• Title/Summary/Keyword: Security Service, Leader

Search Result 19, Processing Time 0.02 seconds

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

The Research of Improvement and Development Process for protection in Korea Private Security (한국 신변보호업의 발전과정과 개선방안 연구)

  • Park, Jang Gyu;Kim, Nam Joong
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.33-43
    • /
    • 2013
  • The Private Security Industry of Korea began after served security service for the United States army of 8 division. The industry grew up after establish private security regulation on December 31th of 1976. Early 1980's the industry was accelerated from bringing technical knowledge of developed nations rapidly. Also, private security was gotten into the spotlight by one of futurity industry instead public security after companies performed 86 Asian game and 88 Seoul Olympic successfully. Therefore, the industry became to increase qualitatively and quantitatively. From late 1990's the private security regulations were revised fifteen times and created about education system, bodyguard, and leader of security. 3,836 private companies and 150,030 private guards had operated until 2012. However, some of companies received administrative measure, because of the companies ran immorally. The minor companies are continuously closed down from the leader's inefficient operation. Approval standard of establishment has imperfect law. Solutions of problems are to provide high quality service, to expand company affairs, to attract specific customers through efficiency expert, to change standard of leader of security guards, to establish security education institution through the government and to intensify requirements to establish the company.

The Investigate of Security Service History focused on 1920s after the Provisional Government in Korea (임시정부 수립 후 1920년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.53-68
    • /
    • 2008
  • The purpose of this study is to investigate about security service history as enlightenment period from the provisional government to 1920s. This study used materials by historical facts for the regulations and books in provisional government, newspapers in 1920s. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Kim Gu, a prominent Korean nationalist leader, was understand of security service which was to protect provisional government from the enemy. So, Kim Gu participated in training of security service agents in the police department of provisional government. Secondly, there was security service agency in the provisional government. In 1920s, security service agency and agents appeared for the first time in regulations of the provisional government. At the beginning of the security service agency's appearance was influenced on background and circumstances for Korean independence activist who helped the independence of Korea from Japan. Thirdly, security service agents leaded an active for independence movement of the private organizations in 1920s. They carried on an independence movement in defiance of Japanese coercion as nationalist in Korea history. Fourthly, security service came out the general society of Korea in 1920s. The security service was not just for safety, but also for its security system and peace of mind, which were influenced by the political situation, social environment in 1920s. For the this reason, now security service has safety perception in Korea despite the historical progress.

  • PDF

A Study on Logistics Distribution Industry's IoT Situation and Development Direction (국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구)

  • Park, Young-Tae
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.141-160
    • /
    • 2015
  • IoT(Internet of Things) has become a major issue as new type of convergence technology, expending existing of USNs(Ubiquitous Sensor Networks), NFC(Near Field Communication), and M2M(Machine to Machine). The IoT technology defines as a networking for things, which can establish intelligent links collaboratively for sensing networking and processing between each other without human intervention. The purpose of this study is to investigate to forecast the future distribution changes and orientation of contribution of distribution industry on IoT and to provide the implication of distribution changes. To become a global market leader, IoT requires much more development of core technology of IoT for distribution industry, new service creation and try to use a market-based demand side strategy to create markets. So, to become a global leader in distribution industry, this study results show that first of all establishment of standardization of IoT, privacy safeguards, security issues, stability and value were more important than others. The research findings suggest that the development goals of IoT should strive to boost the creation of a global leader in distribution industry and convenience to consider consumers' demands as the most important thing.

  • PDF

Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government (전자정부 정보보호관리체계(G-ISMS) 적용 정책)

  • Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.119-130
    • /
    • 2009
  • Korea ranked 2nd in the UN Global e-Participation Index and ranked number one as the leader in e-Government for the third consecutive year. However, Korea ranked 51 in the level of information security published by WEF(World Economic Forum), relatively a low level comparing with its great number of users and excellent environments for the Internet service. A series of critical hacking accidents such as the information leak at Auction and GS Caltex emerged consecutively in 2008 year, resulting in the leak of personal & critical information. This led to a strong interest in the necessity and importance of information security and personal information so that demand for IT security is growing fast. In this paper, we survey to benchmark information security in the perspective of service level, system, investment and policy about major foreign countries. Then we research on an effective way to make the most of the benchmark result to Korea e-Government. In addition, the purpose of this paper is to improve national information security index by developing a policy for ISO 27001 ISMS, an international standard for Information Security Management System, and elevate safety and security of the e-Government serviced by central administrative organizations and local authorities.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Innovation and investment strategies to intensify the potential modernization and to increase the competitiveness of microeconomic systems

  • Tulchynska, Svitlana;Vovk, Olha;Popelo, Olha;Saloid, Stanislav;Kostiunik, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.161-168
    • /
    • 2021
  • Within the article, strategic guidelines for the modernization of microeconomic systems are identified. Modernization levels of the potential implementation are formalized for enterprises: contractile, extensive technical, technological, progressive, adaptive, steady, intensive, creative, absolute and leader modernization. This allowed to specify the directions and tasks of the enterprise modernization at different management levels. Accordingly, the conditions and criteria for selecting resource tools are set. It is proved that the strategies of the potential modernization of enterprises must be carried out at four main management levels: first, at the enterprise level; secondly, for a particular type of product / service; third, by functional directions of modernization of separate spheres of the enterprise activity or responsibility, fourth, at the level of structural units of the enterprise. It is substantiated that in the processes due to the activation of the potential modernization, the resources are transformed into the results of the innovation implementation and the investment strategies modernization. A system of tasks for the corporate strategies implementation in order to modernize microeconomic systems has been formed. Key vectors of the activation determine the nature and properties of investment resources and necessary innovations to enhance the modernization potential. Therefore, the system of innovation and investment strategies' modernization, based on the vector and resource provision of the modernization process, is specified:

Implementation of Patient Supervision System Using USN and Healthcare board (USN과 헬스 케어 보드를 이용한 환자 감시 시스템 구현)

  • Lee, Cheol-Hee;Lee, Sand-Hoi
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.141-142
    • /
    • 2008
  • According as USN's application field is magnified, various results are appearing. Efforts to apply this results in life are progressing. In car field, is used in control that level of significance is less. In home network, is used in a household electric appli-ance control and electric lamp control, security etc.. In factory, is used in process control, and is used in various application because is involved with RFID leader recently. In this paper, patient's status monitoring, USN use wish to. Because USN can utilize existent network, it is system that can transmit various data as that change passed information.Wish to send information that get in health-care board. Information that can get in health-care board is blood pressure, blood sugar, stroke, SPO2, ECG, the activity amount, position. Also, wish to forecast use possibility to involved various service, silver industry with database.

  • PDF

A Study on the Understanding and Effective Use of Generative Artificial Intelligence

  • Ju Hyun Jeon
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.186-191
    • /
    • 2023
  • This study would investigate the generative AIs currently in service in the era of hyperscale AIs and explore measures for the use of generative AIs, focusing on 'ChatGPT,' which has received attention as a leader of generative AIs. Among the various generative AIs, this study selected ChatGPT, which has rich application cases to conduct research, investigation, and use. This study investigated the concept, learning principle, and features of ChatGPT, identified the algorithm of conversational AI as one of the specific cases and checked how it is used. In addition, by comparing various cases of the application of conversational AIs such as Google's Bard and MS's NewBing, this study sought efficient ways to utilize them through the collected cases and conducted research on the limitations of conversational AI and precautions for its use. If connected to city-related databases, it can provide information on city infrastructure, transportation systems, and public services, so residents can easily get the information they need. We want to apply this research to enrich the lives of our citizens.

A study on the exportation of the e-clearance system of Korea Customs Service to overseas aiming to lead the global trend of Customs informatization (정보화시대 글로벌 리더로의 도약을 위한 관세청 전자통관시스템 해외수출 전략에 대한 연구)

  • Seo, Jae-Yong;Jo, Jeong-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-53
    • /
    • 2006
  • Ever since the computer came into being in early 20th century, rapid development of the information technology has led to the opening of the ubiquitous age where daily works can be done anywhere, anytime, and with any devices. The information technology has drawn attention from Customs around the world as a key means to fulfill multi-faced responsibilities of strengthening regional cooperation in the international trade, simplifying clearance procedures, expediting logistics flow, and ensuring security in the global supply chain. Korea Customs Service, which began the informatization effort by establishing the electronic export declaration system in 1992, completed the 100% electronic clearance system in 2000, with a number of countries now conducting benchmarking studies on the successful use of IT by KCS. This paper is to address the changes brought to the Customs administration in the information age, the progress and achievement of the Customs informatization as a proactive strategy to deal with the changing environment, and the exportation to overseas administration of the e-clearance system of KCS which strives to become the global leader of Customs informatization. The exportation. in particular, will not only lead to increased foreign currency earnings and shared know how, but also create an opportunity to reflect Korea's system in the standardization of Customs procedures around the world.

  • PDF