• Title/Summary/Keyword: Information Security Professional

Search Result 186, Processing Time 0.027 seconds

The Level of Job Satisfaction and Organizational Commitment of Medical Record Technicians (의무기록사의 직무만족도 및 조직몰입도)

  • Choei, Eun-Mi;Kim, Young-Hoon
    • Korea Journal of Hospital Management
    • /
    • v.8 no.3
    • /
    • pp.72-91
    • /
    • 2003
  • The purpose of this study is to investigate the recognition of health information managers, and to analyze the level of job satisfaction and organizational commitment of medical record technicians. The data for this study were collected through a self-administered survey with a structured questionnaire to 172 subjects from medical record technicians working in hospitals in Seoul and Gyeonggi Province as well as the faculty of medical schools across South Korea. In this analysis frequency, t-test, ANOVA, factor analysis and structural equation model were used. The main findings of this study are as follows: 1. As for recognition of the seven dimensions in the role of health information managers, the role as clinical data specialist received the most positive feedback, followed by document & repository managers, patient information coordinators, health information managers, data quality managers, security officers and research & decision support analyst. 2. The level of job satisfaction among medical information handlers and managers averaged 3.14. In terms of the factors in the work environment concerned with job satisfaction, being able to work independently and as team players reached the top among 6 factors with the average of 3.39, followed by professional position, salary & rewards, expectations for job performance and administration. 3. The average rate of organizational commitment stood at 3.09. Respondents tend to be focused on present tasks rather than future-oriented tasks. 4. The result of the analysis based on the relationship between recognition as health information managers, job satisfaction and organizational commitment found that all analysis are statistically meaningful. The more the respondents were aware of their roles as health information managers, the more they tended to be committed to their work and satisfied with their work. The more the respondents were committed to their work, the more satisfaction was seen. The effects of recognition as health information managers on organizational commitment measured 0.27 and for job satisfaction it was 0.17. The effects of organizational commitment on job satisfaction stood at 0.71. The feasibility of the model meets the standard at Chi-square value of 66.755 and the P value of 0.057. The Normed Fit Index (NFI) of 0.930 was in compliance with the standard for model feasibility and the squared multiple correlation coefficient of this model was 8% in organizational commitment and 60% in job satisfaction.

  • PDF

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

Efficient Information System Sizing Selection Using Cloud Computing Platform (클라우드 컴퓨팅 플랫폼을 이용한 효율적인 정보시스템 용량 산정 방법에 관한 연구)

  • Seong, Baek-min;Lee, Min-gyu;Sohn, Hyo-jung;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.79-81
    • /
    • 2014
  • Recently, It is built various information systems evolve IT skills. But When you build the information system, Difficult to determine whether the appropriate scale and problems that rely heavily on SI companies and professionals. To solve this problem, Korea Information Security Agency, etc., based on the primary objective was to develop H/W Capacity Equation formally to each system type. But the problems are to present H/W capacity equation by discussion of the expert group of suppliers and relatively long that it is difficult to formally apply in the situation now so it is no longer the limit. In this study, we proposes proper capacity planning techniques, which can guarantee the best performance compared to the budget invested. For this purpose, we derived the proper H/W capacity equation by regression analysis to gather performance metrics and cost of various cases by simulation of a virtual environment in the cloud. Through this study, when capacity planning, It is possible to reduce costs that It is possible to build an information system based on the digitized data and build information system in an environment that does not rely on the SI business or professional.

  • PDF

A Study on the Improvement of Methodologies for Establishing a Vulnerability Classification of Chemical Terrorism in Public Facilities (다중이용시설 화학테러 취약등급설정 방법론 개선에 대한 연구)

  • Joo, Sun Ho;Kim, Si-Kuk;Hong, Sungchul
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.89-102
    • /
    • 2020
  • Chemical terrorism using toxic and flammable gases, which could be fatal to the health of the human body, poses a serious threat to the security of most advanced countries, as well as those that are suffering from local disputes, due to the asymmetric information that exists between terrorist actors and victims. The countermeasures against chemical terrorism can be roughly divided into three stages: prevention, response, and probation. The critical factors for each professional response agency, and the personnel that determine the degree and range of chemical terrorism damage, are performing missions successfully in the process of the prevention and the response stage against chemical terrorism. To do this, conducting objective and systematical assessments on facilities that could potentially be the subject of chemical terrorism is more important than anything. In this study, we compared the existing domestic and foreign vulnerable classification systems for chemical terrorism, reviewed the current direction of improvement in domestic classification systems, and suggested more scientific and systematic methodologies through the vulnerability assessment on an actual public facility sample.

Review of Qualitative Approaches for the Construction Industry: Designing a Risk Management Toolbox

  • Zalk, David M.;Spee, Ton;Gillen, Matt;Lentz, Thomas J.;Garrod, Andrew;Evans, Paul;Swuste, Paul
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.105-121
    • /
    • 2011
  • Objectives: This paper presents the framework and protocol design for a construction industry risk management toolbox. The construction industry needs a comprehensive, systematic approach to assess and control occupational risks. These risks span several professional health and safety disciplines, emphasized by multiple international occupational research agenda projects including: falls, electrocution, noise, silica, welding fumes, and musculoskeletal disorders. Yet, the International Social Security Association says, "whereas progress has been made in safety and health, the construction industry is still a high risk sector." Methods: Small- and medium-sized enterprises (SMEs) employ about 80% of the world's construction workers. In recent years a strategy for qualitative occupational risk management, known as Control Banding (CB) has gained international attention as a simplified approach for reducing work-related risks. CB groups hazards into stratified risk 'bands', identifying commensurate controls to reduce the level of risk and promote worker health and safety. We review these qualitative solutions-based approaches and identify strengths and weaknesses toward designing a simplified CB 'toolbox' approach for use by SMEs in construction trades. Results: This toolbox design proposal includes international input on multidisciplinary approaches for performing a qualitative risk assessment determining a risk 'band' for a given project. Risk bands are used to identify the appropriate level of training to oversee construction work, leading to commensurate and appropriate control methods to perform the work safely. Conclusion: The Construction Toolbox presents a review-generated format to harness multiple solutions-based national programs and publications for controlling construction-related risks with simplified approaches across the occupational safety, health and hygiene professions.

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.

Male inmates, correctional officers, gender stereotypes and male inmates' stress (남성수용자, 여성교정공무원에 대한 성적 고정관념적 인식, 그리고 그 영향의 검증연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.37-63
    • /
    • 2015
  • The purpose of this study explores the relationship between male inmates' gender stereotypes for female correctional officers and its impact on their stress level while they are doing their time in prisons. To fulfill the purpose of this study, this study uses a set of survey data of 216 male inmates collected from prisons nationwide. The data contains information regarding male inmates' perceptions towards male and female correctional officers as well as their stress level in prisons. The findings of this study suggest that male inmates have low level of gender stereotype against female correctional officers. Further, this study found that none of male inmates' gender perceptions toward female officers has impact on the inmates' reported stress. Rather, perceptions toward the entire correctional officers, which include both gender officers, have influence on the inmates's stress during incarceration. This finding suggests that male inmates consider female officers as a part of professional correctional organization without specific gender stereotype or perceptions toward female officers. It indicates that the concerns regarding the relationship between male inmates and female officers may be a mere myth rather than a serious issues that need to be considered as a barrier for expand female officers carrier opportunity in the corrections systems. Finally, Implications for the research findings for preventing suicide attacks are discussed.

  • PDF

The Reserch on Actual Condition of Crime of Arson Which Occurs in Korea and Its Countermeasures (방화범죄의 실태와 그 대책 - 관심도와 동기의 다양화에 대한 대응 -)

  • Choi, Jong-Tae
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.371-408
    • /
    • 1997
  • This article is the reserch on actual condition of crime of arson which occurs in Korea and its countermeasures. The the presented problem in this article are that (1) we have generally very low rate concern about the crime of arson contrary to realistic problems of rapid increase of crime of arson (2) as such criminal motives became so diverse as to the economic or criminal purpose unlike characteristic and mental deficiency of old days, and to countermeasure these problems effectively it presentation the necessity of systemantic research. Based on analysis of reality of arson, the tendency of this arson in Korea in the ratio of increase is said to be higher than those in violence crime or general fire rate. and further its rate is far more greater than those of the U.S.A. and Japan. Arson is considered to be a method of using fire as crime and in case of presently residence to be the abject, it is a public offense crime which aqccompany fatality in human life. This is the well It now fact to all of us. And further in order to presentation to the crime of arson, strictness of criminal law (criminal law No, 164 and 169, and fire protection law No. 110 and 111) and classification of arsonist as felony are institutionary reinforced to punish with certainty of possibility, Therefore, as tendency of arson has been increased compared to other nations, it is necessary to supplement strategical policy to bring out overall concerns of the seriousness of risk and damage of arson, which have been resulted from the lack of understanding. In characteristics analysis of crime of arson, (1) It is now reveald that, in the past such crime rate appeared far more within the boundary of town or city areas in the past, presently increased rate of arsons in rural areas are far more than in the town or small city areas, thereby showing characteristics of crime of arson extending nation wide. (2) general timetable of arson shows that night more than day time rate, and reveald that is trait behavior in secrecy.(3) arsonists are usually arrested at site or by victim or report of third person(82,9%).Investigation activities or self surrenders rate only 11.2%. The time span of arrest is normally the same day of arson and at times it takes more than one year to arrest. This reveals its necessity to prepare for long period of time for arrest, (4) age rate of arson is in their thirties mostly as compared to homicide, robbery and adultery, and considerable numbers of arsons are in old age of over fifties. It reveals age rate is increased (5) Over half of the arsonists are below the junior high school (6) the rate of convicts by thier records is based on first offenders primarily and secondly more than 4 time convicts. This apparently shows necessity of effective correctional education policy for their social assimilation together with re-investigation of human education at the primary and secondary education system in thier life. The examples of motivation for arosnits, such as personal animosity, fury, monetary swindle, luscious purpose and other aims of destroying of proof, and other social resistance, violence including ways of threatening, beside the motives of individual defects, are diverse and arsonic suicide and specifically suicidal accompany together keenly manifested. When we take this fact with the criminal theory, it really reveals arsons of crime are increasing and its casualities are serious and a point as a way of suicide is the anomie theory of Durkheim and comensurate with the theory of that of Merton, Specifically in the arson of industrial complex, it is revealed that one with revolutionary motive or revolting motive would do the arsonic act. For the policy of prevention of arsons, professional research work in organizational cooperation for preventive activities is conducted in municipal or city wise functions in the name of Parson Taskforces and beside a variety of research institutes in federal government have been operating effectively to countermeasure in many fields of research. Franch and Sweden beside the U.S. set up a overall operation of fire prevention research funtions and have obtained very successful result. Japan also put their research likewise for countermeasure. In this research as a way of preventive fire policy, first, it is necessary to accomodate the legal preventitive activities for fire prevention in judicial side and as an administrative side, (1) precise statistic management of crime of arson (2) establishment of professional research functions or a corporate (3) improvement of system for cooperative structural team for investigation of fires and menpower organization of professional members. Secondly, social mentality in individual prospect, recognition of fires by arson and youth education of such effect, educational program for development and practical promotion. Thirdly, in view of environmental side, the ways of actual performance by programming with the establishment of cooperative advancement in local social function elements with administrative office, habitants, school facilities and newspapers measures (2) establishment of personal protection where weak menpowers are displayed in special fire prevention measures. These measures are presented for prevention of crime of arson. The control of crime and prevention shall be prepared as a means of self defence by the principle of self responsibility Specifically arsonists usually aims at the comparatively weak control of fire prevention is prevalent and it is therefore necessary to prepare individual facilities with their spontaneous management of fire prevention instead of public municipal funtures of local geverment. As Clifford L. Karchmer asserted instead of concerns about who would commit arson, what portion of area would be the target of the arson. It is effective to minister spontaveously the fire prevention measure in his facility with the consideration of characteristics of arson. On the other hand, it is necessary for the concerned personnel of local goverment and groups to distribute to the local society in timely manner for new information about the fire prevention, thus contribute to effective result of fire prevention result. In consideration of these factors, it is inevitable to never let coincide with the phemonemon of arsons in similar or mimic features as recognized that these could prevail just an epedemic as a strong imitational attitude. In processing of policy to encounter these problems, it is necessary to place priority of city policy to enhancement of overall concerns toward the definitive essense of crime of arson.

  • PDF

A Study on the Correlation between the Investigation on the Violation Crime of Intellectual Property Rights and the Goods Inspection in Customs Law (관세법상 지식재산권 침해사범 수사와 물품검사와의 상호관계)

  • Ye, Sangkyun
    • International Commerce and Information Review
    • /
    • v.19 no.3
    • /
    • pp.197-214
    • /
    • 2017
  • It requires professional knowledge and much time to judge intellectual property rights infringement. The duties of customs administration are the balance between the propositon of trade facilitation through rapid clearance and the thesis of social security through exact examination. There is a view that the criminal procedure law control is necessary to the goods inspection of clearnce procedure if it is related to crimianl investigation. However, it seems that the customs law does not consider the goods inspection investigation as the investigation under judicial control, but only the mere administrative investigation. It can be said that the inspection of goods by customs law functioning as a clue of investigation is confined to the ordinary goods inspection, including the screening test. Searching for specific articles by specific informaition should be under the control of criminal procedure law because it constitutes the commencement of criminal investigation in criminal cases. This interpretation could be an opportunity as a harmonious operation between the goods inspection of customs clearance and the search and seizure of criminal procedure.

  • PDF

Presidential Archives Management in Crisis - An Archival Approach to the Solutions - (위기에 처한 대통령기록물관리, 문제의 인식과 해결을 위한 접근 방식)

  • Lee, Sang-Min
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.281-315
    • /
    • 2008
  • This paper reviews recent records issues surrounding former president Roh Moo-Hyun's private possession of the copies of the presidential records in Korea. While the former president transferred his records to the National Archives of Korea, he copied his electronic presidential records and kept them in his house after the term. His retention of the "records copies" arouse critical records issues and criminal charges. In this paper, I examined the definition of presidential records and legal status of records copies, authenticity of electronic copies of public records in public and private records systems, nature and scope of presidential privilege of access to his records, and most importantly, political neutrality of national archives. I examined these issues comparing with foreign experience, especially that of the United States which has the Presidential Records Act like Korea. All issues are examined in the professional spirit of archives principles and archives ethics. Legal status of the electronic copies of presidential records is not firmly established and the criminal charge seems groundless. However, it is against public archives principles and ethics that private former president privately possesses and manages private information and national security information held in the electronic copies of the presidential records. Presidential Records Act of Korea provides an effective tool to protect the presidential records for 15 years and it should be respected. It is time to consolidate the public records management institutions in Korea, not to disintegrate them.