• Title/Summary/Keyword: Security activity

Search Result 595, Processing Time 0.024 seconds

A Study on Influence of Information Security Stress and Behavioral Intention for Characteristic factors of Information Security Policy Perceived by Employee (통제수용자에 의해 인지된 정보보안정책 특성요인이 보안스트레스와 보안준수의도에 미치는 영향에 대한 연구)

  • Im, Kwang-su;Kwon, Hun Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.243-253
    • /
    • 2016
  • Company strengthen various information security policy and activity in order to protect important information assets that the company has been dealing with and prevents information security accidents such as personal information spill. However, some study said these policy and activity increase employee's information security stress and still information security accidents by employees have happened so far. Therefore, this study will review preceding theories and studies used in many various fields including Information Security areas needed to explain human's behavioral intention and determinants and summarize characteristic factors that have influence on control of human's behavioral intention in the results of the above theories and studies. Secondly, this study will implement exploratory analysis on characteristic factors perceived by employees that has been stemmed from various company's information security policy and activity in order to increase employee/'s information security compliance intention under the its surrounding security circumstance. Thirdly, this study will fulfil multiple-regression analysis in order to identify cause-effect relationship between employee's perceived information security stress and employee's perceived characteristic factor. Finally, this study will explain casual relationship with same analysis methods between information security stress and information security compliance intention based on results of the survey conducted on the financial firm's employees with same analysis methods.

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

A Research on the Industry Technology Protection Way against Foreign Secret Service's HUMINT Activity (외국정보기관의 인간정보(HUMINT) 활동에 대응한 산업기술 보호방안)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.317-336
    • /
    • 2008
  • The purpose of this study is to progress foreign secret service's human intelligence(HUMINT) activity through case study. This study presents confrontation way of our country analyzing characteristic of foreign secret service's human intelligence(HUMINT) activity and examples concretely. The examples that is used this study is foreign secret service's human intelligence(HUMINT) in USA and Japan. The following was the result of the study. First, we need importance awareness of persons security that correspond in foreign secret service's human intelligence activity. Second, we must secure administrative means for persons security means to correspond in foreign secret service's human intelligence (HUMINT) activity. Third, we must raise anti-espionage ability that correspond in foreign secret service's human intelligence(HUMINT) activity.

  • PDF

Features Of Psychological And Pedagogical Conditions For The Development Of Motivation Of Applicants For Higher Education

  • Chernova, Iryna;Vdovina, Olena;Dragomyretska, Olga;Khodykina, Yuliia;Medvedieva, Olha;Gvozdetska, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.82-86
    • /
    • 2021
  • The article analyzes the psychological and pedagogical scientific literature on the problem of motivation of students' educational activity, compiled and implemented a diagnostic research program, studied the system of conditions for the development of motivation for educational activity of students, compiled and implemented a program for the development of motivation for educational activity of students, highlighted the features of motivation for educational activity of students and conducted a comparative study analysis.

Anti-Crisis Management In The System Of Economic Security Of International Business

  • Blakyta, H.V.;Zubko, T.L.;Zhuk, O.S.;Kasianova, A.O.;Guliaieva, N.M.;Vavdiichyk, I.M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.269-274
    • /
    • 2022
  • Economy of Ukraine is characterized by the rapidly increased level of financial failures at a corporate level. Conditions of doing business in Ukraine become tighter year after year and it should motivate the business owners not only to watch more accurately the state in which their business is but also to introduce new, more precise, more tight systems of crisis management and economic security. The experience shows that in order to stay afloat and not to suffer losses companies should pay more attention to different areas of economic security, such as production potential, financial indicators, logistics, staff, etc. For this purpose companies should use a system of valuation of the most important for their activity indicators and transform their values in an integral one in order to use this assessment in making managerial decisions. Such a valuation is one of the components which the article presents. The article also reveals the key points which characterize crisis management as an integral part of enterprise development and economic security. There are specified the essence and problems of crisis management and proposed the ways of raising the level of economic security of a company based on the example of an industrial and commercial enterprise. The key focus of the enterprise's economic security management is defined as constructive responses to threats from the external environment and, as a result, ensuring stable functioning and effective realization of untapped potential in the future. The current assumption is to explain the scheme of strategic management of an industrial and commercial enterprise and to calculate the methodology of an express assessment of the level of enterprise economic security, taking into account the components of crisis management. To assess the level of economic security of the enterprise, it is proposed to use the method of point assessment, which is based on a multi-level system of indicators, which covers the main areas of the enterprise's activity.

A Research on The Actual Condition of Demining Suit Wearing (지뢰제거복의 착용실태에 관한 기초조사연구)

  • 최혜선;손부현
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.2
    • /
    • pp.259-267
    • /
    • 2001
  • The purpose of this study is to find out the actual condition of demining suit wearing for developing a new demining suit. The existing clothes fro detecting or demining work are lack of security, activity, and comfort. Especially, the lack of protection on the limbs and the head, and the lack of protection of its own fabrics themselves are problems in security. Developing new demining suit should consider security, activity, and facility for putting on and off the clothes with comfort. And first of all, protection from the fragments should be considered. For the improvement of the activity, flexibility, lightness, and simplicity with suitable size with minimum bulk should be considered. In adjustment, the facility is more important than the strength and the newly developed material for protection need lightness, too.

  • PDF

A Study on the New Threat Level Decision Method for Information System (새로운 정보시스템 위협수준결정방법론에 대한 연구)

  • Kim, Tai-Hoon;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2280-2286
    • /
    • 2007
  • Information system contains various components, and these components can be categorized into some types. When preparing security level management activity, it is most important to define the target of management activity. And after deciding these targets, security level management activity can be started. This paper defines management targets by dividing information system into some parts, and shows these targets can be managed variously according to operation environments and characteristics.

Affecting Factors on the Safety on School -Focusing on U.S Public School Security Guard Patterns- (학교 내 안전에 영향을 미치는 요인: 미국 공립학교의 경비활동 유형을 중심으로)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.137-163
    • /
    • 2013
  • This research will incorporate cases from U.S public schools to analyze the factors which influences the security within the school and efficient security patterns to suggest an adequate suggestion to elevate domestic school security system. This study is divided into two following models: a serious criminal offense model, which considers crimes occurred on campus as subordinate variables, and a school violence model, which considers as subordinate variables after limiting an act of delinquency and an a group action that can harm the safety of students, although they are not included in the categories of crimes. First, from analyzing the factors which influences security within school, the explanation power of serious crime offense safety model and school violence safety model is measured 12% and 11.3%. In serious crime offense safety model, the safety education for students, among the safety programs provided by schools(t=2.548, p=0.011), parent participation to school management(t=10.694, p=0.000), Security activities on campus(t=3.643, p=0.000), and CPTED activity(t=6.467, p=0.000) are statistically significant, as affecting factors on the safety from serious crimes. Similarly in school violence model, the safety education for students, among the safety programs provided by schools(t=3.228, p=0.001), parent participation to school management(t=12.034, p=0.000), security activities on campus(t=2.663, p=0.000), and CPTED activity(t=3.928, p=0.000) are statistically significant, as affecting factors on the safety from school violence. Second, according to the analytic results on figuring out the optimal pattern to heighten the security activities, the serious offence model's explanatory power was 4.4% and school violence safety model rated 3.9%. With the serious offense safety model, the activity factors which showed statistically significant in influencing safety from serious offenses were cooperation with local police force (t=2112, p=0.035), school policy management (t=3.309, p=0.001), security patrolling activity (t=2.548, p=0.011). In the school violence model, security activities initiated by the school which showed statistically significant from serious offenses were cooperation with local police force (t=2.364, p=0.018) and policy management (t=4.142, p=0.000). In accordance with the result of this study, education for students rather than education for teachers is more positive in terms of the safety on campus, and parent participation, like education, is consistently needed for the safety on campus. In case of CPTED activity, reinforcing plans should be prepared by intactly accepting examples in the USA. In case of security activity, plans that can increase visibility and reinforce cooperation with local police in a smooth way will provide a positive effect to the safety on campus.

  • PDF

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

The influence to pro-social aggression and self-sacrificing security-activity psychology through fearlessness and coldheartedness in the PPI-R (PPI-R 중 대담성과 냉담성이 친사회적 공격성과 희생적 경호활동심리에 미치는 영향)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.139-167
    • /
    • 2015
  • It is known that Psychopathy is excessively selfish, using as a tool to achieve the purpose to others, irresponsible, easy liars in common. They were recognized that it is people of harmful to society, impulsive, attacking others body, ignorant others safety, enjoying or callousing others suffers. But, another aggressive behaviors are described as pro-social aggressive acts as the cops bring under control by firearms to hostage committing a crime in social norms. The proper aggression is related with national security and safety of the people that is pro-social aggression for nation and human society. Security service with the legal grounds and the convinced commitment needs self-giving works, self-sacrificial security-activity is in the center of security service. These days, psychologists reveal the people of psychopathy are CEO, politician, broadcaster, surgeon, special forces, police officer. And they distinguish themselves and contribute to a community in various fields. Therefor, this research wanted to find out the relationship between fearlessness, coldheartedness in the PPI-R(applying to the university student for checking psychopathy, except anti-social traits) and pro-social aggression, self-sacrificial security-activity.

  • PDF