• 제목/요약/키워드: Information Security Participation

검색결과 93건 처리시간 0.022초

조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향 (The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior)

  • 박재영;김범수
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권4호
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

국방정보보호산업 관련 중부권 연구기관 활용방안 (A Participation Scheme of the Central Region Research Institute related to National Defense Information Security Industry)

  • 엄정호
    • 안보군사학연구
    • /
    • 통권9호
    • /
    • pp.191-206
    • /
    • 2011
  • This study is presented a scheme that information security research institutions located within the central area can be participated actively m national defense information security industry. The many of information security company are located in the central region(Daejeon) and there are many research institutes. However, the participation rate of the Defense Information Security Industry is not high compared to other provinces. Although a variety of reasons, there are no the Defense Privacy Office that could have a role in protocol and the information about the industry. In addition, the Department of Defense related to national defense information security industry have not information about research institutions in the central region and are not well to identify the characteristics of institutional technology and research. So in this paper we presented some of the alternatives. 1) Building Pool involved in information security research according to the characteristics of each agency 2) Constitute the research community between Research institutions and the company 3) Build the technology cooperation between research institutions and the defense research institutes 4) Utilization of industry/university/research institutes related to Information Security Industry 5) Make strategic alliances among research institutes based on technical expertise.

  • PDF

MMOG User Participation Based Decentralized Consensus Scheme and Proof of Participation Analysis on the Bryllite Blockchain System

  • Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon;Kim, OkSeok;Shin, SangWoo;Choi, Jin;Kim, Yoora
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4093-4107
    • /
    • 2019
  • Proof of Work (PoW) based blockchains have limitations in throughput, time consumption, and energy efficiency. In these systems, a miner will consume significant time and resources to obtain a reward for contributing to the blockchain. To overcome these limitations, recent research on blockchains are focused on accelerating the speed, scalability, and enhancing the security level. By enhancing specific procedures of blockchain system, the level of data integrity supported by the blockchain can become more robust, and efficient. In this paper, a new blockchain consensus model based on the Bryllite Consensus Protocol (BCP) is proposed to support a hyper-connected massively multiplayer online game (MMOG) ecosystem. The BCP scheme enables users to participate directly in new consensus processes through a Proof of Participation (PoP) algorithm. In this model, the consensus algorithm has a simpler form while maintaining high security level. In addition, because the BCP scheme gives users an equal chance to make a contribution to the blockchain, rewards are distributed in an equal fashion, which motivates user participation. The analysis of the proposed scheme is applied to the Bryllite consortium blockchain system (homed in Hong Kong), which is a new blockchain network developed for international game industries, gamers, and game events.

A Study on Relationship between Learning participation and Learning Outcomes in Programming Courses

  • Kim, Ji Sim;Kim, Kyoung Ah;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.113-121
    • /
    • 2019
  • The purpose of the study is to identify the influence of learning participation on learning outcomes in programming courses. Based on the literature review, learning participation is composed of three sub components: participation in preview, class, and review. Learning outcomes are categorized by academic achievement, learning satisfaction, and learning motivation. A survey was conducted with 267 students enrolled in programming courses from three IT departments at Myongji College. Findings revealed that participation in review and participation in class predicted all sub components of learning outcomes. Participation in review was found to have a greater effect on learners' achievement and participation in class was found to have a greater impact on learning satisfaction and motivation. However, the results showed that participation in class was not an influential factor for learning outcomes. Implications for enhancing learning participation and suggestions for future research are also discussed.

정보보안문화와 경영진 리더십이 조직 구성원의 정보보안 행동에 미치는 영향 (Impacts of Information Security Culture and Management Leadership Styles on Information Security Behaviors)

  • 박성환;김범수;박재영
    • 정보보호학회논문지
    • /
    • 제32권2호
    • /
    • pp.355-370
    • /
    • 2022
  • 본 연구는 개인적 요인에 초점을 맞춘 기존 연구를 확장하여, 조직의 환경적 요인(정보보안문화, 경영진리더십)이 조직 구성원의 정보보안 행동(정보보안정책 준수 의도, 정보보안 참여 의도)에 미치는 영향을 살펴본다. 본 연구는 금융기관 구성원 236명으로부터 데이터를 수집하였으며, 본 연구에서 개발한 모형을 구조방정식모형으로 분석하였다. 분석 결과, 정보보안문화는 정보보안정책 준수 의도와 정보보안 참여 의도에 모두 긍정적인 영향을 주었다. 거래적 리더십은 정보보안정책 준수 의도와 정보보안 참여 의도에 모두 긍정적인 영향을 주었지만, 변혁적 리더십은 정보보안 참여 의도에만 긍정적인 영향을 주었다.

최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구 (The Study on Corporate Information Security Governance Model for CEO)

  • 김도형
    • 융합보안논문지
    • /
    • 제17권1호
    • /
    • pp.39-44
    • /
    • 2017
  • 기존의 기업 정보보호 활동은 정보보호 조직 중심이 이었으며, 최고경영자는 정보보호와 기업경영은 별개의 것이라고 생각한다. 하지만 각종 보안사고가 끊임없이 발생하고 있으며, 이에 대응하기 위해서는 정보보호 조직만의 활동이 아니라 기업경영 측면에서의 정보보호 활동이 필요하다. 본 연구에서는 기존에 제시된 기업 거버넌스 및 IT거버넌스 등을 살펴보고 기업의 정보보호 활동에 기업의 비즈니스 목표와 경영진의 목표를 반영할 수 있는 정보보호 거버넌스 모델을 제시하고자 한다. 본 논문에서 제시하는 정보보호 거버넌스 모델은 계획 단계에서부터 최고경영자의 참여를 유도하여 정보보호 목표를 수립한다. 정보보호 목표에 따라 정보보호 계획 수립, 정보보호체계를 구축 및 운영하고, 컴플라이언스 감사, 취약점 분석 및 리스크 관리 등을 통해 그 결과를 최고경영자에게 보고함으로써 기업의 정보보호 활동을 강화할 수 있다.

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

종교인과 종교언론의 사회 통합적 역할 -종교신문을 중심으로 (A Role of Religionists and Religious Newspapers for the Harmonious Society of Korea)

  • 박광수
    • 대순사상논총
    • /
    • 제19권
    • /
    • pp.193-211
    • /
    • 2005
  • Korean religionist have actively participated in the movements of national security and peace, human rights and dignity, freedom and equal rights, and other social issues. Recently, either progressive or conservative religionists have strongly shown their different approaches in solving social issues, i.e., national security and peace in connection of 'national security law.' A few religious leaders' public views have been misused by some politicians. It is important for both the religionists and journalists in religious newspapers how to bring a harmonious resolution among the people who are either in conservatism or in progressivism. Social participation of religionists is both to respond to the timely situation of civil society and to realize freedom, equality, and peace to the society. Although the principle of the separation of religion and state was established to secure both the right of politics and the freedom of beliefs, political groups have either utilized or suppressed religions. Some politicians have also wrongly applied separation of religion and state by excluding religious aspects in public schools. Religionists and journalists of the religious newspapers should not provide one-sided prejudice but to provide objective information and its righteous analysis to guide people in the right direction to solve social problems. Also, religious newspapers should open a field of discussion how to resolve some issues between the 'national security law' and freedom.

  • PDF

인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석 (Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics)

  • 신현조;이경복;박태형
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.