• Title/Summary/Keyword: Information Systems Policy

Search Result 1,889, Processing Time 0.03 seconds

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

Analysis of the Impact of Changesin Local Currency Policy on Consumption Activation: Focusing on the case of 'Dong Baek Jeon'in Busan (지역화폐 정책 변화가 소비 활성화에 미치는 영향 분석: 부산시 '동백전' 사례를 중심으로)

  • Ha, Hee Ra;Choi, Jae Seo;Kim, Jung Hwan
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.117-132
    • /
    • 2023
  • Purpose The purpose of this study is to analyze the impact of policy changes in Busan's local currency, Dong Baek Jeon, on the use of Dong Baek Jeon. In particular, this study tried to investigate consumption changes due to changes in local currency policy depending on the region, industry, and consumer characteristics. Design/methodology/approach This study used the transaction data of Dong Baek Jeon franchise for analysis. Specifically, the data from January 2022 to December 2022 were used to analyze the current status of the use of Dong Baek Jeon and changes in consumption before and after policy changes. Findings As a result of the analysis, the consumption of Dong Baek Jeon tended to be concentrated in specific regions, industries, and ages. In most regions and ages, the top consumption industries were similar. The use of Dong Baek Jeon showed a clear change in the pattern of use depending on policy changes. Specifically, when the benefits were revised downward, the use of Dong Baek Jeon decreased, and when it was revised upward, it increased. Depending on the policy change, the rate of increase and decrease by region and consumer characteristics was relatively similar, but it was confirmed that there was a difference in the rate of increase and decrease depending on the industry.

Research Trends in Information Security Economics : Focused on Information Systems Journals (보안경제성 연구동향 분석 : IS 저널 중심으로)

  • Kang, Mi-Hwa;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.79-96
    • /
    • 2016
  • As numerous security breaches on a variety of information assets such as personal information, corporate secrets, computer servers, and networks have occurred, information security has emerged as a critical social issue. However, researches on economically rational information security decision-making have been few. Such researches are especially rare in South Korea where information security is considered to be a discipline of engineers. This study aims to identify the preferred themes and methodologies of information security economics research in the field of information systems by reviewing papers published in Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), European Journal of Information Systems (EJIS), Management Science (MS), and Information and Management (I&M). We hope that the results of the study will be helpful in rational managerial or policy decision-making for practitioners and suggest future research topics for researchers.

A Thought on the Dynamic Mechanism of Coevolution between IT and Society and Its Policy Implications (정보기술과 사회 공진화의 동태적 메커니즘과 정책적 함의)

  • Kim, Sang-Wook;KIm, Sook-Hee
    • Korean System Dynamics Review
    • /
    • v.7 no.2
    • /
    • pp.5-20
    • /
    • 2006
  • In the advent of ubiquitous information technology (u-IT) as a new emerging horizon of information society, inflated expectations regarding u-IT are growing very fast and higher than those made in the past, which would perhaps result in serious bust after boom and incur tremendous amount of social costs. This paper thus investigates a dynamic mechanism underlying the coevolution between information technology and society by applying systems thinking, particularly, with a focus on the typical phenomenon, 'hype curve' which shows how new technologies initially grow too fast for their own good, crashing from a peak of inflated expectations into a trough of disillusionment before stabilizing on a plateau of productivity. Three basic questions are explored to answer by investigating the mechanisms underlying the 'boom-bust' phenomenon: First, why hype curve appears in the process of technology and society coevolution. Second, how to enhance the stabilization level. Third, when is the right time for the policy intervention.

  • PDF

The COAPI Cats: The Current State of Open Access Repository Movement and Policy Documentations

  • Roy, Bijan K.;Biswas, Subal C.;Mukhopadhyay, Parthasarathi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.6 no.1
    • /
    • pp.69-84
    • /
    • 2016
  • The paper investigates open access (OA) self archiving policies of different Open Access Repositories (OARs) of COAPI (Coalition of Open Access Policy Institutions) founder members as reported in June 2011 (i.e. a total of 22 members against a total of 46 COPAI members as reported by Open Biomed (http://openbiomed.info/2011/08/coapi-cats/). The paper consulted three databases (OpenDOAR, ROAR and ROARMAP) in order to evaluate twenty-two (22) COAPI-members OARs self archiving policy documentations and highlights of some progress on issues so far. After analyzing policy documentations, key findings have been highlighted and common practices have been suggested in line with global recommendations and best practice guidelines at national and international levels for strengthening national research systems. The paper has implications for administrators, funding agencies, policy makers and professional librarians in devising institute specific self archiving policies for their own organization.

Investigating the Characteristics of Policy Information Resources for Activating Policy Information Services (정책정보서비스 활성화를 위한 정책정보 자료원의 특성 연구)

  • Lee, Myeong-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.33-55
    • /
    • 2019
  • Knowledge information resources produced by policy research institutes were categorized into knowledge information resources derived from research processes, knowledge information resources derived from research results, and knowledge information resources processed from research results, respectively. The names of these knowledge information resources and the metadata items were investigated on 13 policy research institute websites. In addition, the study examined the provision status of 8 Knowledge information resources specialized by type on the websites and confirmed that they work as knowledge resource management systems for each corresponding area. The results of the study suggest constructing a collective search system for research results based on the same research topics, developing a knowledge map of policy information, compressing reports for policy makers, building subject expert databases, producing video reports, developing metadata standards, and creating statistical databases and indicators by subject areas.

Critical Success Factors of RTE Based on Policy Leverage of System Dynamics (시스템 다이내믹스의 정책지렛대를 활용한 RTE 핵심성공요인 도출에 관한 연구)

  • Jung, Jae-Un;Kim, Hyun-Soo;Choi, Hyung-Rim;Hong, Soon-Goo
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.177-194
    • /
    • 2007
  • This study is intended to identify critical success factors(CSF) of real-time enterprises(RTE) by using a policy leverage method of system dynamics. Since RTE is a new theoretical system that unifies existing theories or concepts in business management and information technology, it is not proper to employee a traditional statistical method. To obtain our research goal, causal maps of system dynamics are employed to abstract and arrange RTE information from previous studies. By using the commonness of policy leverage and critical success factors, CSFs for the RTE are deduced by substituting the leverage points on causal maps with necessary success factors to solve the problems. Since this is a new approach to identify success factors. it has some restrictions. Unlike the statistical methods, this approach explains only the directions of causalities and correlations. For the future research, a simulation tool of system dynamics can be employed to discover how each CSF is correlated to the successful implementation of RTE.

  • PDF

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.

The Ecosystem of the Smartphone Industry in Korea: Perspectives on Its Sustainable Growth (지속적 성장 관점에서 본 한국 스마트폰 산업 생태계)

  • Park, Jinsoo;Choi, Youngseok
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.25-43
    • /
    • 2013
  • The Korean Smartphone industry has advanced rapidly. There seems to have a considerable change in Korea smartphone industry as the security policy related to wireless devices is changed from Whitelist Policy to Blacklist Policy. In regard to such a change, this paper analyzes the smartphone market in terms of the Business Ecosystem Model suggested by Moore. This study examines how Korean Smartphone Ecosystem has been formed and how any shifts in policy will have an effect on the ecosystem. In line with this policy shift, this study also suggests the ways how these ecosystem members should establish a strategy for the continuous development of this smartphone ecosystem. Furthermore, this study presents cooperation directions among ecosystem members based on the organic connections in the ecosystem as well as each individual's corresponding measures. In addition, based on this analysis, this study puts forward Korean smartphone ecosystem's current problems, improvement, and its future.

  • PDF

Study on factors influencing adoption of information security policies (정보보호정책 도입에 영향을 미치는 요인에 관한 연구)

  • Han Yeong-Gu;Choe Myeong-Gil;Kim Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.636-639
    • /
    • 2004
  • Information security keeps enterprises information from the unintended disclose, modification and destruction and plays important roles especially in enterprise owing Internet based information systems. This study recognizes the importance of information security policy, analyzes factors influencing adoption of information security policy, and provides the factors for enterprises utilize them.

  • PDF