• Title/Summary/Keyword: Information Security Strategic

Search Result 142, Processing Time 0.029 seconds

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

China's Maritime Strategy (중국의 해양전략)

  • Lee, Won-Bong
    • The Journal of Information Technology
    • /
    • v.12 no.1
    • /
    • pp.35-56
    • /
    • 2009
  • After Chinese reforms and market opening, China actively started working on ways to attach importance to the ocean and it's maritime strategy has been developed and carried out by external and internal factors. We can take two things as external factors attributed to China's marine strategy. The first one is maritime environment change in the East Asian region and the second one is the strategic importance of Taiwanese Straits and the South China Sea. And we can take about national strategy, security strategy, and change of foreign policy as internal factors. China recognizes the ocean as a major step to achieve a goal of national development. The main goal of China's marine strategy in the 21st century is to secure marine transportation and marine resources and to make peaceful maritime environment in the ocean to keep up with their economic development by opening itself to the world. China has strengthened their defense abilities to act against threat of national security by modernizing sea forces and increased national power by building up the marine power. It is expected that China will continue to seek more aggressive maritime strategy on matters of national security as well as pour heir efforts into making economic development and obtaining energy resources. This will also be one factor making new dynamics between countries in and around the East Asian region.

  • PDF

The Influence on the Information Security Techno-stress on Security Policy Resistance Through Strain: Focusing on the Moderation of Task Technology Fit (정보보안 기술스트레스가 스트레인을 통한 보안정책 저항에 미치는 영향: 업무기술 적합성의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.931-940
    • /
    • 2021
  • As information security(IS) is recognized as a critical success factor for organizational growth, organizations are increasing their investment in adopting and operating strict IS policies and technologies. However, when strict IS technology is adopted, IS-related techno-stress may occur in the employees who apply IS technology to their tasks. This study proposes the effect of IS-related techno-stress formed in individuals on IS policy resistance through IS strain and proves that task-technology fit mitigates the negative effect of techno-stress. Research models and hypotheses were presented through previous studies, and the secured samples were used, and structural equation modeling was applied to verify hypothesis. As a result of the study, it was confirmed that IS-related techno-stress (overload, complexity) affected IS policy resistance through IS strain (anxiety, fatigue), and that task-technology fit moderated the relationship between techno-stress and strain. This study suggests a strategic direction for improving the level of internal IS from the viewpoint of suggesting ways to mitigate the stress of employees that may occur when IS policies and technologies are adopted.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

A Compromise-Resilient Tunneled Packet Filtering Method in Wireless Sensor Networks (무선 센서 네트워크에서 훼손 감내하는 터널된 패킷 여과 기법)

  • Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2008
  • In wireless sensor networks, an adversary can launch the wormhole attacks, where a malicious node captures packets at one location and tunnels them to a colluding node, which retransmits them locally. The wormhole attacks are very dangerous against routing protocols since she might launch these attacks during neighbor discovery phase. A strategic placement of a wormhole can result in a significant breakdown in communication across the network. This paper presents a compromise-resilient tunneled packet filtering method for sensor networks. The proposed method can detect a tunneled message with hop count alteration by a comparison between the hop count of the message and one of the encrypted hop counts attached in the message. Since the proposed method limits the amount of security information assigned to each node, the impact of wormhole attacks using compromised nodes can be reduced.

  • PDF

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Identifying Barriers to Big Data Analytics: Design-Reality Gap Analysis in Saudi Higher Education

  • AlMobark, Bandar Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.261-266
    • /
    • 2021
  • The spread of cloud computing, digital computing, and the popular social media platforms have led to increased growth of data. That growth of data results in what is known as big data (BD), which seen as one of the most strategic resources. The analysis of these BD has allowed generating value from massive raw data that helps in making effective decisions and providing quality of service. With Vision 2030, Saudi Arabia seeks to invest in BD technologies, but many challenges and barriers have led to delays in adopting BD. This research paper aims to search in the state of Big Data Analytics (BDA) in Saudi higher education sector, identify the barriers by reviewing the literature, and then to apply the design-reality gap model to assess these barriers that prevent effective use of big data and highlights priority areas for action to accelerate the application of BD to comply with Vision 2030.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

Theoretical Foundations of Management of the Education System: Optimization of the Complex of Organizational and Pedagogical Conditions for Effective Management

  • Yuryk, Olha;Sitsinskiy, Nazariy;Zaika, Liudmyla;Рshenychna, Lіubov;Boiko, Svitlana;Filipovych, Myroslava
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.168-174
    • /
    • 2022
  • The article defines the organizational conditions for effective management, the actions of the team to implement the concept of marketing management using the tools of pedagogical and strategic management. Due to this, results are achieved - indicators, since in our study they will be indicators of managerial efficiency: improving the "organization" function through the construction of new organizational structures; improving the functions of "analytical activity and planning" through enriching managerial work with economic and gnostic methods, analytical activities with the mandatory inclusion of financial activities, introspection of all participants, widespread use of licensed automated systems; synthesis of educational, economic, social results.

Advanced Business Process Management with Digital Innovations (Review)

  • Masood Ahmed Khalid;Muhammad Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.121-126
    • /
    • 2023
  • Many organizations are looking for digital innovation to apply in business process management and this information revolution leaves its effect on the businesses and anticipate competitors. In this article, investigates the strength of the relationship between business process management (BMP) and Digital Innovations (DI) since it has been underdeveloped. The results and findings are extracted from international survey with explanations of expert panel to generalized a positive and moderate link of multiple factors that are affecting the strategic decision-making in business process management. It is extended to the Technology Organization Environment (TOE) framework and contour organizations along their Digital Process Innovation (DPI).