• Title/Summary/Keyword: Policy Convergence

Search Result 8,443, Processing Time 0.024 seconds

A Study on the Information Security System of Fin-Tech Business (핀테크 기업의 정보보안체계 관한 연구)

  • Kang, Young-Mo;Lee, Young-Geun;Kwon, Hyun-Jung;Han, Keyung-Seok;Chung, Hyun-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2016
  • A Study on the Information Security System of Fin-Tech Business In traditional electronic commerce, there have not been severe issues of trading information through documents in paper or the closed EDI. The scale of e-commerce has increased as internet develops, however, turning to the online e-commerce, which caused a number of issues such as authentication, information forgery, and non-repudiation between the parties. To prevent conflicts from such troubles and perform the post management, security technologies are applied throughout the process of e-commerce, certificates intervening. Lately, meanwhile, FinTech has been creating a sensation around the mobile payment service. Incidents of information leakage from card corporations and hackings imply the need of securing safety of the financial service. Development and evolution of FinTech industry must be accompanied by information protection. Therefore, this research aims to inquire into the information security system of leading FinTech company in a foreign country.

A Study on the Factors that affect the Recognition of Policy Effectiveness in the Security Management : Focused on the Hotel Employee (재난위기관리 단계에 따른 보안관리 정책의 효과성 - 호텔 종사자를 중심으로 -)

  • Lee, Sang Dong;Joo, Seong Bhin
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.33-38
    • /
    • 2016
  • The study is intended to examine awareness of safety as a differentiated service strategy and t to induce offer of more competitive services to the internal and external consumers in service industry of the South Korea. In the pursuit of this purpose, the typical occupations of the service industry targeted hotel employees and this study investigate the policy effectiveness of security management in Korea hotels. Specifically, this study was conducted by survey and involved major hotel(Seoul, Busan, Gyeongsangnam-do, Gyeongsangbuk-do) across the country. This survey went through feasibility study by major hotels managers. The results were as follows: Findings of the study suggested that most of disaster management stages did not have a statistically significant relationship with the policy effectiveness of security management. Only, repair stage have significant impact on the policy effectiveness of security management. This finding was found to be attributable to the fact that hotel employee would be concentrated in the tangible results of security management.

A Study on the Change of the Trump Administration's Alliance Policy (트럼프 행정부의 동맹정책 변화에 관한 연구)

  • Choi, Won Sang;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • For the past 66 years, the Korea-U.S. alliance has been a typical asymmetric alliance in which the U.S. supports South Korea's security during the Cold War and South Korea gives some of its policy autonomy to the U.S. But Lee Myung-bak government military alliance the 'comprehensive strategic alliance' of the character, 'value of alliance', Park Geun-hye ' a global, 'Frontier of cooperation', the government.'reciprocal, comprehensive alliance' Moon Jae-in, the government and partnerships developed with ' euroui the development of national security strategy said. The purpose of this study is to explore ways to build a reciprocal and comprehensive Korea-U.S. alliance for the development of the Korea-U.S. alliance policy in order to ensure South Korea's policy autonomy following changes in the Trump administration's alliance policy. The results of the research show the need for Korea to participate in the U.S.-led 'India-Pacific Strategy' continue diplomatic efforts for the mutual economic benefits of the two countries and strengthen public diplomacy in order to build the Korea-U.S. alliance in a reciprocal and comprehensive manner.

The Study for Development of evaluation scale in Korea performance supporting policy (한국 공연관광 정책지원을 위한 평가척도개발에 관한 연구)

  • Kim, Jang-Won;Kang, Do-Yong;Kim, Chul-Won
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.443-450
    • /
    • 2014
  • Korea performance tourism is becoming important role as a Korea tourism contents UNWTO emphasize 10 categories alternative tourism Culutural, Urban Tourism. In 2012, Foreign performance tourist surpassed 1.62 million. At this point government policy support is needed for qualitative development. To establish this support policy standard, evaluation scale is imperative. Delphi is designed as a performance expert group communication process which aim to achieve a convergence of opinion on Korea performance evaluation measures The AHP converts these evaluations to numerical values that can be processed and compared over the entire range of the problem. Evaluation Scale for Korea Performance is consist of 4 Main Category Division. This scale can suggest ways to improve Korea performances.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

Solution for Efficient Vital Data Transmission and Storing in m-Health Environment (m-Health 환경에서 효율적인 생체 데이터 전송 및 보관을 위한 방안)

  • Lee, Seo-Joon;Cho, Gyoun-Yon;Song, Seung-Hwan;Jang, Jin-Soo;Lee, Kwang-In;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.227-235
    • /
    • 2015
  • In order to tackle healthcare expenditure problems that affects a crucial part of government finances world-wide, m-Health emerged as a solution. However, recent poor outcomes of m-Health led to the need for reform in m-Health services. Therefore the purpose of this research is to propose a solution for efficient vital data transmission and storing in m-Health environment as part of such initiative. Methods included development of an efficient system and algorithm for vital data. For results, the compression ratio of the proposed solution was compared and evaluated. Results showed a compression ratio of 30.4. The proposed system is envisioned to contribute to the future vital data monitoring system in m-Health.

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

An Analysis of the Policy Making Process of Gyeonggido Cyber Library Establishment: Based on the Policy Streams Model of Kingdon (경기도사이버도서관 설립의 정책형성과정 분석: 킹던의 정책흐름모형을 중심으로)

  • Chu, Yoonmi;Kim, Giyeong
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.71-87
    • /
    • 2013
  • In this study, we analyze the agenda setting and policy making process of the establishment of Gyeonggido Cyber Library, which has played an important role for development of public libraries in Gyeonggido since its launching, based on Kingdon's policy streams model. According to the model, policy formation is described as the result from the convergence of the three streams, such as problem, policy and politics streams. When these streams converge on a specific time point, a policy window is created so that the issues become policy agenda. At this moment, policy entrepreneurs propose their alternatives, which have been prepared already, and try to pass it through the window. We identify coupling of the streams in the policy window and the role of policy entrepreneurs in the process of agenda setting and selection of alternatives of Gyeonggido Cyber Library policy. Suggestions are provided based on the analysis for public policy formation in public libraries domain.

Current Status of the Implementation of Convergence Education in Primary and Secondary Schools (초·중등학교의 융합교육 운영 현황 실태조사)

  • Kwon, Hyuksoo;Kim, Eojin;Park, Hyun Ju;Bae, Youngkwon;Lee, Dongkuk;Lee, Hyungdong;Lee, Hyonyoung;Choi, Sung-Youn;Ham, Hyung-In
    • Journal of Science Education
    • /
    • v.45 no.3
    • /
    • pp.336-348
    • /
    • 2021
  • The goal of this study is to investigate the current status of implementation of convergence education in elementary, middle, and high schools. A survey was conducted on 871 in-service teachers nationwide, and frequency analysis was conducted by school level. Key findings are as follows: first, 449 (51.5%) are found to practice convergence education. Second, the reason for implementing convergence education is the voluntary effort of teachers and the educational necessity for the future society. Third, it was found that convergence education is being implemented centered on science, arts, and social studies as a link between subjects in regular curriculum hours. Fourth, 270 (64%) of teachers who implemented convergence education in response to COVID-19 performed online convergence education, and experienced difficulties in creating class materials and communicating with students. Fifth, the excessive work of teachers, insufficient support for teacher training and research group activities, and lack of various convergence education programs are suggested as reasons for not implementing convergence education. This study hopes to provide implications for policy and implementation for revitalizing convergence education.