• Title/Summary/Keyword: Information Security Strategic

Search Result 146, Processing Time 0.025 seconds

Theoretical Foundations of Management of the Education System: Optimization of the Complex of Organizational and Pedagogical Conditions for Effective Management

  • Yuryk, Olha;Sitsinskiy, Nazariy;Zaika, Liudmyla;Рshenychna, Lіubov;Boiko, Svitlana;Filipovych, Myroslava
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.168-174
    • /
    • 2022
  • The article defines the organizational conditions for effective management, the actions of the team to implement the concept of marketing management using the tools of pedagogical and strategic management. Due to this, results are achieved - indicators, since in our study they will be indicators of managerial efficiency: improving the "organization" function through the construction of new organizational structures; improving the functions of "analytical activity and planning" through enriching managerial work with economic and gnostic methods, analytical activities with the mandatory inclusion of financial activities, introspection of all participants, widespread use of licensed automated systems; synthesis of educational, economic, social results.

Advanced Business Process Management with Digital Innovations (Review)

  • Masood Ahmed Khalid;Muhammad Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.121-126
    • /
    • 2023
  • Many organizations are looking for digital innovation to apply in business process management and this information revolution leaves its effect on the businesses and anticipate competitors. In this article, investigates the strength of the relationship between business process management (BMP) and Digital Innovations (DI) since it has been underdeveloped. The results and findings are extracted from international survey with explanations of expert panel to generalized a positive and moderate link of multiple factors that are affecting the strategic decision-making in business process management. It is extended to the Technology Organization Environment (TOE) framework and contour organizations along their Digital Process Innovation (DPI).

Introduction of Security Certification System for Shared Growth and Co-prosperity of Small and Medium Businesses (대·중소기업 동반성장과 상생을 위한 중소 협력업체의 보안인증 제도 도입 방안)

  • Shin, Hyungoo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.203-234
    • /
    • 2019
  • The damages from security accidents continue to increase as technology leaks from suppliers cause risks to the management of large companies, which are their customers, and their image and reliability to fall. However, the current industrial structure is practically impossible for large companies to form their own businesses and strategic alliances with business partners are essential, but it is changing into an industrial structure where the exchange of information is increased and the dependence of the information system is maximized, as well as legal demands and demands from stakeholders are increasing due to the complexity of the work process and the strengthening of security-related laws. The status of technology protection of small and medium-sized enterprises shows that they are not equipped with a security system due to relatively poor environment and financial difficulties compared to large enterprises, whereas the industrial structure between large and small business partners is indispensable for sharing the IT system, and the security system of large business, which is a customer company, should be improved by considering the fact that it is impossible to maintain security system between large businesses. Thus, the government intends to examine the system for shared growth of small businesses and the model for evaluating the capabilities of various agencies for information protection, and propose measures to introduce the certification system for small business partners.

The Impacts of Perceived Attributes on Continuance of the Smart Phone App Store (스마트폰 앱스토어에 대한 지각특성이 지속이용에 미치는 영향)

  • Lee, Kook-Yong
    • Korean Management Science Review
    • /
    • v.30 no.3
    • /
    • pp.33-54
    • /
    • 2013
  • The purpose of this study is to examine the relationships between Product Quality (Popularity, Playfulness) and Information Quality (Informativeness, Reliability), System Quality (Ease of Use, Security), Trust and Continuance Intention in Smart Phone Application Market. To identify these affecting relationships, the secondary data or past studies were collected and theoretically arranged. I made the theoretical proposed model to explain the relationships between the constructs, identify the operational definitions and 13 Hypotheses were established, there was executed the survey of 250 customers of Smart Phone Application Market. Using the collected data, previous performances to confirm the construct validity and internal consistency by Cronbach's a was executed and Partial Least Square Analysis to confirm the hypotheses in proposed model was conducted using the Smart-PLS Software. As the result of test that make the relations of used variables clear, we can get the conclusion as followings; First, Product Popularity has the positive effect on Informativeness, except reliability of Information. Second, it was significantly tested the effect on the Ease of use and Security by Product Playfulness. Third, Informativeness and Ease of Use, Security of App Store have the significantly positive effects on the Users' Trust directly. From the empirical test, I suggest the strategic advices in App Store Companies. To increase the Users' Continuance Intention or Loyalty, it would be developed that a variety of methods and ways to raise the Product Popularity and Playfulness, Informativeness, Ease of Use and Security of App Store. It is necessary for sticking the Users to raise the positive trust building and Continuance Intention.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Technology Review on Multimodal Biometric Authentication (다중 생체인식 기반의 인증기술과 과제)

  • Cho, Byungchul;Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.132-141
    • /
    • 2015
  • There might have been weakness in securing user authentication or verification with real time service approach, while existing unimodal biometric authentication has been used mainly for user identification and recognition. Accordingly, it is essential to research and develop ways that upgrade security performance with multi biometric based real time authentication and verification technology. This paper focused to suggest binding assignment and strategy for developing multi biometric authentication technology through investigation of advanced study and patents. Description includes introduction, technology outline, technology trend, patent analysis, and conclusion.

A Comparative Study on the Compliance Program(CP) of Strategic Export Control System between Korea and Japan (전략물자 수출통제 자율준수제도(CP)에 관한 한.일 비교 연구)

  • Shim, Sang-Ryul;Shao, Dan;Joo, E-Wha
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.297-321
    • /
    • 2011
  • Under the UN Security Council Resolution 1540/1810 in 2004 to restrict the proliferation of WMD (weapons of mass destruction) and their means of delivery, many countries have taken great efforts to, control the export of strategic items, thereby preventing the transfer of ABCM (atomic, biological, chemical weapons, missiles) and technologies and goods related to conventional weapons or dual-use items, Compliance Program (CP) in Korea or Internal Compliance Program(ICP) in Japan refers to a company's internal system or rules to comply with the export control laws and regulations, and is to prevent the unintentional illegal export of strategic items. This paper analyzes the Compliance Program (CP) of strategic export control system between Korea and Japan. Both countries have very similar legal frameworks under the guiding principles of multilateral export control regimes. However, there are some differences in actual procedures, classification service, supporting system, export license, sanctions for illegal exporters, etc. Korea should take more active and customer-oriented measures to promote the Compliance Program (CP) into Korean export companies for better awareness and positive attitude, practical information and education, smoothy government-firm communication, closer cooperation between Korea and Japan, etc.

  • PDF

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

Chinese Students' Satisfaction Level with the Korean Internet Shopping Mall Purchase Process and Their Repurchase Intention (한국 인터넷쇼핑몰 구매과정에서의 소비자만족도와 재구매의도: 한국 거주 중국 유학생 소비자 중심으로)

  • Cui, Ming;Ryu, Mi-Hyun;Lee, Seung-Sin
    • Journal of Families and Better Life
    • /
    • v.30 no.4
    • /
    • pp.105-117
    • /
    • 2012
  • This study examined Chinese students' satisfaction level regarding their Korean Internet shopping mall experiences and the measured factors were pre-purchase, purchase, delivery, A/S and security, additionally, evaluate the level of repurchase intention on Chinese students living in South Korea. To accomplish these goals, an online questionnaire survey was conducted between October 1 and 10, 2011. A total of 365 questionnaires were used for the final analysis. The analysis process involved many statistical methods such as frequency, correlation and regression. The results indicate the following finding: First, Chinese students normally visited and purchased from popular Internet shopping malls and the items that they purchased the most frequently were clothing and shoes, makeup, computer and electronics. Second, the Chinese students' satisfaction level regarding their Internet shopping mall experiences was not high. They were especially worried about security matters regarding their personal or financial information. Third, their satisfaction level with the delivery process has the largest influence on their repurchase intention. Also, their gender, the length of time they had lived in Korea, the length of time they spent on Korean Internet shopping mall websites, the amount of frequency of online shopping in Korea, and their satisfaction with their purchase, the delivery process, the A/S process and security affected their repurchase intention in different degrees. The conclusion provides valuable information for devising a strategic direction for improving the foreigners' satisfaction level regarding and repurchase intention on Korean Internet shopping malls.