• 제목/요약/키워드: Information security education

검색결과 906건 처리시간 0.029초

불법 흥신소 및 심부름센터 개선방안에 관한 연구 (A Study on the Improvement for An Illegality Detective Agency and Messenger Office)

  • 김일곤;정귀영
    • 융합보안논문지
    • /
    • 제14권6_2호
    • /
    • pp.53-62
    • /
    • 2014
  • 이 연구의 목표는 다양한 사회적 문제를 양산하고 있는 현재의 불법행위 흥신소 및 심부름센터의 선진화 방안에 대한 고찰이다. 연구결과는 다음과 같다. 첫째, 관련업종의 불법적 위법 행위룰 방지하기 위해 유사 업종인 산업근거법인 경비업법 적용의 고려이다. 둘째, 해당업종 종사자에 대한 전문자격제도의 도입이다. 셋째, 흥신소 및 심부름센터와 같은 기존의 직업군을 새로운 직업군으로 창출하여 양성화하는 것이다. 넷째, 관할감독기관 선정과 엄격한 관리 감독이다.

조직 내부자의 정보보안 준수 향상에 대한 연구 (A Study on Improving Information Security Compliance of Organization Insider)

  • 황인호
    • 한국산업융합학회 논문집
    • /
    • 제24권4_2호
    • /
    • pp.421-434
    • /
    • 2021
  • The expansion of information sharing activities using online can increase the threat of information exposure by increasing the diversity of approaches to information within an organization. The purpose of this study is to present conditions for improving the information security compliance intention of insiders to improve the level of information security within the organization. In detail, the study applies the theory of planned behavior that clearly explains the cause of an individual's behavior and proposes a way to increase the compliance intention by integrating the social control theory and goal-setting theory. The study presented research models and hypotheses based on previous studies, collected samples by applying a questionnaire technique, and tested hypotheses through structural equation modeling. As a result, information security attitude, subjective norms, and self-efficacy had a positive influence on the intention to comply. Also, attachment, commitment, and involvement, which are the factors of social control theory, formed a positive attitude toward information security. Goal difficulty and goal specificity, which are the factors of goal setting theory, formed a positive self-efficacy. The study presents academic and practical implications in terms of suggesting a method of improving the information security compliance intention of employees.

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao;Wang, Chengqi;Zheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1785-1801
    • /
    • 2017
  • In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

조직 구성원의 정보보안정책 준수행동에 대한 연구 : 수정된 Triandis 모델의 적용 (A Study on Employee's Compliance Behavior towards Information Security Policy : A Modified Triandis Model)

  • 김대진;황인호;김진수
    • 디지털융복합연구
    • /
    • 제14권4호
    • /
    • pp.209-220
    • /
    • 2016
  • 조직은 정보보안정책을 제공하고 이를 준수하기 위한 교육 및 지원 등 지속적인 노력을 하고 있으나, 조직 구성원의 보안 미준수에 따른 사고는 끊이지 않고 있다. 본 연구는 조직 구성원의 정보보안정책 준수행동에 영향을 주는 요인들을 Triandis 모델을 적용하여 규명하였으며, 요인들간의 영향 관계를 구조방정식모델링 기법인 PLS(Partial Least Squares)를 통해 살펴보았다. 가설검증 결과 조직은 정보보안정책과 이를 지원하는 촉진조건을 통해 구성원의 정보보안정책 준수의도 및 행동을 유도할 수 있으며, 조직의 정보보안정책에 대한 구성원의 기대가치, 습관 및 감정이 중요함을 증명하였다. 본 연구는 Triandis 모델을 정보보안 분야에 적용하여 분석하고, 구성원의 정보보안 행동에 대한 방향성을 제시하였다는 점에 의의가 있다. 그리고 본 연구 결과를 통해 조직의 정보보안정책 수립 및 구성원의 준수행동을 높이기 위한 방안을 제공할 수 있을 것이다.

대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로 (Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies)

  • 김종기;전진환
    • 정보보호학회논문지
    • /
    • 제16권5호
    • /
    • pp.79-92
    • /
    • 2006
  • 컴퓨터 바이러스는 정보화 시대에 사용자들이 가장 흔하게 경험하는 정보보안 문제 중 하나이다. 본 연구에서는 컴퓨터 바이러스를 대상으로 대기업과 중소기업간 보안요소에 대한 사용자의 인지도 차이를 분석하였다. 설문지를 이용하여 수집된 자료에 대하여 t-test를 이용하여 기업규모별 인지차이를 분석한 결과 보안위협과 위험을 인지하는데 별다른 차이가 없는 것으로 나타났으며, 컴퓨터 바이러스에 대한 위협과 피해를 심각하게 고려하는 것으로 확인되었다. 또한, 사용자들은 전반적으로 소속된 조직의 보안정책 수준에 대해 만족하고 있으나 보안정책을 인지하는데 차이가 있으며 기업규모별 보안정책 집행의 효과에 차이가 있음을 확인하였다. 또한 바이러스에 대한 정보자산, 보안취약성, 보안효과를 인지하는데 차이가 있는 것으로 나타나 기업규모별 자산의 중요도와 위협의 노출정도, 바이러스 감염방지 노력의 결과가 상이한 것으로 분석되었다.

Intellectualization of Higher Education: An Information and Communication Model

  • Kaidanovska, Olena;Pymonenko, Mariia;Morklyanyk, Oksana;Iurchyshyn, Oksana;Rakochyi, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.87-92
    • /
    • 2022
  • Today the system of higher education needs significant reforms. Intellectualization of the educational process in HEIs aims to improve the quality of educational services. Intellectual information technologies are information technologies that help a person to accelerate the analysis of the political, economic, social, and technical situation, as well as the synthesis of management decisions. The basis for their mastery is information and communication technologies. The purpose of the research work is to identify the relationship between the introduction of information and communication technologies and the increase in the level of intellectualization of higher education. The article substantiates the expediency of introducing information and communication technologies in order to improve the intellectualization of the educational process in higher education. An empirical study of the variables that characterize the level of intellectualization of higher education through the proposed techniques has been conducted. The tendencies characteristic of pedagogical conditions of implementation of information and communication model in the educational process were revealed. It is proved that the level of intellectualization of higher education depends on the implemented pedagogical conditions. The effectiveness of the proposed information and communication model is also confirmed. Given the data obtained during the study and the low constraints that may affect the results of further research on this issue should focus on the study of other variables that characterize the state of intellectualization of the educational process.

Latest Information Technologies in the UK Adults Education System

  • Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.25-34
    • /
    • 2022
  • Today, further education of adults in the UK is one of the developing areas of continuing education. The Open University with distance learning, in the process of which innovative forms and methods based on computer and telecommunication technologies are used, is particularly successful in the organization of additional education of the adult population. The advantages of distance learning, multimedia - the latest information technologies, which provide the combination of graphic images, video, sound with the help of modern computer tools, are noted. The basic principles and forms underlying the technologies and forms of work with the elderly are defined. The international experience of implementing "Universities of the Third Age" is summarized. The most widespread approach in adult education in Great Britain is informational. The use of computer technologies motivates a new paradigm in educational methods and strategies, which requires new approaches, forms of learning, and innovative ways of delivering educational materials to adult learners. Information technologies have gained great popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, online search for information for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a single scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The information technology of synchronous distance learning "online" has gained considerable popularity in the educational process today. A promising direction is the use of multimedia technologies in educational activities to create a design of a virtual computer environment by decoding audiovisual information.

정보보안 심리적 권한이 업무 스트레스를 통해 정책 저항 완화에 미치는 영향: 공정성 분위기의 조절 효과 (The Effect on the IS Psychological Empowerment on the Mitigation of IS Policy Resistance Through IS Role Stress: Focusing on the Moderation of IS Justice Climate)

  • 황인호
    • 한국전자통신학회논문지
    • /
    • 제17권1호
    • /
    • pp.1-12
    • /
    • 2022
  • 내부자의 정보 노출 사고가 지속해서 발생하면서, 조직 내부의 정보보안 강화에 대한 요구가 높아지고 있다. 그러나 엄격한 정보보안 정책 및 규칙이 조직원에게 적용될 때 정보보안 스트레스와 저항 행동으로 나타날 수 있다. 본 연구는 내부자의 정보보안 정책의 부정적 행동 원인과 완화 요인을 제시하는 것을 목적으로 한다. 특히, 개인(심리적 권한) 및 조직(공정성 분위기) 요인이 어떻게 상호 영향을 주어 부정적 행동을 완화하는지를 확인하고자 하였다. 연구는 정보보안 정책을 내부자에게 반영하는 조직의 근로자에게 설문하여 표본을 확보했으며, 구조방정식모델링으로 가설검증을 하였다. 분석 결과, 정보보안 관련 심리적 권한이 정책 저항에 미치는 영향을 업무 스트레스가 부분 매개 효과를 가졌으며, 공정성 분위기가 심리적 권한의 영향을 강화하였다. 연구 결과는 내부자의 정보보안 정책 저항 감소를 위한 방향성을 제시하였으므로, 조직 내부의 보안 목표 달성을 위한 전략 수립에 도움을 준다.