• Title/Summary/Keyword: Security Personnel

Search Result 365, Processing Time 0.026 seconds

The Influence of Agile Management on the Competence of the Personnel of the Socio-Economic System in the Digital Economy

  • Larysa Lutay;Olena Chornenka;Mariia Markiv;Igor Grybyk;Natalia Fedynets
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.123-128
    • /
    • 2023
  • The main purpose of the study is to analyze the features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy. The research methodology implies the use of modern methods of analysis. Improving the business processes of an organization is associated with improving activities, the formation of effective management systems and processes, especially the organization's policy in the field of quality, rational use of resources, increasing the responsibility of management, social responsibility of the organization, etc. The modern knowledge economy places high demands on the effectiveness of behavioral models of employees of the organization. The role of the human factor in the production system is becoming more and more obvious. Therefore, it is important to study the competence of the personnel of any socio-economic system. Based on the results of the study, the key features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy were identified.

The Influence of Agile Management on the Competence of the Personnel of the Socio-Economic System in the Digital Economy

  • Larysa Lutay;Olena Chornenka;Mariia Markiv;Igor Grybyk;Natalia Fedynets
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.161-166
    • /
    • 2023
  • The main purpose of the study is to analyze the features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy. The research methodology implies the use of modern methods of analysis. Improving the business processes of an organization is associated with improving activities, the formation of effective management systems and processes, especially the organization's policy in the field of quality, rational use of resources, increasing the responsibility of management, social responsibility of the organization, etc. The modern knowledge economy places high demands on the effectiveness of behavioral models of employees of the organization. The role of the human factor in the production system is becoming more and more obvious. Therefore, it is important to study the competence of the personnel of any socio-economic system. Based on the results of the study, the key features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy were identified.

A study on the Educational Support Status of the Retired Military Personnel (제대군인의 전직지원교육 실태에 관한 연구)

  • Koo, Young Hui;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.37-43
    • /
    • 2013
  • Retired Military Personnel do not cause an increase in the employment rate of the overall society in the aftermath of the global economic crisis contributed to instability of employment was for many years the future employment of Retired will have an impact on the environment. Over the last 20 years working to improve Retired Military Personnel employment despite these results, it appears a former education support and related support policies deemed necessary and complementary Thus, the former domestic and foreign support education and development direction of the realities in the present investigation.

A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks (은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구)

  • Shim, Joonbo;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Application of TPM Methodology for Evaluation GIS R&D Project (기술 포트폴리오 지도(TPM) 방법론 적용에 관한 연구)

  • Lee, Kook-Chul;Back, Ki-Chul;Kang, Byung-Gi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.2
    • /
    • pp.152-161
    • /
    • 2009
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system.

  • PDF

For the efficient management of electronic security system false alams Study on hybrid Crime sensor (기계경비시스템 오경보의 효율적 관리를 위한 복합형 방범센서에 관한 연구)

  • Kim, Min Su;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.71-77
    • /
    • 2012
  • Expenses in the form of personnel expenses in the past, in modern times, machine guards to gradually transition has been. This is because the machine guard is more efficient than personnel expenses. But due to false alarms, despite the high expectations of the effects of electronic security in the operation of the electronic security system due to factors that hinder the development of machine guards growth slows. Defect removal aspects of this paper, using IPA (Importance Performance Analysis) techniques to study the operation of electronic security systems and its importance in the development of machine guards, look at how high the technical aspects of electronic security systems composite type of malfunction to minimize crime sensor are presented.

A Study of Guranteeing Security of A Building by Uinsg the Double Entrance-Control System (이중 출입통제 시스템을 이용한 내부 시설 보안성 확보 방안)

  • Kim, Min Su;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.123-129
    • /
    • 2012
  • A secured building where only approved personnel can access is sometimes not secured because of the lack of recognition of security. Unapproved personnel enter and access freely to the internal system of the building, and this makes security risks. In order to deal with these problems, the existing entrance-control system had developed by using the RFID card certification and the infrared sensor to measure distance. However, it is difficult for the system to guarantee security due to the weakness of each method. Therefore, this study aimed at providing a new method of guaranteeing security by comparing the double entrance-control system and the existing entrance-control system.

A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions (금융IT인력의 보안사고 위험도에 기반한 정보접근 통제 정책 연구)

  • Sim, Jae-Yoon;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.343-361
    • /
    • 2015
  • The financial industry in South Korea has witnessed a paradigm shift from selling traditional loan/deposit products to diversified consumption channels and financial products. Consequently, personification of financial services has accelerated and the value of finance-related personal information has risen rapidly. As seen in the 2014 card company information leakage incident, most of major finance-related information leakage incidents are caused by personnel with authorized access to certain data. Therefore, it is strongly required to confirm whether there are problems in the existing access control policy for personnel who can access a great deal of data, and to complement access control policy by considering risk factors of information security. In this paper, based on information of IT personnel with access to sensitive finance-related data such as job, position, sensitivity of accessible data and on a survey result, we will analyze influence factors for personnel risk measurement and apply data access control policy reflecting the analysis result to an actual case so as to introduce measures to minimize IT personnel risk in financial companies.

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.