• Title/Summary/Keyword: Research Security Institution

Search Result 123, Processing Time 0.032 seconds

A Study on Improving Precision Rate in Security Events Using Cyber Attack Dictionary and TF-IDF (공격키워드 사전 및 TF-IDF를 적용한 침입탐지 정탐률 향상 연구)

  • Jongkwan Kim;Myongsoo Kim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.9-19
    • /
    • 2022
  • As the expansion of digital transformation, we are more exposed to the threat of cyber attacks, and many institution or company is operating a signature-based intrusion prevention system at the forefront of the network to prevent the inflow of attacks. However, in order to provide appropriate services to the related ICT system, strict blocking rules cannot be applied, causing many false events and lowering operational efficiency. Therefore, many research projects using artificial intelligence are being performed to improve attack detection accuracy. Most researches were performed using a specific research data set which cannot be seen in real network, so it was impossible to use in the actual system. In this paper, we propose a technique for classifying major attack keywords in the security event log collected from the actual system, assigning a weight to each key keyword, and then performing a similarity check using TF-IDF to determine whether an actual attack has occurred.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

An Investigation of Cloud Computing and E-Learning for Educational Advancement

  • Ali, Ashraf;Alourani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.216-222
    • /
    • 2021
  • Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.

Study on the Energy Security Strategy of South Korea - Focused on the Innovation System Perspective - (국가 에너지안보 추진전략 분석에 관한 연구 - 혁신시스템 관점에서의 분석 및 추진전략을 중심으로 -)

  • Choi, Jeong-Hwan;Lee, Hong-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.679-688
    • /
    • 2015
  • Stability and security of energy resources are one of the most important factors for a national-development. In this research, we analyzed the Republic of Korea's policy making system on energy security and identified the problems from an innovation system perspective. In terms of the actors, they had limitations that ROK's navy do not have enough strategic plan for energy transportation. The links between innovation actors except defense area were relatively good, but links between the military area(navy) and other innovation actors had weak linkage. The infrastructure did't have enough consideration for military force development. For the institution; the role of the military area on energy security was not completely established. Therefore, participation of the defense area(navy) is required to be stated institutionally.

A Study on the Hospital Worker's Security Stress (국내 병원 종사자들의 보안스트레스에 관한 연구)

  • Hyun, Seung Hoon;Lee, Chang-Moo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.41-49
    • /
    • 2016
  • The need for protecting computerized medical information has been growing as information and communication technology has rapidly been developed. Government is also promoting institutional improvement measures for the information protection of medical institutions. With more emphasis upon the efforts to enhance the information protection capability of the medical institution, however, it could increase stress to the hospital workers and cause a reduction in the quality of essential medical services of medical institutions. Therefore, it is necessary to research the stress from hospital workers to strengthen the protection of information that medical institutions to manage and its antecedents. Based on the results of relevant researches, this study selected several factors that affect the security stress, including work overload, invasion of privacy and work uncertainty. The sample for this study was 123 hospital workers who were surveyed by questionnaire. The factor analysis and multiple regression method were employed for the analysis of this study. The results of this study showed that work overload, invasion of privacy and some of work uncertainty were the main factors positively influencing the security stress.

An Enhancement on the Selection of Information Protection Security Diagnosis Target Firms (정보보호 안전진단 대상자 선정기준의 개선 연구)

  • Ahn, Yeon-Shick;Suh, Jeong-Hoon;Jang, Sang-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.572-577
    • /
    • 2008
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was however, recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.

  • PDF

A Study on Technical Approach for Compliance Management Service (컴플라이언스 매니지먼트 서비스를 위한 기술적 접근에 관한 연구)

  • Lee, Jun-Ho;Oh, Hea-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.460-465
    • /
    • 2014
  • The Financial Supervisory Institution constantly has tightened the regulation for secure electronic financial service. Information Security Consulting and Service companies are not enough to cover about 4,500 financial institutes required to comply with the regulation, and the Financial Supervisory Institution also suffers from work overload. The demand for real-time work of risk management is getting stronger. Compliance with the regulation has to be attempted with technical approach so that requirement, implementation, monitoring, and supervision are efficiently performed. And, articles have to be concluded with compliance management service. In this research used compliance management framework and IT GRC process model, have to be designed compliance management lifecycle and 34 index.

Does Microfinance Institution Has Institutional Properties to Generate Savings?

  • Mia, Md Aslam;Tabet, Imene
    • Asian Journal of Business Environment
    • /
    • v.6 no.3
    • /
    • pp.11-14
    • /
    • 2016
  • Purpose - Microfinance institutions (MFIs) in Bangladesh have been providing savings services to their clients at least for the past 15 years. However, whether an MFI should have institutional requirement(s) to be a deposit-taker generates interest among academics and policy makers. Thus, this short note aims to provide a brief overview of institutional properties of MFIs. Research Design, Data, and Methodology - This study used the existing literature and reports by the Microcredit Regulatory Authority' to investigate institutional properties of MFIs. In doing so, we have used 'institutional theory of saving' as a theoretical ground. Although the 'institutional theory of saving' has several important properties, the existing literature mostly discusses seven features such as information, incentives, facilitation, expectation, access, restrictions and security. Results - It is found that MFIs- in general- should have all the seven important institutional properties to be considered as an ideal savings institution. With regards to the microfinance sector in Bangladesh, this study supports that all the NGO-MFIs have these properties to be considered as an ideal deposit taker. Conclusions - The microfinance sector in Bangladesh needs to design and develop comprehensive and customer friendly savings products to further motivate the poor to save in MFIs.

Trend Analysis Regarding the Institutional Foodservice-Related Research in Korea from 2005 to 2009 (2005년부터 2009년까지 한국의 단체급식에 관한 연구 동향분석)

  • Ju, Se-Young;Kwon, Yong-Suk;Chung, Hea-Jung
    • The Korean Journal of Community Living Science
    • /
    • v.23 no.2
    • /
    • pp.103-116
    • /
    • 2012
  • The purpose of this study was to investigate the trend of academic journals of institutional foodservice published from 2005 to 2009. This study was conducted by content analysis. We collected 322 articles including the subject of institutional foodservice Industry published from January 1, 2005 to December 31, 2009. Classification based on content analysis was conducted based on research method, statistical analysis, survey area, institution and location, sample type and research subject. First, in case of the research method, primary field survey/monitoring showed the highest rate. In addition, statistical analysis was as follows. Frequency/descriptive analysis were used as the highest rate. Survey area was a high percentage in case of Seoul/Incheon/Gyeong-gi province. In case of the institution and location, school/university showed the highest rate. In the sample type, foodservice employee/dietitian/nutrition teacher showed the highest rate. In this study, the most important research subjects were classified study subjects into seven by taking advantage of the previous studies. The greatest numerical study in seven study subjects was 'service quality and customers'(28.9%), and the following subjects were 'foodservice operation'(26.4%), 'hygiene, security and microbiology' (15.8%), 'organization and human resource' (15.5%). But it is noteworthy that 'marketing and strategic management'(9.6%) and 'education and training'(3.1%) of lower research results in this study are also important fields in institutional foodservice industry. Moreover, the study of such subjects is considered more necessary in the future.

Information & Analytical Support of Innovation Processes Management Efficience Estimations at the Regional Level

  • Omelyanenko, Vitaliy;Pidorycheva, Iryna;Voronenko, Viacheslav;Andrusiak, Nataliia;Omelianenko, Olena;Fyliuk, Halyna;Matkovskyi, Petro;Kosmidailo, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.400-407
    • /
    • 2022
  • Innovations significantly affect the efficiency of the socioeconomic systems of the regions, acting as a system-forming element of their development. Modern models of economic development also consider innovation activity, intellectual potential, knowledge as the basic factors for stimulating the economic growth of the region. The purpose of the study is to develop methodological foundations for evaluating the effectiveness of a regional innovation system based on a multidimensional analysis of its effects. To further study the effectiveness of RIS, we have used one of the methods of multidimensional statistical analysis - canonical analysis. The next approach allows adding another important requirement to the methodological provision of evaluation of the level of innovation development of industries and regions, namely - the time factor, the formalization of which is realized in autoregressive dynamic economic and mathematical models and can be used in our research. Multidimensional Statistical Analysis for RIS effectiveness estimation was used to model RIS by typological regression. Based on it, multiple regression models were built in groups of regions with low and relatively high innovation potential. To solve the methodological problem of RIS research, we can also use the approach to the system as a "box" with inputs and outputs.