• Title/Summary/Keyword: Security Involvement

Search Result 97, Processing Time 0.022 seconds

Moderating Effect of Employment Types in the Relationships between Employment Relations Characteristics and Job Involvement in Hotel Corporations (호텔기업에서 고용관계특성과 직무몰입의 관계에 대한 고용형태의 조절효과)

  • Kim, Yong-Soon;Hwang, Q-Jeen
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.314-321
    • /
    • 2009
  • The main purpose of this paper is to examine the relationship between employment relations characteristic and job involvement according to employment type in hotel corporations. Using data from 238 employees from hotel corporations, this research shows the results in the below. First, there is a significant difference in the employment relations characteristic(employment security and peer relationships) and job involvement. Second, the employment type does not moderates the relationships between employment relations characteristic and job involvement. Third, employment security and peer relationships are powerful factors to predict job involvement in both form of worker.

Parental Involvement and Education of Children with Intellectual Disabilities in Saudi Arabia

  • Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.259-265
    • /
    • 2022
  • This research aims to increase understanding of family participation in special education programs, to gain a deeper understanding of the programs themselves, and to determine the consequences of the research findings. It addresses the opportunities for families to participate in their children's learning journey and focuses on enhancing the experience of families participating in the education of students with intellectual disabilities. This study interviews four teachers of students with intellectual disabilities, and three important themes emerge from their discussion of whether parents should participate in special education programs for their children. The findings of this study have several important implications for future practice.

Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception (위험인식의 낙관적 편향 실험을 통한 스미싱 보안인식 개선)

  • Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.475-487
    • /
    • 2016
  • Recently, various risks of smartphone hacking are emerging. Smishing crime techniques become more cunning and its damage has been increasing, thereby requiring effective ways of preventing and coping with smishing. Especially, it is emphasized the need for smartphone users' security awareness and training besides technological approach. This study investigates the effective method for providing news messages in order to improve the perception of risk from smishing. This research empirically examines that the degree of optimistic bias on risk perception can vary depending on news frame, topic type, and involvement regarding smishing. Based on the findings, it identifies the factors influencing risk perception and verifies effective ways of promoting individual security awareness on smishing. The results of this study provide implications that assist in educating, campaigning and promoting information security awareness for smart device users.

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism (게이미피케이션 메커니즘을 이용한 초등 네트워크 정보보안 학습교재 및 교구 개발)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.787-797
    • /
    • 2016
  • This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

Analysis of Differences in Information Security Compliance according to Individual Coping and Organizational Homogeneity Culture (개인 대처와 조직 동질성 문화에 따른 정보보안 준수 차이 분석)

  • Hwang, In-ho
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.105-115
    • /
    • 2021
  • The purpose of this study is to present the effect of differences in individual coping and organizational homogeneity culture on information security compliance from an exploratory perspective. The study divided groups into individual coping (task-oriented, emotion-oriented) and organizational homogeneity culture (homogeneity, heterogeneity), confirms the difference in information security for each group through cross-design and presents a multiple mediation model between information security factors. As a result of the study, in the coping dimension, the average of the security compliance factors was higher in the emotion-oriented than the task-oriented, and in the homogeneity culture dimension, the average of the security compliance factors was higher in the homogeneity than the heterogeneity. Additionally, social influence and involvement had a multiple mediation effect on the relationship between information security awareness and compliance intention. The implications of this study were to confirm the difference in the effect of individual decision-making styles on security compliance according to the organizational culture differences. The results suggest the necessity of applying a customized information security compliance model for each organization and individual characteristics.

Developmental Results of Generative Fathering and Attachment Security (생산적인 아버지노릇과 유아의 애착안정성의 발달적 결과 : 단기종단적 연구)

  • Yee, Young Hwan
    • Korean Journal of Child Studies
    • /
    • v.22 no.2
    • /
    • pp.65-76
    • /
    • 2001
  • This study investigated the prediction of fathering and child's attachment to father based on socio-emotional competence and father-child relationship. Fifty-five toddlers and their parents were assessed by the Generative Fathering Questionnaire (Yee et al., 1999) and the Attachment Security Q Set (Waters, 1987) when the children were 2 years old. After 12 months, the child's socio-emotional competence and father-child relationship were assessed by questionnaire. The child's socio-emotional competence was predicted by father's sense of responsibility for child rearing but not by father's involvement in child rearing. Attachment security partly predicted child's socio-emotional competence and father-child relationship. Among the sub-categories of father-child relationship, warmth and closeness of the relationship was related to child's socio-emotional competence.

  • PDF

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Organizational Commitment of Hospital Employees -Testing a Causal Model in Korean Hospitals- (병원근무자의 직장애착에 관한 연구 -한 인과모형의 검증을 중심으로-)

  • 서영준
    • Health Policy and Management
    • /
    • v.5 no.2
    • /
    • pp.173-201
    • /
    • 1995
  • A causal model of organizational commitment on the basis of Western literature was tested with a sample of 1,164 employees from two university hospitals in Korea. The model contains three groups of determinants : environmental variables(job opportunity, spouse support, and parent support), psychological variables(met expectations, work involvement, positive affectivity, and negative affectivity), and structural variables(job autonomy, work unit control, routinization, supervisor support, coworker support, role ambiguity, role conflict, workload, resource inadequacy, distributive justice, promotional chances, job security, job hazarda, and pay). The data were colleted with questionnaires and analyzed with the LISREL maximum likelihood method. It is found that (1) the following variables, listed in order of size, have significant total effects on organizational commitment : job satisfaction, met expectations, supervisor support, job security, routinization, job opportunity, negative affectivity, work involvement, distributive justice, and promotional opportunity, (2) the model explains fifty-nine percent of the variance in organizational commitment, and (3) the link with expectancy theory is justified by the results for met expectations. Two conclusions can be drawn from these findings. First, the model of organizational commitment appears to be generalizable to Korean hospitals. Second, the model of organizational commitment should include such theoretical variables as environmental, psychological, and structural factors.

  • PDF

A Study on Improving Information Security Compliance of Organization Insider (조직 내부자의 정보보안 준수 향상에 대한 연구)

  • Hwang, In-Ho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_2
    • /
    • pp.421-434
    • /
    • 2021
  • The expansion of information sharing activities using online can increase the threat of information exposure by increasing the diversity of approaches to information within an organization. The purpose of this study is to present conditions for improving the information security compliance intention of insiders to improve the level of information security within the organization. In detail, the study applies the theory of planned behavior that clearly explains the cause of an individual's behavior and proposes a way to increase the compliance intention by integrating the social control theory and goal-setting theory. The study presented research models and hypotheses based on previous studies, collected samples by applying a questionnaire technique, and tested hypotheses through structural equation modeling. As a result, information security attitude, subjective norms, and self-efficacy had a positive influence on the intention to comply. Also, attachment, commitment, and involvement, which are the factors of social control theory, formed a positive attitude toward information security. Goal difficulty and goal specificity, which are the factors of goal setting theory, formed a positive self-efficacy. The study presents academic and practical implications in terms of suggesting a method of improving the information security compliance intention of employees.

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.