to show how to use reputation system in ubiquitous healthcare and how to use reputation system on decision making.

  • PDF

A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

  • Suresh B.Rathod
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.60-66
    • /
    • 2024
  • Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.