• Title/Summary/Keyword: Information Security Stress

Search Result 72, Processing Time 0.038 seconds

The Influence of Abusive Supervision on Willingness to Comply with the Security Policy: the Moderation of Organizational Justice (비인격적 감독이 종업원의 보안준수의식에 미치는 영향: 조직공정성과의 상호작용)

  • Kim, Youngsoo;Choi, Youngkeun;Yoo, Taejong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1243-1250
    • /
    • 2016
  • The purpose of this study is to investigate how abusive supervision influences on security policy compliance in their work place and find moderation effects of organizational justice. The results is that abusive supervision decreases employees' affective commitment or social bond to their organizations. And it negatively affect employees' behavioral intent to comply with security policies. Organizational justice acts to attenuate the negative relationship between the stress from abusive supervision and willingness to comply with the security policy. Especially, distributive justice has a significant effect on decreasing the negative relationship.

The Influence of Information Security Related Work Stress on Information Security Policy Resistance through Job Burnout (정보보안 관련 업무 스트레스가 직무 소진을 통해 정보보안 정책 저항에 미치는 영향)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.427-436
    • /
    • 2024
  • Recently, the importance of information security (IS) has been socially recognized, leading organizations to adopt IS policies, secure specialized personnel, and demand IS compliance from employees. However, the implementation of these policies can disrupt existing work processes, causing resistance among employees. This study aims to elucidate the mechanism linking work stress, caused by IS policies that do not consider the work system, to individual job burnout and IS policy resistance. We established a research model and hypotheses based on previous studies and utilized structural equation modeling with data collected from organization members of companies that have implemented IS policies. The results of the structural equation modeling confirmed that work ambiguity and work impediment are linked to IS policy resistance through job burnout, characterized by emotional exhaustion and disengagement. Our findings suggest that the swift implementation of IS policies can provoke a backlash from employees, with stress being the primary cause. This paradoxically indicates the need for the development of organization-specific IS policies.

The Study about the Effect on Self-effectiveness of a Course Decision of Duty Stress in the College Students Related to Guard Major Study - Centering Around Gwang-ju and Jeonnam Region - (경호관련 전공 대학생들의 취업스트레스와 진로결정 자기 효능감에 관한 연구)

  • Kim, Pyong-Soo;Kim, Kong;Seo, Seok-Yun;Kim, Yeong-Nam
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.47-71
    • /
    • 2012
  • This study is to analyse the effect on self-effectiveness of a course decision of duty stress in the college students related to guard major study. For this, the college students related to guard major study in Gwang-ju and Jeonnam region were selected as a universe at April 2011. And a sampling was practiced as a random sample. A question investigation was used in a entry method of self-estimation. Furthermore a total of 171 person(85.5%) was used as final analysis data. The collected data were employed in a statistics program of SPSS for win version 17.0. And used in a way of Pearson's interrelation analysis and Multiple Regression Analysis. The conclusion was as follows. Firstly, family surroundings stress and studies stress of duty stress affected beneficially statistically a goal selection of self-effectiveness of course decision. Family surroundings influenced upon it positively. And studies effected on it negatively. Secondly, all factors of duty stress didn't affect beneficially statistically the work information of self-effectiveness of course decision. Thirdly, school surroundings stress of duty stress influenced upon positively statistically the problem solution of self-effectiveness of course decision. Fourthly, personality stress and duty anxiety stress affected beneficially statistically the future plan of self-effectiveness of course decision. Personality influenced upon it negatively and duty anxiety affected it positively.

  • PDF

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

Mutual Surveillance based Cheating Detection Method in Online Games (상호 감시 기반의 온라인 게임 치팅 탐지 방법)

  • Kim, Jung-Hwan;Lee, Sangjin
    • Journal of Korea Game Society
    • /
    • v.16 no.1
    • /
    • pp.83-92
    • /
    • 2016
  • An online game is a huge distributed system comprised of servers and untrusted clients. In such circumstances, cheaters may employ abnormal behaviors through client modification or network packet tampering. Client-side detection methods have the merit of distributing the burden to clients but can easily be breached. In the other hand, server-side detection methods are trustworthy but consume tremendous amount of resources. Therefore, this paper proposes a security reinforcement method which involves both the client and the server. This method is expected to provide meaningful security fortification while minimizing server-side stress.

A Study on Critical Success Factors for Implementing Governance of Personal Information Protection (개인정보보호 거버넌스의 효과적인 구현을 위한 핵심성공요인에 관한 연구)

  • Kim, Jung-Duk;Hwang, Soo-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.197-203
    • /
    • 2011
  • Personal information protection need to be addressed in terms of enterprise-wide and business issues, not just an information processing issue. Therefore, governance of personal information protection, which stress the importance of top management's roles aud responsibilities for personal information protection, has been noticed as an important agenda to resolve. The paper defines the concept of personal information protection governance and proposes the severn critical success factors (CSFs) for implementing the governance scheme. The proposed CSFs are tested in terms of feasibility and materiality by using the focus group interviews.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

The Influence on the Information Security Stressor on Information Security Compliance Intention : Focusing on the Moderation of Authentic Leadership (정보보안 스트레서가 정보보안 준수 의도에 미치는 영향: 진성 리더십의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1101-1112
    • /
    • 2021
  • Organizations continue to increase investment in information security(IS) policies and technologies to prevent external intrusion and internal exposure to information assets. However, as the organization's regulations and behavioral requirements for strict IS policy increase, employees may induce negative behaviors through IS-related stress. The purpose of this study is to suggest the effects of challenge and hindrance stressors on IS compliance intentions and to confirm how authentic leadership moderates the positive and negative effects of stressors. We reflected employees of the organization who are applying IS policy to their work as a study target and applied a survey to obtain a sample for research hypothesis verification. As a result of analysis through structural equation modeling, challenge and hindrance stressors affected IS compliance intentions, and authentic leadership moderated the effects of stressors on compliance intention. Our research helps to establish insiders support strategies to achieve internal IS goals, because the results suggested stressor conditions and leaders' behavioral directions that influence employees IS compliance behavior.

Reinforcement of IS Voice Behavior within the Organization: A Perspective on Mitigating Role Stress Through Organization Justice and Individual Social-identity (조직 내부의 정보보안 제언 행동 강화: 조직 공정성과 개인의 사회적 정체성을 통한 업무 스트레스 감소 관점)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.649-662
    • /
    • 2022
  • As information security(IS) is recognized as an organization's core value, organizations are making efforts to adopt strict IS policies and technologies. However, strict IS policies can cause negative behavior for employees of organizations who need to apply IS to their work. This study confirms that IS can express the role stress of employees, and suggests a way to mitigate the IS role stress. Specifically, we confirm that organization justice and individual social identity can reduce IS role stress, which reduces IS voice behavior. In the study, we surveyed workers of organizations that applied IS policies to their work and obtained 318 samples. Also, we tested the hypothesis by applying the structural equation model. As a result, IS organization justice increased IS voice behavior through social identity and partially reduced IS voice behavior by mitigating IS role stress. In addition, social identity moderated the relationship between IS role stress and IS voice behavior. This study suggests strategies for achieving internal IS goals by suggesting conditions for mitigating IS role stress from an organizational and individual perspective.