• Title/Summary/Keyword: Security Company

Search Result 675, Processing Time 0.029 seconds

A Study on Influence of Information Security Stress and Behavioral Intention for Characteristic factors of Information Security Policy Perceived by Employee (통제수용자에 의해 인지된 정보보안정책 특성요인이 보안스트레스와 보안준수의도에 미치는 영향에 대한 연구)

  • Im, Kwang-su;Kwon, Hun Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.243-253
    • /
    • 2016
  • Company strengthen various information security policy and activity in order to protect important information assets that the company has been dealing with and prevents information security accidents such as personal information spill. However, some study said these policy and activity increase employee's information security stress and still information security accidents by employees have happened so far. Therefore, this study will review preceding theories and studies used in many various fields including Information Security areas needed to explain human's behavioral intention and determinants and summarize characteristic factors that have influence on control of human's behavioral intention in the results of the above theories and studies. Secondly, this study will implement exploratory analysis on characteristic factors perceived by employees that has been stemmed from various company's information security policy and activity in order to increase employee/'s information security compliance intention under the its surrounding security circumstance. Thirdly, this study will fulfil multiple-regression analysis in order to identify cause-effect relationship between employee's perceived information security stress and employee's perceived characteristic factor. Finally, this study will explain casual relationship with same analysis methods between information security stress and information security compliance intention based on results of the survey conducted on the financial firm's employees with same analysis methods.

Private Security Regulation: A Comparative Study of South Korea and Mongolia (한국과 몽골의 경비업법 비교연구)

  • Lkhagvamm, G;Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.139-165
    • /
    • 2016
  • In Mongolia, the regulation related to the private security industry, the Law on Contracted Private Security Services, was legislated relatively recently. The Law on Contracted Private Security Services was enacted into law in Mongolia 16 years ago, in 2000. This regulation has undergone two amendments since its inception. However, new revisions still need to be made to ensure that this regulation is in line with internationally accepted standards and practices. This paper compares the existing private security regulations of South Korea and Mongolia. The purpose of this comparative study was to identify the weaknesses of and problems in the Mongolian regulation and propose amendments to the Mongolian regulation. The comparative study of the two countries' regulations showed and underscored an imperative need to make further amendments to the Law on Contracted Private Security Services. Specifically, the weaknesses of and problems in the Mongolian regulation at issue include the following: the level of accuracy in defining certain legal terms and providing the proper names for various regulations; stipulations which set forth the procedure for registering a private security company; provisions regarding operating a private security company; the details of eligibility and accountability requirements concerning chief executives and security service officers; and the scope of work provisions. This study proposes constructive amendments to strengthen the Law on Contracted Private Security Services.

  • PDF

Realities of Violence Committed by the Private Security and its Solutions (용역폭력의 실태와 대책에 관한 논의)

  • Park, Han-Ho;Myung, Do-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.227-235
    • /
    • 2014
  • The private security has achieved a rapid growth by playing an important role in supporting the public security. However, there are some negative results of this rapid growth. Violence committed by the private security is the biggest problem among them. This study discuss the necessity of eradicating violence committed by the private security, present some violence cases, and find solutions to the problem resulting from the cases. If violence committed by the private security is not eradicated, advancement in the private security service industry can not be expected. This study suggests the three possible solutions: reinforcing regulations restricting violence committed by the private security; strenthening the responsibility of the private security company (employer) for supervision and management on the private security guard (employee); establishing the philosophical identity of security service.

Studies on the effect of information security investment executive (정보보호의 투자 집행 효과에 관한 연구)

  • Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1271-1284
    • /
    • 2014
  • This paper classifies technical, administrative and physical areas of defects and advices made by an external audit (ISO27001) and internal audit (performed by a security team) in a company which has the management system of information security. With the classified data it finds the correlation between the budget and investment of information security, and analyze the correlation. As a result of the analysis, it has been found that as time goes on there is a consistent correlation between a administrative area and technical area of security. Specially, it has been confirmed that the relation between the scale of the budget which is not executed and the number of the defects and advices made by the audit is in direct proportion. Therefore, in this paper, so as to provide a model that can be used for validating the effectiveness of the protective investment information by statistically calculating the similarity based on the results of correlation analysis. This research is intended to help that a company makes a precise decision when it establishes a policy of information security and systematic methodology of the investment in information security.

A study of the relationship of the senior-guard's quality of exchange, job satisfaction and intention to leave one's job in private security company (민간경비업체에서 상사-부하 교환관계의 질, 직무만족 그리고 이직의도의 관계에 관한 연구)

  • Chung, Dae-Yong;Lee, Won-Haeng;Kim, Choon-Kwang
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.313-338
    • /
    • 2009
  • Yet this study of a private security company guards who did not apply to most firms - An exchange relationship with the quality of the application of the theory of private security companies and the high turnover and low job satisfaction and find ways to improve the firm - An exchange relationship Job satisfaction and turnover of the quality of the major research variables with a theoretical discussion of the relationship they set and based on this study demonstrate the analysis is attempted. This expansion contributes to the possibility of applying the theory, and private security companies to manage their organizations more effective by presenting the theoretical basis. Was trying to contribute to practical. Therefore, in this study to determine the following three things that it first, in a private security company bosses - men exchange turnover of the members of the quality of the relationship is to help the relationship, secondly, from a private security company boss - An exchange relationship The quality of the work of the members are satisfied with the relationship, and finally the 'private security company's turnover in the member's job satisfaction is associated with a reduction of is whether. To this end, Seoul. Gyeonggi Province located in a private security guard companies and 238 people involved in the actual target and try to analyze these results demonstrate the firm - An exchange relationship to the quality of the turnover of the direct impact of the factors, but showed up as non - Job satisfaction showed a significant impact. Job satisfaction also significantly affect the turnover of the firm - An exchange relationship to the quality parameters according to degree of turnover. Therefore, exchange relationships with men from private security companies want to increase the quality of the firm's efforts to improve the men's job satisfaction indirectly through a reduction in turnover can be affected have been identified. We in the private security company to members of the firm's position in relation to their subordinates to improve the quality of the proposal is to.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Evaluation Model of the Contracting Company's Security Management Using the DEA Model (DEA 모형을 이용한 도급회사 보안관리 평가모델)

  • Kim, In-hwan;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.687-704
    • /
    • 2017
  • As Korea's industrial competitiveness and technological prowess increase, collaboration and technical exchanges with contracting companies are increasing. In an environment where cooperation with the contracting company is unavoidable ordering companies are also striving to prevent leakage of technologies through various security systems, policy-making and security checks. However, although the contracting companies were assessed to have a high level of security management the leakage of technical datas are steadily increasing. Issues are being raised about the effectiveness of the security management assessment and the actual security management levels. Therefore, this study suggested a security management system model to improve security management efficiency in the general contract structure. To prove this, analyze the efficiency of 36 contractor companies for the technical datas security management system using the DEA model. The results of the analysis are reflected in the assessment results. Lastly, suggestions for improving the effectiveness of the technical datas security system are proposed.

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

A Study on the Countermeasures against APT Attacks in Industrial Management Environment (산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.25-31
    • /
    • 2018
  • An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

A Study on the Influence of Securities on Corporate Financing Behavior in Financial Markets (금융시장에서 담보가 기업의 자금조달선택에 미치는 영향에 관한 연구)

  • Park, seok gang
    • International Area Studies Review
    • /
    • v.22 no.3
    • /
    • pp.201-219
    • /
    • 2018
  • This paper suggested a theoretical model, in which a security-based(secured loan, non-secured loan) credit agreement determines the form of corporate cost function through a loaning company's cost minimization in the light of a company which behaves monopolistically in product markets. Also, this paper analyzed the influence of a corporate credit agreement on market equilibrium, and economic welfare in product markets. As a result, it was found that in case a company, whose equity capital is small, implements borrowing based on a secured loan from a financial institution, the company comes to face borrowing restraints, in which the company has no choice but to get a loan within the scope of securities. When a company offers its capital goods, i.e. a production factor, as a security, there occurs a distortion to the production factor input ratio. Meanwhile, when a company comes to get a loan based on an unsecured loan, for which the interest rate is high, marginal cost rises; accordingly, the company comes to choose a credit agreement aiming at maximizing its profits. However, a company's choice of a credit agreement is not quite desirable from a consumer's viewpoint, and from the whole economic point of view; overall, such a choice is likely to aggravate economic welfare.