• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.029 seconds

Effects of Job Security and Psychological Ownership on Turnover Intention and Innovative Behavior of Manufacturing Employees (심리적 주인의식과 고용안정이 이직의도 및 혁신행동에 미치는 영향에 대한 연구 -경북지역 중소제조기업 종업원을 중심으로-)

  • Lee, Wook-Gee;Jeon, Young-Hwan;Kim, Joo-Wan;Jung, Chi-Young
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.1
    • /
    • pp.53-68
    • /
    • 2014
  • The purpose of this study is to verify the relationships among innovative behavior, turnover intention, and job security. An additional purpose was to examine partial mediating effects on psychological ownership. The baseline of analyzing those relationships in this study is that the role of psychological ownership will be a mediator between job security and turnover intention as well as innovative behavior in the organization. To accomplish these purposes, a model was built among job security as predictor variable, the psychological ownership as mediating variable and turnover intention, and innovative behavior as criteria variables based on the studies conducted in the various areas. The 248 questionnaires surveyed from the area of DaeGu and Kyungbuk were used in the statistical analyses. The detail statistical techniques are such as descriptive analysis, reliability analysis, factor analysis, correlation analysis, and multi regression analysis. The results of the study show that job security had positively significant effect on turnover intention and innovative behavior. In addition, only the psychological ownership of organization-level thinking have partial mediating effects between job security and innovative behavior also job security and turnover intention. The results may indicate that the psychological ownership of organization-level thinking be a key factor to alleviate the turnover intention of employees and to encourage the innovative behavior during their works for the small-medium size companies showing the unstable job security.

Study on the effect of fear of crime on the selection of private security (범죄에 대한 두려움이 민간경비 선택에 미치는 영향에 관한 연구)

  • Kim, Sang-Woon;Shin, Jae-Hun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.33-63
    • /
    • 2012
  • Humans are influenced by economic factors, physical environment factors, social and environmental factors, influenced by the media. In particular, the occurrence of the crime for fear of crime due to the human activities of the area has reduced. Fear of crime inflienced by direct victim of a crime, disorder of the surrounding environment, and indirect victims of crime. Therefore, in order to reduce their fears about crime in the private security through crime prevention and. About the factors affecting their fears about crime in the actual selection of the private security and private security activities in order to solve these problems through crime prevention, through this study will be described. In this study, we randomly select the survey was in August 2011, as detached house in Seoul and Daegu. As a result, the fear of crime fears about crime were influenced directly or indirectly by factors of private security selection.

  • PDF

A Study on Security Measure of Step-Wise Project (단계별 프로젝트 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyeong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2459-2464
    • /
    • 2012
  • Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.

Assessment of the Impacts of Rice Self-sufficiency on National Rresources in Korea through Water-Energy-Food-Land Nexus Approach (물-에너지-식량-토지 넥서스를 통한 미래 쌀 수급 변화에 따른 자원별 이용량 변화 분석)

  • Lee, Sang-Hyun;Choi, Jin-Yong;Yoo, Seung-Hwan;Hur, Seung-Oh
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.60 no.4
    • /
    • pp.93-103
    • /
    • 2018
  • The aim of this study is to apply the Water-Energy-Food-Land Nexus approach which can analyze the trade-offs among resources, and assess the holistic impacts of food security. First, we applied rice as a study crop and analyzed the trend of consumption of rice and the area of paddy fields. Second, the portfolios of water, energy, and land for rice production were constructed using data of footprints and productivity. Finally, the self-sufficiency ratio (SSR) of rice in target year was set as food security scenario and assessed the impacts of food security on water, energy, and land availability. In 2030, the SSR of rice decreased to 87 %, and water use for producing rice decreased from 4,728 to $3,350million\;m^3$, and the water availability index increased from 0.33 to 0.53. However, food security is essential issue and we set the 50 % and 100 % SSR of rice as high and low food security scenarios. For 100% SSR in 2030, about $3,508million\;m^3$ water was required and water availability index reached to 0.5. In other words, there is the trade-off between food security and water-energy-lands availability. Therefore, it is difficult to make a decision whether a high level of SSR is better or worse. However, this study showed the both positive and negative impacts by change of food security and it can be useful for setting the policy decision considering both food security and sustainable resource management at the same time.

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 (NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석)

  • Kim, Jung-Yoon;Song, Se-Hwa;Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.184-190
    • /
    • 2009
  • WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.

A Secure Communication Scheme without Trusted RSU Setting for VANET (신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법)

  • Fei, He;Kun, Li;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.75-87
    • /
    • 2010
  • Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.

The Impact of Perceived Security Control on the Acceptance of Internet Banking (인지된 보안통제가 고객의 인터넷 뱅킹 수용에 미치는 영향)

  • Suh, Bo-Mil
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.25-52
    • /
    • 2006
  • This study focuses on customer perception of security control under Internet banking environment Internet banking customers' understanding of security control is insufficient. They are not fully aware of security technologies for Internet banking. Moreover, they cannot know which control is implemented and maintained on an Internet banking site when visiting the site. This study, therefore, attempts to find the impact of customer perception of security control on Internet banking acceptance. The research model is based on the TAM (Technology Acceptance Model), and introduces trust as an additional belief. Trust has been investigated in the marketing area, and begins to be focused in e-business area. A Web survey of Internet banking users collected 845 cases. Statistical analyses, using SEM (Structural Equation Modeling), partially supported the hypotheses that perceived strength of security control has an impact on three beliefs: trust, perceived usefulness, and perceived ease of use. We also verified the impact of these beliefs on attitude toward using, on behavioral intention to use, and on actual use. It is, therefore, verified that perceived strength of security control is a determinant of Internet banking acceptance.

  • PDF

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations (정보보호 관리체계를 위한 주요 통제영역 연구: 금융 관련 조직을 중심으로)

  • Kang, Youn-chul;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.9-20
    • /
    • 2018
  • Financial service industry has introduced and operated management systems such as information security management system (ISMS), personal information security management system, business continuity management system to protect and maintain suitably customer's financial information and financial service. This study started that it's desirable financial industry takes consideration of ISMS and it can be different types among various organizations taking consideration of culture, practical work, and guideline of information security. The study derives primary control areas of ISMS through analyzing non-conformity trends and control factors according to certification audit for finance-related organizations introduced international ISMS of ISO27001 which is well known and commonly applicable irrespective of areas in financial service industry. Through case analyses for five finance-related organizations operating ISMS, this study analyzed improvement effects of ISMS. It has a meaning as an initial research though it was difficulty in acquiring data for empirical study because of rare organizations maintaining certification in financial sector. As a result, number of non-confirmity from the first audit to three years' elapse was decreased every year. Physical and environmental security, communication and operations management, and access control having the highest frequency of non-conformity each presented 23%, 19%, and 17%, which reached 59% in total and they are derived into primary control areas. ISMS can fulfill technical, managerial, physical security issues, which have not been treated importantly in financial industry. In addition, this study presented that ISMS can be an effective management system applicable for financial service industry.

Security system in Central Asia: Significance for International Relations (중앙아시아 지역안보체제의 국제정치학적 의미)

  • Kim, Yong Hwan
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.4
    • /
    • pp.129-154
    • /
    • 2010
  • In Post-soviet Space, particularly the Central Asian is a great turbulence region called the 'Eurasian Balkan', where diverse factors of conflict and dispute are existed. In Central Asia, a current regional security system is characterized by various multilateral cooperation relations among Central Asian nations and the world powers, such as NATO(PfP), OSCE, CIS, CSTO, CACO, SCO, CICA and so on. But nothing could obtain superiority as pan-regional security system. Unless internal problems and conflicts of the Central Asian nations be solved, security won't be assured in this region. Narrow-minded and blind realism will spread insecure region, make a lasting trouble spot in Eurasian continent. The purpose of this article is to explore significance for international relations of security system in the Central Asia. I examine general features of regional security environment formed after the Soviet Union's collapse, characteristics of multilateral cooperation related with Central Asian nations. Through consideration current situations I suggest prospects of security system in Central Asia.