• Title/Summary/Keyword: Research Security Compliance

Search Result 105, Processing Time 0.025 seconds

A Study on Global Compliance of Global Companies under the Circumstance of Export Control (전략물자 무역환경에 따른 글로벌기업의 글로벌 컴플라이언스에 관한 연구)

  • Choi, Choon-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.367-389
    • /
    • 2008
  • On the stage of an international trade with well-developed transportation, communication system and proliferation of free trade, global companies who are eager to sustain business growth by cutting cost and pioneering new market are facing a new challenge named "Global Compliance" of business transparency, export and import regulations, and potential international business environment. The purpose of a global compliance is to monitor and regulate a company's trade activities to reduce the risk of transactions that might violate relevant countries' laws, regulations, or standards. After the 911, for strengthening the non-proliferation of the export control goods, UNSCR1540(United Nations Security Council Resolution 1540(2004)) was declared in order to enforce the members to adopt the rules in the resolution into their national laws and regulations. Companies does not realized that they need to get rid of the risks because they underestimate the importance of international security, caused by their careless management. That is why currently the export control program is not fully observed by the most. Lack of awareness for the export control and the poor system of each members could be the reason for this unstable operating status. With this background, this thesis will study on the meaning of export control, schemes for companies to recognize its importance and governmental guideline to support global companies.

  • PDF

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.

The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior (조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향)

  • Park, Jaeyoung;Kim, Beomsoo
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

A Study on Mitigation of Information Security Related Work Stress (정보보안 관련 업무 스트레스 완화에 대한 연구)

  • Hwang, Inho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.123-135
    • /
    • 2020
  • Recently organizations are implementing strict security policies and technologies to minimize security incidents. However, strict information security can cause work stress of employees and can make it difficult to achieve security goals. The purpose of this study is to present the preconditions for mitigating the negative impact of security-related work stress. We conducted a questionnaire survey of employees working in the financial industry and secured a total of 266 samples. The test of the research hypothesis was carried out by structural equation modeling. As a result, work stress had a negative effect on compliance intention, and value congruence reduced work stress. Also, security feedback had a moderating effect on the relationship between research factors. The results have theoretical and practical implications for mitigating work stress of employees.

Survey of International GNSS Organizations (국제 GNSS 기구 동향 조사)

  • Jeonghang Lee;Jong Hyun Jeon;Jeongwan Kang;Jongwon Lim;ByungSeok Lee;Jung-Min Joo;Sunwoo Kim
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.2
    • /
    • pp.117-129
    • /
    • 2024
  • In this paper, we survey recent trends of International Global Navigation Satellite System (GNSS) organizations such as the International Committee on GNSS (ICG), International Civil Aviation Organization (ICAO), International Maritime Organization (IMO), and International Telecommunication Union (ITU), and investigate their impact on the maritime and aviation sectors. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. ICG develops a variety of satellite navigation enhancement systems. ICAO establishes international aviation regulations and standards to enhance aviation safety and security. IMO establishes international shipping conventions and rules to protect and regulate the shipping environment. Lastly, ITU establishes international communication regulations and standards. Investigation of such international organizations plays an important role in increasing the efficiency and reliability of GNSS systems. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. In the future, interoperability and compatibility with new satellite navigation systems and other GNSS and satellite navigation enhancement systems must be secured, so and thus investigation of international organizations must be conducted first.

A Study on the Security related Obligations of Contracting Party under the Incoterms(R) 2010 Rules (Incoterms(R) 2010상 수출입 당사자의 보안관련 의무에 관한 연구)

  • Yang, Jung-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.45-80
    • /
    • 2012
  • Since the 9.11 terror attack, the event which caused supply chain disruption, supply chain security has become more important than ever before. With this as a momentum, a customs supply chain security paradigm emerged intended to guarantee secure flow of cargo across boarder. Under this circumstances Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistances in obtaining security clearances. Thus, security related obligations such as providing advance manifest information is the mandatory requirements for any export and import. The impact on the seller and buyer of security related obligations under the Incoterms(R) 2010 rules environment is obvious. Assistance to provide the security information in advance has become indispensable obligations to the seller and buyer. As such assistances is at the cost and risk of the party responsible for the clearances of the goods, the choice of recognised partner and compliance with the relevant security program, in order to enjoy the relevant benefits, becomes paramount.

  • PDF

A Study on Technical Approach for Compliance Management Service (컴플라이언스 매니지먼트 서비스를 위한 기술적 접근에 관한 연구)

  • Lee, Jun-Ho;Oh, Hea-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.460-465
    • /
    • 2014
  • The Financial Supervisory Institution constantly has tightened the regulation for secure electronic financial service. Information Security Consulting and Service companies are not enough to cover about 4,500 financial institutes required to comply with the regulation, and the Financial Supervisory Institution also suffers from work overload. The demand for real-time work of risk management is getting stronger. Compliance with the regulation has to be attempted with technical approach so that requirement, implementation, monitoring, and supervision are efficiently performed. And, articles have to be concluded with compliance management service. In this research used compliance management framework and IT GRC process model, have to be designed compliance management lifecycle and 34 index.

Research about the Financial Institution's Preparations for Electronic Financial Accidents under New e-Financial Transaction Act (새로운 전자금융거래법에서의 전자금융사고 대응 방안에 관한 연구)

  • Cho, Soung-In;Park, Tae-Hyoung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.9-19
    • /
    • 2008
  • By e-Financial Transactions Act enacted in January 2007, the financial institutions are responsible for indemnifying user's damage to ensuring security of the electronic financial transactions and to protecting financial users when suffering from electronic financial accidents. However, when occurring unauthorized financial transactions or electronic financial accidents by user's moral hazard, it is difficult to determine where the accidents happened at and whether caused by the intention or gross negligence of users. To protecting financial parties and ensuring the security and reliability of electronic financial transactions, this paper attempts to propose the means, what enhance the notification process about financial transactions and to strengthen IT regulatory compliance by using area information about electronic financial transactions, to protect risk of the financial accidents.

  • PDF

Examining Driver Compliance Behaviour at Signalised Intersection for Developing Conceptual Model of Driving Simulation

  • Osman, Aznoora;Wahab, Nadia Abdul;Fauzi, Haryati Ahmad;Ibrahim, Norfiza;Ilyas, Siti Sarah Md;Seman, Azmi Abu
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.163-171
    • /
    • 2022
  • A conceptual model represents an understanding of a system that is going to be developed, which in this research, a driving simulation software to study driver behavior at signalised intersections. Therefore, video observation was conducted to examine driver compliance behaviour within the dilemma zone at signalised intersection, pertaining to driver's distance from the stop line during yellow light interval. The video was analysed using Thematic Analysis and the data extracted from it was analysed using Chi-Square Independent Test. The Thematic Analysis revealed two major themes which were traffic situation and driver compliance behaviour. Traffic situation is defined as traffic surrounding the driver, such as no car in front and behind, car in front, and car behind. Meanwhile, the Chi-Square Test result indicates that within the dilemma zone, there was a significant relationship between driver compliance behaviour and driver's distance from the stop line during yellow light interval. The closer the drivers were to the stop line, the more likely they were going to comply. In contrast, drivers showed higher noncompliant behavior when further away from stop line. This finding could help us in the development of conceptual model of driving simulation with purpose of studying driver behavior.

Issues and Improvements of Secure Coding for Preventing Cyber Crime: Focus on the Private Company Systems (사이버범죄예방을 위한 시큐어 코딩 적용 문제점과 시사점: 민간기업 시스템을 중심으로)

  • Choi, Kwan
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.69-76
    • /
    • 2018
  • The purpose of this study is to prevent cyber crime in private company systems by applying secure coding and identify its problems. Three experiments were conducted. In Experiment 1, a security manager was participated and gave advise to the developer to follow secure coding guidelines. In Experiment 2, a security manager did not participate, but let the developer himself committed on secure coding. In Experiment 3, a security manager provided reports on weaknesses of each package source to the developer and the developer was only focused on source development. The research results showed that the participation of a security manager on development raised secure coding compliance rate and finished the project within a given periods. Furthermore, it was better to entrust a security manager with the task of following the secure coding guide than the developer, which raised secure coding compliance rate and achieved project objectives faster. Further implications were discussed.

  • PDF