• Title/Summary/Keyword: Information Security Participation

Search Result 93, Processing Time 0.03 seconds

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing (효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구)

  • Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.39-54
    • /
    • 2022
  • Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.

Directions of the Activation of the Development of a Small Innovative Enterprise

  • Antypenko, Nadiia;Dongcheng, Wang;Lysenko, Zhanna;Krasnonosova, Olena;Grynevych, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.495-502
    • /
    • 2021
  • The study is devoted to substantiation of directions of intensification of development of small innovative enterprise, which has a significant impact on the overall innovation activity of the country and promotes innovative development, transition to more advanced technological systems. The outlined role of small business in innovative development in the direction of intensifying innovation in the economy, improving organization and production, as well as in the form of direct participation in the innovation process, production of science-intensive products, stimulating demand for innovation. A group of factors hindering the development of small innovative entrepreneurship was identified, including: financial aspects of the activity, shortcomings of organizational and communicative nature, underdeveloped technology market, information plan problems, internal production problems of small business, market problems. The directions of intensification of the development of small innovative entrepreneurship are substantiated, namely: financial and credit support of small innovative entrepreneurship; introduction of tax incentives; material and technical support; nationwide intensification of innovation activity; information support; development of innovation infrastructure. The involvement of the outlined directions of intensification of small innovative entrepreneurship will help to obtain a synergistic effect of innovative development of both small innovative business structures and the economy as a whole.

Quality Evaluation of e-Government Services: A Systematic Literature Sudan as a Case Study

  • Elmouez Samir Abd Elhameed Mohamed;Amgad Atta Abedelmageed Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.95-108
    • /
    • 2023
  • The technological revolution, also referred to as the Fourth Industrial Revolution, it embraced by government should transform the way governments serve their citizens. The growth of broadband in Africa is leapfrogging its technological development. And thus, many African governments will soon be able to offer quality e-Government services to their citizens. These technologically driven governments will be able to provide decision-makers with timeous information to make judgments that could influence policies. Proponents of e-Government believe that in the digital age, governments can use this information to reduce corruption and increase, accountability, transparency, efficiency, and public participation. e-Government service quality should ensure customer satisfaction. Although many studies have examined the role of e-Government and the quality of its services, few studies have examined the quality of e-Government services in terms of both supply and demand. This paper examines and reviews the academic-state-of-the-art on the factors that affect the quality of e-Government services from both perspectives. Utilizing both qualitative and quantitative methods for data gathering and analysis, a mixed methods research methodology was used.

Study on the Method for the Review to improve Learning Efficiency (학습 효율을 높이기 위한 복습 지원 교수학습 방법 연구)

  • Oh, Suk;Kim, Kyoung Ah;Ahn, You Jung;Kim, Ji-Sim;Jin, Myung Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.343-344
    • /
    • 2019
  • 본 논문에서는 교수자에게 큰 부담을 주지 않으면서 학습 효과를 높이기 위한 방법으로 문제풀이 기반의 자발적 복습을 지원하는 교수학습 모형을 제안하고 이를 수업 운영에 적용하였다. 학습자들에게 배포한 수업내용을 복습할 수 있는 문제들로 구성한 유인물은 단순히 해당 요일의 수업을 되풀이하여 익히는 소극적 의미에서의 복습이 아니라 이전 수업 내용들 간의 연관성을 이해할 수 있도록 문제를 구성하고 학습자들의 복습시 발생하는 어려움을 해결할 수 있도록 교수 전략을 수립한다.

  • PDF

Development of Test Tool for Testing Packet Filtering Functions (패킷 필터링 기능 테스트를 위한 테스트 도구 개발)

  • Kim, Hyeon-Soo;Park, Young-Dae;Kuk, Seung-Hak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.2
    • /
    • pp.86-99
    • /
    • 2007
  • Packet filtering is to filter out potentially malicious network packets. In order to test a packet filtering function we should verify whether security policies are performed correctly as intended. However there are few existing tools to test the function. Besides, they need user participation when generating test cases or deciding test results. Many security administrators have a burden to test systematically new security policies when they establish new policies or modify the existing ones. To mitigate the burdens we suggest a new test method with minimal user articipation. Our tool automates generation steps of the test cases and the test oracles, respectively. By using the test oracles generated automatically, deciding test results is possible without user intervention. Our method realizes an automatic testing in three phases; test preparation phase, test execution, and test evaluation. As a result it may enhance confidence of test activities more highly. This paper describes the design and implementation of our test method and tool.

Implementation of Distributed Intrusion Detection System based on Protocols (프로토콜 기반 분산 침입탐지시스템 설계 및 구현)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

Relationship between Pursuit Benefit and Behavior by Spectators Participating Security Exhibition (보안엑스포 참관객의 추구편익과 참관 후 행동의 관계)

  • Kim, In-Jae
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.35-56
    • /
    • 2014
  • The purpose of this study was aimed to identify the relationship between pursuit benefit and behavior by spectators participating security exhibition. The result of study is significant because it may provide more effective and aggressive marketing strategies to the future companies participating security exhibition, and suggest developmental direction by actively responding spectators' needs. The subject for this study was spectators who participating World Security Expo 2014 held three days from March 12 to 14 in 2014. 300 samples were selected by convenience sampling for subject of this study. 283 out of 300 surveys, excluded 17 unfaithful and defected surveys, were used for data analysis. Research tool was questionnaire which was based on and recomposed by previous researches home and abroad. The collected data were treated for analysis of frequency, reliability, factor analysis, correlation, and regression by using SPSS statistic package version of 18.0. Through the above research method and procedure, the results were as followings. First, the relationship between pursuit benefit and behavior after participating exhibition appeared positively. It was found that there was high relationship between pursuit benefit and behavior. Second, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect information exploration, good use of spare time, and product purchase on word of mouth. Third, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect good use of spare time, information exploration, and product purchase on re-participation.

  • PDF

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.

The information process on labor and the protection of information human rights (노동정보처리와 정보인권보호)

  • 하우영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.17-32
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers' side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers' side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals' with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.