• Title/Summary/Keyword: Information Security Participation

Search Result 93, Processing Time 0.03 seconds

Participation Types of Private Security Guards in Leisure Activities and the Effect of Leisure Constraint on Life Quality (민간경호원의 여가활동 참여유형 및 여가제약이 삶의 질에 미치는 영향)

  • Park, Joon-Ho;Choi, Pan-Am;Jo, Sung-Gu
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.161-171
    • /
    • 2011
  • This research puts the purpose in elucidating the effect of participation types of leisure activity and leisure restraints on life quality. To achieve research purpose, questionnaire survey was conducted on 200 subjects who are engaged in private guard companies with ages over 20. Using the collected data, frequency analysis was conducted in order to identify demographic characteristics with SPSS/WIN 17.0V program. In addition, multiple regression analysis was conducted for solving research questions. As a result, sports related participation type had a positive effect on time constraint factor. Meanwhile, hobby related participation type had a positive effect on time and cost constraint, participation type of watching has a positive effect on individual and social constraint. Tour and play related participation type had a positive effect on individual constraint factor. Meanwhile participation type of sociality had a positive effect on individual constraint and hobby factor, but had a negative effect on familial and social constraint. Sports related participation type had a positive effect on social relationship factor. Participation type of watching and play related participation type had a negative effect on family relationship. Finally, time constraint factor had a positive effect on family relationship, and cost constraint factor had a positive effect on entire quality of life. Individual and family constraint factors had a negative effect on leisure relationship factor. Also, social constraint factor had a positive effect on family relationship, but had a negative effect on leisure relationship.

A Study on Expanding Participation in and Raising Awareness of the Green Parking Project for Improvement of Parking Conditions in Urban Residential Areas (도시주거지 주차환경개선을 위한 녹색주차사업 참여확대 및 인식제고 방안)

  • Kim, Myo-Jung
    • Journal of the Korean housing association
    • /
    • v.26 no.1
    • /
    • pp.61-70
    • /
    • 2015
  • The purpose of this study was to provide information on how to expend participation in and raise awareness of the Green Parking Project. A survey was conducted for this study among two groups. One group consisted of 38 residents of the Green Parking Zone in Nam-gu, Ulsan, and the other group consised 129 residents with no experience with the Green Parking Project. For analysis, the frequency and means were calculated, and t-test, analysis of variance, and chi-square test were performed. The results showed, first, that general residents tended to think that parking on the street in front of one's house is a divine right, while residents living the Green Parking Zone thought that the street is a public space. Second, general residents regarded fences as means of security to protect their private property, while people living in the Green Parking Zone tended to think of their yards as semi-private spaces and allowed access to neighbors. Third, general residents had concerns about maintenance and administration fees, noise and dust, security of houses, and privacy. However, residents of the Green Parking Zone evaluated those conditions positively. Fourth, people who were well-informed about the Green Parking Project had low anxiety about security and invasion of privacy, results from the project. Therefore, effective public relations are very important for expanding participation and raising awareness.

A Design of PC Power-Saving System Security Using IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템 보안 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

Effects of Biased Awareness of Security Policies on Security Compliance Behavior (보안정책에 대한 편향적 사고가 보안준수 행동에 미치는 영향)

  • Heo, Jun;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.1
    • /
    • pp.63-75
    • /
    • 2020
  • From the perspective of compliance with security policies by members of the organization, which is a major cause of security incidents, this study presented biased thinking as factors that affect compliance with security policies and verified the following: First, the impact of biased thinking on security policies on compliance with security policies is verified. Second, the participation of management, perceived risk, education and punishment of management will verify the adjustment effect of increasing or decreasing biased thinking. Finally, we have verified that compliance attitudes have a significant impact on compliance behavior. To this end, 157 people were surveyed, statistical analysis of research models and structural equations, and conformity analysis were conducted. Studies have shown that biased thinking has a negative effect on the attitude of compliance with information security. In addition, it was analyzed that the attitude of compliance with information security policy increases policy compliance behavior. On the other hand, the higher the perceived risk of information security, the lower the bias was the adjustment effect, but management's participation, education and punishment were found to have no adjustment effect.

A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition (사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구)

  • Kim, Kihoon;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention (조직의 정보보안 목표 설정과 공정성이 보안정책 준수의도에 미치는 영향)

  • Hwang, In-Ho;Kim, Seung-Wook
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.117-126
    • /
    • 2018
  • The threat to information security is growing globally. To this, organizations are increasing the weight of adapting and operating the more specialized information security policy and system. Information security requires participation from the employees who execute the security system and policy, and to increase the level of organization's internal security, requires organization's systematic support to improve employees' information security compliance intention. This research finds the mechanism for improving employee's information security compliance intention by applying justice theory and goal setting theory in information security. We use structural equation modeling to verify the research hypothesis, and conducted a survey on the employees of organization with information security policy. In other words, this research performs verification of the research model based hypothesis which claims that security policy goal setting has positive influence on employee's level of security related justice recognition, and claims that justice has positive influence on compliance intention. The object of study is the employees of the organization that adapts information security policy, and 383 valid samples were collected via survey. Structural equation modeling was performed to verify the research hypothesis. The result shows that security policy goal factor (goal difficulty, goal specificity) improves employee's security related justice recognition, and that security related justice (distribution, process, and information justice) has positive influence on compliance intention. The result suggests the strategic approach directions for improving employees' compliance intention on organization's security policy.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.

Analysis of the Effect of Learning Participation on Achievement in Programming Courses (프로그래밍 교과의 학습참여도가 성취도에 미치는 영향 분석)

  • Kim, Ji-Sim;Kim, Kyoung Ah;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.497-498
    • /
    • 2018
  • 본 논문에서는 프로그래밍 교과에서 학습참여도가 성취도에 끼치는 영향을 규명하였다. 학습참여도는 예습참여도, 수업참여도, 복습참여도로서 학습활동별로 측정되었다. 중다회귀분석 결과, 세 개의 독립변수는 성취도를 설명하는 모형은 유의한 것으로 나타났다. 예습참여도는 성취도에 유의한 영향을 미치지 않았으며, 유의한 영향을 미치는 두 요인 중 상대적 기여도는 복습참여도, 수업참여도 순인 것으로 분석되었다. 이러한 연구결과에 기초하여 프로그래밍 교과의 성취도 향상을 위한 교수학습 전략을 제시하였다.

  • PDF