• Title/Summary/Keyword: Information protection competency

Search Result 9, Processing Time 0.182 seconds

Evaluation Model of Technology Protection Competency customized for Small and Medium-sized Enterprises (중소기업 맞춤형 기술보호 수준평가 모델 연구)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.113-125
    • /
    • 2017
  • In today's highly competitive environment, the importance of technology protection cannot be overemphasized. To evaluate technology protection competency of Small and Medium-sized Enterprises(SMEs), Government has conducted surveys every year but its effectiveness is still in question. To enhance the effectiveness of technology protection for SMEs, a customized evaluation model of technology protection competency has been suggested in this study. Surveys are conducted to measure the relative importance of evaluation areas that can be influenced by the size and type of business. The analysis shows that there exists significant differences between evaluation areas. This study suggests that the effectiveness of technology protection can be enhanced by utilizing a customized evaluation model depending on the size and type of business. Also, the proposed model can be used for SMEs to identify and enhance their weakness in technology protection. Overall, it is expected that the proposed model can be effectively used to protect valuable technologies in various SMEs.

Analysis of Elements Related to Information Culture Literacy in Overseas Informatics Curriculums (해외 정보 교육과정에서 정보문화소양 관련 내용 요소 분석)

  • Yang, HyeJi;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Korea shifted the focus to competency-based curriculums in the revised national curriculum of 2015, and emphasized training creative convergence talents through informatics education. The informatics education curriculum included information culture literacy as a core competence so that the learners can gain knowledge of information technology-based information ethics and make ethical judgment and practice ethics. This study analyzed the elements related to information culture literacy in the informatics curriculums of the US, the UK, India, Japan, Australia and Germany for the purpose of providing implications with regard to the composition of elements that can foster information culture literacy. According to the analysis results, first, the term information culture literacy was included only in the informatics education curriculum of Korea. Second, the elements common to all countries are (personal) information protection, information security and copyright. Third, Korea's information society and career, India's avoidance of injuries, Germany's protection of health and environment were found only in the curriculums of respective countries. This study is significant in that it provided the orientation of improving the elements for fostering information culture literacy based on the results of analyzing overseas informatics curriculums.

The Role of Mothers in Children's Privacy Protection on the Internet (인터넷에서의 아동의 프라이버시 보호와 어머니의 역할)

  • Kim, So-Ra
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.2
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

An Exploratory Investigation of Archival Reference Services in the National Archives of Korea (국가기록원의 기록제공서비스에 관한 탐색적 연구)

  • Seol, Moon-Won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.3
    • /
    • pp.103-124
    • /
    • 2022
  • This study aims to suggest the use-based policies for archival reference service by investigating the actual archival uses and services of the National Archives of Korea (NAK). Considering that there is little information on the overall archival reference service by NAK, an exploratory research method is adopted to understand the current status and issues of the service. In this study, the use of archival records in NAK is investigated from statistical data, and service cases by record type are collected through interviews with archival service professionals of NAK. Then, the success and risk factors of the archival reference service are analyzed in three categories of human resources (reference archivists' competency), tools (finding aids), and records (appropriateness and sufficiency). Based on these analyses, archival reference service policy directions are proposed to strengthen the two different archival roles as "arsenal of rights protection" and "academic information provider."

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

The Effect of Safety Education Satisfaction of Apartment Residents and Application of Fire Protection Plan on Fire Safety Awareness (아파트 거주자의 안전교육 만족도와 소방계획서의 활용성이 화재안전의식에 미치는 영향)

  • Kim, Sang-Sig;Kong, Ha-Sung
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2020
  • The purpose of this study is to investigate the effect of apartment residents' safety education satisfaction and the application of fire protection plans on fire safety awareness. The analysis results are as follows. First, the low levels of satisfaction with safety education content had a negative effect on anxiety about fire safety. This means that apartment residents' low levels of interest or participation in education affected their safety awareness, which prevented them from securing safety from fire. It is necessary for control staff to have a positive impact on their educational satisfaction via the learning support information system, among others, in order to create a satisfying education and safety culture. Second, competence in the execution of firefighting plans had a positive effect on fire safety awareness. These results indicate that apartment residents do not have the opportunity to access the education and training necessary for safety, nor the legal responsibility to complete mandatory safety education, which leads to their lack of safety awareness. Therefore, the control staff need to raise awareness of fire safety and the importance of participating in safety education among apartment residents by strengthening and activating the execution of firefighting plans in order to ensure safe living. Third, the competency of the firefighting plans moderated the effects of apartment residents' educational satisfaction on their awareness of fire safety.