• Title/Summary/Keyword: Security Governance

Search Result 150, Processing Time 0.023 seconds

A Study on Global Governance System for Effectively Achieving UN Millennium Development Goals (유엔 새천년개발목표의 효과적 달성을 위한 글로벌 거버넌스에 관한 연구)

  • Park, Hahnkyu
    • International Area Studies Review
    • /
    • v.13 no.1
    • /
    • pp.467-490
    • /
    • 2009
  • This study seeks to improve the problems of analytical rigor and practical utility found in the concept of human security by examining ways to create a global governance system for the effective achievement of United Nations Millennium Development Goals(UN MDGs). This study regards poverty as the most fundamental threat to human security in order to achieve the analytical rigor of human security concept. At the same time, it also examines how to creating a global governance for achieving UN MDGs to improve practical utility of human security concept. The global governance system of MDGs should acquire global political representativeness, efficacy of policymaking process, and democracy within it. For these purposes, the creation of a "Global Summit for Development," the establishment of a more equal partnership between the states, international organizations, and NGOs, and institutionalization of operational and strategic cooperation among development institutions are proposed.

Information Systems in Project Management of The Public Sphere

  • Mamatova, Tetiana;Chykarenko, Iryna;Chykarenko, Oleksii;Kravtsova, Тetiana;Kravtsov, Olеg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.141-148
    • /
    • 2021
  • Project management is a current trend of management in the public sphere, based on different principles, methods and tools. The tools include information technologies providing control over time, cost, quality and planning process in order to ensure accountability to interested parties. The goal of the research was to examine the impact of the integration of information systems in project management of the public sphere on the quality of public governance and administration using the example of infrastructure projects involving the private sector in developing countries. The methodology of the research is based on the concepts of "digital-era governance" (DEG), "Information governance" and "project governance" to determine the effectiveness of information systems and technologies in the management of infrastructure projects in the public sphere. The data from the countries with Lower middle income (India, Indonesia, Philippines, Ukraine, Vietnam) and Upper middle income (Argentina, Brazil, China, Colombia, Mexico, Peru, Romania, Russian Federation, Thailand, Turkey) for 1996-2020 were used to study the effects of DEG. The results show two main trends in the countries with Lower middle income and Upper middle income. The first trend is the development of digital governance, the concept of "digital-era governance" through information systems and performance measurement of the governance system, forecasting of investment flows of infrastructure projects, measurement of payback and effectiveness parameters for investment management in the public sector, decision support. The second trend is the existence of systemic challenges related to corruption, social and institutional factors through the development of democracy in developing countries and the integration of NPM similar to developed countries. The confidence of interested parties, especially private investors, in public authorities is determined by other factors - the level of return on investment, risks and assignment of responsibility, probability of successful completion of the project. These data still remain limited for a wide range of project participants, including citizens.

CSR and Governance Principles in Business Administration According to Deans of BA Schools Perspective: BA of Northern Border University as Case Study

  • AL-Ajlouni, Mahmoud Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.219-222
    • /
    • 2021
  • The study shed the light on the information required by Governance Principles and Corporate Social Responsibilities of human resources department from the point deans' perspectives of BA colleges during the discussion the publication of studies that academic members earlier submitted in many journals as authors of similar studies talking about business schools and CSR in Saudi Arabia universities. The study sample was the deans of business schools in northern border university and interviews were used to collect data. Findings showed that CSR in business colleges within an integrated set of research products in the human resource that he owns, support the mechanisms of social services from a purposeful pioneering and creative perspective. In addition, the success of business administration colleges in preparing these cadres depends on the college's senior leadership represented by its dean and its administrative policy to motivate academic staff and students to develop the CSR and governance.

The Question Concerning Game Governance: Focusing on Game Rating System Using the Governmantality Concept of Foucault (게임 거버넌스에 관한 논고: 푸코의 통치성 개념으로 바라본 게임등급시스템)

  • Kim, Ji-Yeon;Kim, Min-Kyu;Lee, Jong-Pil
    • Journal of Korea Game Society
    • /
    • v.13 no.2
    • /
    • pp.143-154
    • /
    • 2013
  • This article explores on the deploying of game rating system in the context of whole game governance. Rating system is critical apparatus of game policy because it works as a kind of counterweight between different actors. We analyse to apply the three form of governmentality by Faucault. Rating system can be commonly considered as security mechanism. Korean rating system has hoped to be so but its effect was not actually. We should see why that system evolve to disciplinary mechanism, not toward security mechanism. Sound governance shows to be ensure all actors to participate its procedures practically, through constituting more rich discourse.

Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies (금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현)

  • Kim, Do-Hyeong
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.101-106
    • /
    • 2021
  • To protect financial information, financial companies establish strategies and plans for information security, operate information security management systems, establish and operate information security systems, check vulnerabilities, and secure information. This paper aims to present an information security portal system for financial companies that can gain visibility into various information security activities being undertaken by financial companies and can be integrated and managed. The information security portal system systemizes the activities of the information security department, providing an integrated environment for information security activities to participate from CEOs to executives and employees, not just from the information security department. Through this, it can also be used as information security governance that can be used by top executives to reflect information security in corporate management.

A Study on Critical Success Factors for Implementing Governance of Personal Information Protection (개인정보보호 거버넌스의 효과적인 구현을 위한 핵심성공요인에 관한 연구)

  • Kim, Jung-Duk;Hwang, Soo-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.197-203
    • /
    • 2011
  • Personal information protection need to be addressed in terms of enterprise-wide and business issues, not just an information processing issue. Therefore, governance of personal information protection, which stress the importance of top management's roles aud responsibilities for personal information protection, has been noticed as an important agenda to resolve. The paper defines the concept of personal information protection governance and proposes the severn critical success factors (CSFs) for implementing the governance scheme. The proposed CSFs are tested in terms of feasibility and materiality by using the focus group interviews.

Moderating Effect of Online Shopping Experience on Adoption of e-Governance in Rural India

  • Swapnil Undale;Harshali Patil
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.32-50
    • /
    • 2022
  • Technology acceptance is one of the most popular research areas. Rapid developments in technology are making human life more comfortable. However, still most of the rural area has been deprived of benefits of technological advancement. Seventy percent population of India resides in rural area. Leveraging the improved penetration of the internet; mobile friendly population in rural India has been increasingly shopping online in the last few years. e-Governance is one of the important vehicles to provide efficient services to the citizens by Governments. One major obstacle is acceptance of e-Governance platforms by the citizens. Considering the increasing trend of using e-Commerce in rural area, this paper attempts to investigate moderating effect of online shopping experience on intention to use e-Governance portals. We surveyed 365 villagers across Maharashtra: one of the leading states in India. The result confirmed online shopping experience moderates the relationship between: 'perceived security & privacy' and 'attitude'; 'perceived security & privacy' and 'intention to use'; 'Perceived usefulness' and 'attitude'; and, 'attitude' and 'intention to use'. In this study definition of moderating variable 'experience' is unique and different than most of the popular studies. We defined experience as: 'prior use of any application of technology similar to the target application of technology'. Whereas prior studies considered experience as prior experience with target application of the technology.

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

A Framework of Operational Continuity Management Governance (운영 연속성 관리 거버넌스 프레임 워크에 관한 연구)

  • Lee, Youngjai;Yun, Jungwon;Lee, Seongil
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.69-79
    • /
    • 2008
  • Operational continuity is not a simple issue that can be solved by a Back-Up center or an alternate site. Strategic issues including law, standards, etc demand a new approach in terms of the operational continuity management (OCM). Also, it is necessary to develop a new framework of OCM governance as a part of the corporate governance. Experts from corporate governance insist that OCM can be included in the corporate operational control and so it is important to set up a strategy for OCM in the organization. This paper describes how OCM governance suggests two aspects of effectively controlling corporate risks in the viewpoint of corporate governance. First of all, the top corporate management develops the strategy of operational continuity with regard to the corporate governance. Secondly, there is the aspect of how to build up and manage the strategy of operational continuity in the corporations.

  • PDF

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.