• Title/Summary/Keyword: Security Awareness Training

Search Result 76, Processing Time 0.027 seconds

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Methodological Fundamentals Of Application Of Competencies For Teachers Of Foreign Languages

  • Zahrebniuk, Yuliia;Zheliaskov, Vasyl;Romanyshyn, Ihor;Varekh, Nonna;Yakymenko, Polina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.328-332
    • /
    • 2021
  • The article considers general tendencies in world and education, and also both principles and methods of forming professional, communicative, intercultural competences and in the process of teaching foreign language for professional purposes in the conditions of engineering, economic and other non-linguistic specialties at technical university. The article views some essential issues of this competence including awareness of pedagogical values, the construction of the pedagogical process, pedagogical communication and behavior; pedagogical technology, its essence, structural components, understanding of innovative components of professional activity, requirements for the design and engineering of pedagogical technologies.

The Effective Security Management Scheme against the loss in Hypermarket (대형 할인매장의 안전관리 방안에 관한 고찰)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.327-350
    • /
    • 2002
  • We, in Korea, have over two hundred hypermarkets and the number is continuously increasing. We drop into a hypermarket for merchandise, which is an integral part of our life style. So, we should consider safety for employees as well as customers because hundreds of thousands of people use the hypermarket every day. In addition to this consideration, the government should also be a political support relating to accidents that occur in the hypermarket because security and safety matters are important to all of us. But even now, Our security conditions do not match our ideal goal and we take countermeasures after accident or loss. This is a result of not having a security management expert coupled with a chief executive officer that has no idea about security awareness and loss prevention. In addition, we do not have specific laws to address these matters. We also lack reasonable ideas to prevent accident and loss. Now is the right time to revamp the laws and ordinances to improve the quality of civilian life. Prevention of accidents is a needed investment for all security personnel. The best solution for businesses is prevention of accidents. This will increase profits and cost-effectiveness as well as increase customer satisfaction. The company should form a security management department for comprehensive protection of assets. The goal of security management employees should be productive and effective security management. Every employee should have responsibility in mind to prevent accidents in his or her work. In addition, The company should have a systematic organization in place and regular training sessions. The most effective security management comes from cooperation of all members. In the 21st century, we pursue a high standard of living which is a result of our cooperation against any accident and loss. Sennewald says The value of security is better measure by what does not happen rather than what does.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A study on the perception of the Korean industrial security ecosystem using Delphi Method (전문가 델파이기법을 활용한 한국 산업보안 생태계 인식 조사연구)

  • Kang, Min Ji;Park, Chansoo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.89-97
    • /
    • 2020
  • Recently, security issues on industrial technology are undergoing rapid changes around the world. Developed countries are establishing response strategies to protect their own core technologies while creating conflicts with global value chains and foreign capital movement. Also in Korea, we are approaching industrial security issues in the mid- to long-term industrial competitiveness. The purpose of this study is to survey on the awareness of the industrial security ecosystem and derive key policy issues. Based on a three round survey, four policies were suggested as followings : systemization of industrial security control tower, enhancement of security company's technical skills and training of security specialists, improvement of technology leakage prevention system through retirement personnel and M&A, reinforcement of research security in R&D process and proactive technology protection. It is hoped that this study will serve as a basis for policy-making as an evidence-based study reflecting the policy demands of industrial security.

Airport security supervisor's individual attitude effets on the screening equipment factors (공항보안감독관의 개인태도가 검색장비 운영요인에 미치는 영향)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.279-300
    • /
    • 2011
  • Countries recognize seriousness and concern about aviation terrorism, try to stamp out of it but aviation terrorism has been increasing in the world. Airport security is completely up to the result of security screening for passengers, check-in baggages and cargo at the check point. To complete effectively human and physical screening at the airport, it is essential to secure modernized screening equipment and specialized security screener, and airport security supervisor to supervising them. In this study, A survey conducted to find out the effect on screening equipment operating factors of airport security supervisor's individual attitude. The results of the study are as follow First, the duty view of airport security supervisor meaningfully affect expertise of screening equipment operating factors, satisfaction, reliability, and education and training, national point of view meaningfullly doesn't affect screening equipment operating factors. Second, the working condition effects on the education and training, if the working condition is getting better, intent to change occupation is getting lower. Third, duty stress meaningfully effects on the intent to change occupation, now airport security supervisor works in poor condition. Therefore, airport security supervisor needs to be prude of protecting the airport from the terrorism and various attacks and various kinds of aviation security regulations and procedures and comply with operating standards and keep the life of the country and its people, and needs to change awareness. And It is nessasary for government or airport authority or airline to prepare countermeasure for the improvement of their labor conditions.

  • PDF

A Study on Police Officers' Awareness Of Counter-Terrorism - Focused on the Comprehensive Emergency Management Model - (경찰공무원의 대테러리즘 인식에 관한 연구 - Comprehensive Emergency Management Model을 중심으로-)

  • Joo, Seong Bhin
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.103-114
    • /
    • 2017
  • Terrorism is a serious problem in that it can infringe on a broad range of legal interests, from individual legal interests to national legal interests. And if these legal values are damaged, it is very unlikely that they will be restored to their original state. Therefore, it is necessary to recognize the importance of preventive activities as well as institutional improvement and alternative policies. The role of the criminal justice authority is of paramount importance in ensuring proactive action and procedural legitimacy. It would be meaningful to look at their perception about terrorism before specific procedures and legal approaches are taken. A Study is related terrorism awareness of police officers - focused on 'Comprehensive Emergency Management Model'. Four phases of Comprehensive Emergency Management Model: mitigation, preparedness, response, and recovery.

Formation of New Approaches to the Use of Information Technology and Search For Innovative Methods of Training Specialists within the Pan-European Educational Space

  • Stratan-Artyshkova, Tetiana;Kozak, Khrystyna;Syrotina, Olena;Lisnevska, Nataliya;Sichkar, Svitlana;Pertsov, Oleksandr;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.97-104
    • /
    • 2022
  • European integration processes have acted as a catalyst for the emergence of a new type of educational environment, which is characterized by competent flexibility of specialists. Therefore, the article focuses on professional training of teachers in the context of European integration processes using information technology and the search for innovative methods of training specialists. One of the educational priorities in Europe is to create a new model of a teacher who has an academic education, knows innovative methods, is able to perform functions and tasks efficiently and professionally, adequately, quickly and correctly respond to changes and innovations. The tasks facing education in the European dimension are formulated. The main trends in the education of teachers in modern Europe are described: the need to deepen and expand subject training programs in pedagogical institutions of Higher Education, which will allow autonomy of activity, awareness of responsibility for independent creative decisions, create favorable conditions for the development of professionalism through the use of Information Technology and the search for innovative methods of training specialists. At the present stage, various models of teacher training are being developed based on the University and practical concept using information technology and searching for innovative methods of training specialists. On this basis, two different theories of perception of teacher education were formed: as preparation of teachers for work throughout their professional career; as preparation for the first years of professional work, which is periodically repeated in the process of continuous professional training and improvement. Among the advantages that the use of Information Technology and the search for innovative methods of training specialists to implement the learning process, it is worth mentioning the following: simultaneous use of several channels of perception of the student or student in the learning process, thanks to which the integration of information processed by different sensory organs is achieved; the ability to simulate complex real experiments; visualization of abstract information by dynamic representation of processes, etc.

A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S. (미국 사이버보안 인력 양성 법·규정 분석을 통한 국내 법·규정 개선 방안 연구)

  • Hong, Soonjwa;Kim, Joonsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.123-139
    • /
    • 2020
  • In 1987, Computer Security Act was enacted, requiring computer security awareness and practical training for federal workforce. This is the beginning of US development of federal cybersecurity workforce. It has been strengthening the development of federal cybersecurity workforce policy by establishing OPM regulations and OMB circulation in cases where it is difficult to define by law. Through GISRA 2000 and FISMA 2002, which has been improved, it played a central role for development of federal cybersecurity workforce for more than 10 years. Since then, FISMA 2014 has been enacted as a necessity for supplementing technology and policy. In 2014, the importance of cyber security personnel in US federal agencies has been increased even more, by enacting a single law on cybersecurity workforce twice. We will review the current state of Korea's development of cybersecurity workforce by reviewing and analyzing the development and federal cybersecurity workforce in the United States.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.