• Title/Summary/Keyword: Information Security Strategic

Search Result 142, Processing Time 0.021 seconds

A Study on the Improvement of Competitiveness and International Export Control System of Strategic Items (전략물자의 국제 수출통제와 경쟁력 제고방안에 관한 연구 - 자율준수체제를 중심으로 -)

  • Kim, Hyun-Jee
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.349-371
    • /
    • 2008
  • Export controls on strategic items has been an international standard of trade. We should understand the global trend of this and perform clean policies in the international community. This article examines the Improvement of Competitiveness and International Export Control System of Strategic Items for focusing to Internal Compliance Program(ICP). Therefore, this study would like to suggest for build to ICP. Each member of company have to convert their perception for controling strategic items. Also, they have to build controling system in ERP system and extend Incentive for CPs. the support to the trustworthy controling system. Korea is actively trying to control strategic items export for world peace and national security. So the related enterprise needs to manage voluntary export system.

  • PDF

A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level (조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로)

  • Park, Jeong Kuk;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

Analysis of Components Endangering Information Protection in CALS/EC (전자상거래상에서의 정보보호 위협요소 분석에 관한 연구)

  • Kang Suck-Joo;Kim Chang-Tae
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.1-28
    • /
    • 2000
  • CALS(Commerce At Light Speed)/EC(Electronic Commerce) is drawing considerable interest as strategic part of efforts for computerization of the government and companies and for industry-wide innovation, using Internet and information superhighway that is widely expanding world-wide with the development of computers and information communication technology. In the current industry infrastructure, standardization is difficult but very important among the parties that want to share the added value, as external environmental components increase since the advent of computers. However, information security technology is not permitted to be exported in light of national interest or high amount of royalty should be paid. Moreover, if we cannot fully analyze the international standard and imported technology in order to verify the safety of using them, domestic information can be exposed according to the desire of the country exporting the technology. In particular, information security technology should be developed by ourselves, considering technology Protection and export Prevention Policies of foreign countries. Therefore, this paper presents information security technology and standardization trends for several application fields regarding CALS/EC implementation in our and foreign countries. This paper also analyzes such trends and proposes strategic direction for standardization suited for domestic environment.

  • PDF

A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index (네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.83-91
    • /
    • 2007
  • Information security is a critical issue for network centric warfare(NCW). This paper provides a information security governance index for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military organization's planners determine the degree to which they have implemented an information systems governance framework at the strategic and tactical level within their organization.

  • PDF

Modelling of Public Financial Security and Budget Policy Effects

  • Zaichko, Iryna;Vysotska, Maryna;Miakyshevska, Olena;Kosmidailo, Inna;Osadchuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.239-246
    • /
    • 2021
  • This article substantiates the scientific provisions for modelling the level of Ukraine's public financial security taking into account the impact of budget policy, in the process of which identified indicators of budget policy that significantly affect the public financial security and the factors of budget policy based on regression analysis do not interact closely with each other. A seven-factor regression equation is constructed, which is statistically significant, reliable, economically logical, and devoid of autocorrelation. The objective function of maximizing the level of public financial security is constructed and strategic guidelines of budget policy in the context of Ukraine's public financial security are developed, in particular: optimization of the structure of budget revenues through the expansion of the resource base; reduction of the budget deficit while ensuring faster growth rates of state and local budget revenues compared to their expenditures; optimization of debt serviced from the budget through raising funds from the sale of domestic government bonds, mainly on a long-term basis; minimization of budgetary risks and existing threats to the public financial security by ensuring long-term stability of budgets etc.

A Participation Scheme of the Central Region Research Institute related to National Defense Information Security Industry (국방정보보호산업 관련 중부권 연구기관 활용방안)

  • Eom, Jung-Ho
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.191-206
    • /
    • 2011
  • This study is presented a scheme that information security research institutions located within the central area can be participated actively m national defense information security industry. The many of information security company are located in the central region(Daejeon) and there are many research institutes. However, the participation rate of the Defense Information Security Industry is not high compared to other provinces. Although a variety of reasons, there are no the Defense Privacy Office that could have a role in protocol and the information about the industry. In addition, the Department of Defense related to national defense information security industry have not information about research institutions in the central region and are not well to identify the characteristics of institutional technology and research. So in this paper we presented some of the alternatives. 1) Building Pool involved in information security research according to the characteristics of each agency 2) Constitute the research community between Research institutions and the company 3) Build the technology cooperation between research institutions and the defense research institutes 4) Utilization of industry/university/research institutes related to Information Security Industry 5) Make strategic alliances among research institutes based on technical expertise.

  • PDF

Contemporary Management of University's Strategic Development: the Case Study on Ukrainian Universities

  • Kovtun, Olena;Lutsiak, Vitalii;Ostapchuk, Anatolii;Lavinska, Daria;Sieriebriak, Kseniia;Kononenko, Anna;Bebko, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.269-279
    • /
    • 2021
  • In the current conditions of world socio-economic development, the strategic support of the process of managing the development of universities has become a particularly important area. Strategic management requires reliable information and analytical support in the form of sound descriptions of strategic directions of development, assumptions, and forecasts. The purpose of the study is to substantiate and elaborate the crucial causes in the strategic management of university's development and to suggest the coherent prospects for advancements. The data analysis was performed using descriptive methods to identify the most significant causes that affect the university's strategic development; the expert assessment was used to rank the factors, ultimately to assess each factor that affects to some extent the university's strategic development; the abstract-logical method was used to ground the positive impact of computer technologies and e-learning on the strategic development of a university and to formulate proposals for its further progress. The main results provided in the given paper showed that significant and most important strategic cause of university's development lies in the field of improving the quality of education, expanding access to educational services based on computer technology and its functionality. In turn, its widespread use at all stages of the educational process allows providing a number of advancements for universities in strategic prospects.

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.