• Title/Summary/Keyword: Security Activity

Search Result 591, Processing Time 0.034 seconds

Empirical analysis on Information Management Performance Impact of Information Security activities (정보보호 활동이 정보경영성과에 미치는 영향에 관한 실증분석)

  • Son, Tae Hyun;Park, Jung Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.205-213
    • /
    • 2015
  • This study aims to verify the structural correlation empirically between information security performance and information management performance. To verify the correlation, three factors such as managerial controlled activity, technical controlled activity, and physical controlled activity are divided for the information security activities variable. the security performance are divided into accident prevention and accident response variables. As a result, security organization activity is a unique factor being positively significant to information security and management performance. And three activities such as human security, security training, development security do not affect at all on both information security and management performance.

A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees (기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구)

  • Jung, Jaewon;Lee, Jung-hoon;Kim, Chae-ri
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.51-59
    • /
    • 2016
  • An internal and external threat against an information system has increased, and to reduce it, organization has spent a great deal of money and manpower. However, in spite of such investment, security threat and trouble have happened continuously. Organization has conducted information security activity through various policies. The study classified such activities into prevention-oriented activity and control-oriented activity, and researched how information security activity of organization affects members of an organization and obeys information security policy by using health belief model. As a result of the study, prevention-oriented activity has a meaningful impact on seriousness, and this seriousness affects compliance intention for information security. Control-oriented activity has a meaningful impact on benefits, and the benefits have an effect on compliance intention. When an organization conducts prior activities such as education, PR, and monitoring, this organization should emphasize negative results that can happened because of deviation. In addition, in case of exposure and punishment through post activities such as inspection and punishment, if the organization emphasizes the positive effects of exposure and punishment rather than emphasis of negative parts, information security activity will be more effective.

A Study on Guarding Security Portion in Protecting Operation and Application of Electronic Security (경호업무의 경비영역과 기계경비의 적용 방안)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.319-341
    • /
    • 2001
  • Most of protecting security activity is carried out by manpower partly by security equipment. The protecting security market and the area of protecting security activity is increasing in spite of change of economic and social environment situation. For more effective protecting security activity, the coordination of electronic equipment and manpower is required. So some application method is suggested throughout the thesis, which is especially focused on new approaching method. The integration of intrusion detecting system, C.C.TV system and Access control system is introduced for general application in chapter III, and some application systems are proposed for protecting security activity in chapter IV. But the security equipment is only aid for manpower, so manpower and equipment should be coordinated well.

  • PDF

Comparison of Information Security Controls by Leadership of Top Management (최고경영층의 정보보호 리더십에 따른 정보보호 통제활동의 차이 분석)

  • Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.63-78
    • /
    • 2014
  • This paper is to analyze how the information security leadership of top management affects controls of information security. Controls of information security include the activity related to making information security policy, the activity related to making up information security organizational structure and job responsibilities, the activity related to information security awareness and training, the activity related to technical measures installation and operation, and the activity related to emergency response, monitering and auditing. Additionally we will analyze how Internet incidents affect controls of information security and find implications.

Effect of Physical Activity Program on Body Composition and Cardiovascular Risk Factors in Security Guards (민간경비원의 신체활동 참여가 신체조성과 심혈관계 인자에 미치는 영향)

  • Kim, Kyong Tae;Kim, Jong Gul
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.25-32
    • /
    • 2013
  • The purpose of this investigation was to determine the effect of physical activity program on body composition and cardiovascular risk factors in security guards. The subjects consisted of twenty security guards who are working to the security company in Seoul, physical activity group of 10 people and control group of 10 people in 2012. The results were as following. For body composition, there were significant decreases in body fat, also significant increases in fat free mass(p<.05). There were significant decreases in TG, elevated HDL-C was observed with physical activity group(p<.05). It is concluded that physical activity program might make beneficial effect such as increasing fat free mass, it also produces lower incidence of cardiovascular disease during 12 weeks in security guards.

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

Difference of Recognition of Subject and Device of Improvement in Security Activity of International Conference between Security Agency and Great-Sphere Self-Governing Body (국제회의 안전활동에 있어서 공안기관과 광역지자체간의 문제인식 차이 및 제고방안 -부산 APEC 행사를 중심으로-)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.389-412
    • /
    • 2007
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Pusan in 2005. I made up questions three times to on the members of the police, military, fire figher and Busan city civil servants who had participated in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The study result is as follows; First, the satisfactory cooperation between security agencies and self-governing body is needed for the basis of security activity in preparatory stage. Second, examining thoroughly security activity by function in activity stage. Third, giving full play to their genius by close cooperation between security agencies and self-governing body in enfourcement stage. Fourth, provision for events after this on the basis of effective estimation system in evaluation stage.

  • PDF

A Study on the Revision of Regulations to Reinforce Security for National Assembly (국회보안강화를 위한 법규개정방안에 관한 연구)

  • Kim, Doo-Hyun;Chung, Tae-Hwang;Choi, Byung-Kwon
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.7-28
    • /
    • 2011
  • This study is to propose the improvement of security related regulations to reinforce security activity and actualize constitutionalism in the National Assembly. For the purpose, some improvements could be considered as followings; First, legislating of regulations including some articles on the scope of security activity such as order preservation at assembly hall, facility security, security agents' right and protection of personal is necessary. Second, changing the organization and command system of security management is necessary for the unification of security activity and efficiency of the job. Also clear definition of terminology on the security job is need. For the shake of above object, one officer in charge of situation management and three section such as the personal protection section, facility security section and order preservation section could be substructured under security department. Third, elimination of unnecessary article on the arrest of red handed criminal in the assembly hall and on the physical checkup of audience by security agent is need. Also legislating of regulations on the hoarding of person who could disorder is necessary. Forth, legislating of regulations on the cooperation with government branch, judicial police power, carry and use of weapon and uniform and equipment to reinforce practical efficiency of security activity. For the proper legislating of the regulations, comparition with other public organizations such as presidential security Service, police, private security could be considered.

  • PDF

Development of Unplugged Activity and its Evaluation of Usability for Information Security Education (정보보호 교육을 위한 언플러그드 활동의 개발 및 유용성 평가)

  • Jang, Yun-Jae;Kim, Dong-Hyung;Kim, Han-Sung;Lee, Won-Gyu;Kim, Hyeon-Cheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.55-67
    • /
    • 2011
  • Due to recent various online problems, the necessity of information security education has increased. The information security education was strengthened thanks to the informatics curriculum of middle school in 2007, but the educational fields lacked detailed educational materials that could be utilized. Thus to give appropriate information security education for elementary and middle school students, this research developed an unplugged activity for them. The activity was designed by applying Lickona's integrated ethical model and design patterns of unplugged activities, and developed through expert's review and pilot tests targeted to elementary school students. Developed activity was applied to 21 middle school students and the usability was evaluated. As results, first, the activity showed similar expectations from the previous activities. Second, persistence was also similar or higher compared to the previous activities, so the activity developed from this research secured the minimum usability. The unplugged activity developed from this research would give implications in producing various educational contents for information security education.

  • PDF

A Study of Previous Prevention Activity in Dignitary Protection (요인 신변보호의 사전 예방작용에 관한 연구 - 사전 안전활동을 중심으로 -)

  • Yang, Jae-Yul
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.145-174
    • /
    • 2000
  • Protection activity is divided by the security measures of preventive action and immediately protective reaction in case of emergency situation. The purpose of this study is to emphasis the importance of prevention when providing security for protectees. What I suggested in this thesis is summarized below. Chapter I which sets out purpose, concept, general remarks are followed 3 steps for conducting security action by Chapter II. Chapter III concerns the classification, security technic of preventive action. Classified involving security information, security action, security measures. It is followed site survey, security plan, detailed procedures, coordinative meeting, previous security action, protective action, review meeting by protective technic. Chapter IV consider effective counter plan method of preventive action. Chater V, conclusion.

  • PDF