• Title/Summary/Keyword: Information Security Economics

Search Result 142, Processing Time 0.023 seconds

Early Career Turnover Model and Career Path for Self-realization: Findings in Korea's Information Security Industry

  • Song-Ha Lee;Hyo-Jung Jun;Tae-Sung Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1135-1155
    • /
    • 2023
  • Management of the workforce in the early career stage who enter information security work after graduating from college or university so that they can continue to develop their information security careers without leaving the organization can be a solution to the problem of absolute shortage of staffing and lack of skills. This is because the workforce can improve their job skills, and organizations can build a stable, cost-effective human resource management system. This paper constructed and verified a turnover intention research model focusing on the factors that affect the turnover intention of early-stage workforce who took their first steps in society as an information security workforce after graduating from university or college; it confirmed that self-realization is a crucial factor. Furthermore, with in-depth interviews, the career path information of skilled workers, which is essential information necessary for self-realization, was analyzed, and the direction of HRM for self-realization of the workforce in the early career stage was presented.

Characteristics of the Problems of Socio-Economic Development in the Conditions of Digital Economy

  • Medynska, Tetyana;Sai, Lesia;Akimkin, Oleksandr;Kruchak, Liudmyla;Doroshenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.297-303
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the problem of socio-economic development in the conditions of the digital economy. The post-industrial era is characterized by the development of the electronic environment and the transition to an information civilization. In this regard, the developed countries of the world pay considerable attention to the development of the digital economy. However, there are a significant number of problems associated with this process. The country cannot be successful in the development of the digital economy in the absence of the necessary legal framework, an economic development strategy based on digital technologies. The research methodology involves the use of several theoretical methods for analyzing and synthesizing information. As a result of the study, the key problems of socio-economic development in the digital economy were characterized.

Information Support for Economic Growth and Security under the Influence of COVID-19

  • Shenderivska, Lina;Lazorenko, Taisiіa;Butkevych, Oksana;Khomenko, Andrii;Shuprudko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.206-212
    • /
    • 2022
  • The main purpose of the article is to study the peculiarities of the formation of information support mechanisms for economic growth and security under the influence of COVID-19. The cyclical nature of economic growth is a well-established and proven fact. In this context, one of the main tasks of the state is to develop measures to mitigate the impact of economic crises on the entire economic system of the state, individual economic entities, as well as to introduce anti-crisis mechanisms and tools to support the economy. When the cyclical nature of economic crises coincides with destabilizing processes in society, such as natural disasters, military actions or epidemics, the role of the state and adequate information support for economic growth is sharply actualized. As a result, an analysis was made of the main aspects of information support for economic growth and security in the context of COVID-19.

Economic Analysis of The Operational Policy for Data Backup with Information Security Threats (정보보호위협하에서 경제적인 데이터백업 운영 정책 분석)

  • Yang, Won Seok;Kim, Tae-Sung;Lee, Doo Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.270-278
    • /
    • 2014
  • The stability and security management of IT data becomes more important because information security threats increases rapidly in Big Data era. The operational policy of the data backup considering information security threats is required because the backup policy is the fundamental method that prevents the damage of security threats. We present an economic approach for a data backup system with information security threats which damage the system. The backup operation consists of the differential backup and the batch backup. We present a stochastic model considering the occurrence of information security threats and their damage. We analyze the stochastic model to derive the performance measures for the cost analysis. Finally we analyze the average cost of the system and give numerical examples.

Analysis on ISMS Certification and Organizational Characteristics based on Information Security Disclosure Data (정보보호 공시 데이터를 이용한 정보보호 관리체계 인증과 조직의 특성 분석)

  • SunJoo Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.205-231
    • /
    • 2023
  • The Information Security Management System (ISMS) is a protection procedure and process that keeps information assets confidential, flawless, and available at any time. ISMS-P in Korea and ISO/IEC 27001 overseas are the most representative ISMS certification systems. In this paper, in order to understand the relationship between ISMS certification and organizational characteristics, data were collected from Korea Internet & Security Agency (KISA), Ministry of Science and ICT, Information Security Disclosure System (ISDS), Financial Supervisory Service, Data Analysis, Retrieval and Transfer System (DART), and probit regression analysis was performed. In the probit analysis, the relationship with four independent variables was confirmed for three cases: ISMS-P acquisition, ISO/IEC 27001 acquisition, and both ISMS-P and ISO/IEC 27001 acquisition. As a result of the analysis, it was found that companies that acquired both ISMS-P and ISO/IEC 27001 had a positive correlation with the total number of employees and a negative correlation with business history. In addition, the improvement direction of the ISMS-P certification system and information security disclosure system could also be confirmed.

Recent Trends on Smart City Security: A Comprehensive Overview

  • Hyuk-Jun, Kwon;Mikail Mohammed, Salim;Jong Hyuk, Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.1
    • /
    • pp.118-129
    • /
    • 2023
  • The expansion of smart cities drives the growth of data generated from sensor devices, benefitting citizens with enhanced governance, intelligent decision-making, optimized and sustainable management of available resources. The exposure of user data during its collection from sensors, storage in databases, and processing by artificial intelligence-based solutions presents significant security and privacy challenges. In this paper, we investigate the various threats and attacks affecting the growth of future smart cities and discuss the available countermeasures using artificial intelligence and blockchain-based solutions. Open challenges in existing literature due to the lack of countermeasures against quantum-inspired attacks are discussed, focusing on postquantum security solutions for resource-constrained sensor devices. Additionally, we discuss future research and challenges for the growing smart city environment and suggest possible solutions.

A Study on Awareness of Information Security Influencing Trustness (정보보안 인식이 신뢰 형성에 미치는 연구)

  • Jeong, Jaehun;Choi, Myeonggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1225-1233
    • /
    • 2015
  • This study investigates the effects of information security awareness arising from E-Commerce in terms of the Elaboration Likelihood Model(ELM) and analyzes the moderating effect of the trust's involvement and experience. Consumers are using E-Commerce Web sites, depending on the level of involvement and experience in E-Commerce. This study is based on the ELM, the information security awareness of consumer confidence in E-Commerce form, according to the degree of experience and involvement suggested a theoretical model to describe the effect that the scaling and, through empirical studies validation of model. Consumer confidence is formed the attitude of the E-Commerce company through different paths, depending on the type of awareness in the E-Commerce web site, this moderate has the effect of consumer involvement and experience. Studying the information security awareness of consumer in the on E-Commerce is considered to present a new perspective on trust.

Analysis and Priorities of State Regulation of the Labor Market in Crisis Conditions

  • Yurii Shpak;Vitaliy Davydenko;Vаsyl Pasichnyk;Valentyna Zhukovska;Viktoriya Ivanyuta
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.181-186
    • /
    • 2023
  • The main purpose of the study is to analyze the features of state regulation of the labor market in a crisis. Structural shifts in the labor market are due to the transformation of public and economic relations in today's globalized world. Increasing competition, the development of the knowledge economy, information technology, changes in the content and forms of labor require updating the labor market regulation system. The research methodology implies the use of modern methods of analysis. The analysis of the features of state regulation of the labor market in crisis conditions is carried out.

The Role of Adopting Financial Management Information Systems in Increasing Organizational Performance: Evidence from Kuwaiti SMEs

  • ALMUTAIRI, Humoud Awad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.12
    • /
    • pp.411-420
    • /
    • 2021
  • Based on the Financial Management Information Systems (FMIS) variables and supporting arenas, the current study aims to highlight the importance of FMIS in supporting organizations to achieve organizational excellence (Managing Liabilities, Support Decision Making, Cost Efficiency, Financial Quality, and Security). A quantitative approach was utilized by adopting a questionnaire as a tool. A convenient sample of (249) individuals from different Kuwaiti SMEs answered the questionnaire. SPSS v. 26 was used to analyze gathered data. The study's findings revealed that FMIS has a significant impact on organizational trials to achieve organizational excellence. This impact was most noticeable on the level of cost-efficiency, with an R-value of 0.583, followed by a positive impact on security, with an R-value of 0.453. Based on the results, it can be widely generalized that FMIS can help the organization reach organizational excellence through managing its financial affairs. As a result, the study recommends paying more attention to the quality of data presented to FMIS, keeping in mind that human errors in data entry might result in incorrect and malfunctioned data, even if it is processed by FMIS. FMIS also improves the ability of an organization to schedule financial information, such as obligations, receivables, debts, payments, and expenses.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF