• Title/Summary/Keyword: Security budget management

Search Result 93, Processing Time 0.022 seconds

A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management (이 기종의 보안 솔루션 통합 운영을 위한 최적의 보안 투자 결정 모델)

  • Choi, Yoon-Ho
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.91-100
    • /
    • 2014
  • While IT security investment of organizations has been increased, the amount of the monetary loss of organizations caused by IT security breaches did not decrease as much as their expectation. Also, from surveys, it was discovered that the poor usage of their security budget thwarted the improvement of the organization's security level. In this paper, to resolve the poor usage of security budget of organizations, we propose a comprehensive economic model for determining the optimal amount of investment in security solutions, including the proactive security solutions(PSSs) and the reactive security solutions(RSSs). Using the proposed analytical model under different parameters of security solutions, we show the optimal condition to maximize the expected net benefits from IT security investment of organizations. Also, we verify the common belief that the optimal level of investment in security solutions is an increasing function of vulnerability. Through simulations, we find the optimal level of IT security investment, given parameters of different characteristics of security solutions.

Improvement of the Administration System of Customs Payments in the Modern Conditions

  • Mishina, Natalya V.;Kuzminov, Vitaly A.;Kuzminova, Olga A.;Konovalova, Elena E.;Gubanova, Natalia V.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.347-351
    • /
    • 2022
  • The article is devoted to the formation of approaches to improving the system of administration of customs payments in modern conditions. It is established that important components of the administration of customs payments are customs expertise, customs value assessment, and control over the declaration of goods to ensure the completeness and timeliness of customs duties payments to the budget. It is found that the practice of customs administration shifts the emphasis of foreign trade regulation to the use of the principles of work implying the use of the latest technologies for the preliminary electronic exchange of information, remote customs clearance of goods without the physical presence of an official, and consistent application of risk management. It is established that an important place in the structure of the state authorities regulating the foreign economic activity is given to the customs service. Furthermore, the existing problems in the implementation of international trade operations necessitate the improvement of approaches to the customs regulation of export-import activities of enterprises.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.

The Research on Security Cognition and Management Status of Technology Outflow about Small-medium Companies in New IT Environment (신정보화 환경에서 중소기업 기술유출에 대한 인식과 관리 실태에 관한 연구)

  • Kim, Ki Ho;Ha, Kyu Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.305-312
    • /
    • 2013
  • This research suggests the security countermeasures for solving technology outflow of small-medium companies in New IT Environment through level comparison of security cognition and security management between small-medium companies and major big companies. According to analysis results, it is poor for small-medium companies' level of security cognition and security management compared with major big companies. Small-medium companies need to manage technology outflow to major big companies' level in New IT Environment. Small-medium companies has started to build New IT Environment recently and it must build the appropriate security system for small-medium companies at the same time. Small-medium company has more problem with budget and proffessionals to maintain the security of technology outflow. Therefore government has to support systematic management for the security of technology outflow to Small-medium companies

The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance (정보보호 성숙도와 조직성과 간의 정보보호 정책의 효과분석)

  • Park, Jeong Kuk;Kim, Injai
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.9
    • /
    • pp.301-310
    • /
    • 2014
  • The absence of proactive information security management to ensure availability, accessibility and safety of information can bring serious risks to customers as well as to the organization's performance and competitiveness because improper security management undermines business continuity. This study analyzed the maturity of information security which affects the organizational performance. Through the literature reviews, a research model using the organizational performance as the dependent variable, the risk management process maturity and risk assessment process as independent variables and the information security policy indexes as moderate variables was proposed, and an empirical analysis was made on the basis of survey. The results showed that there was a high causal relationship between information security maturity and organizational performance. However, even if the proportions of information security staff ratio and the information security budget ratio increased, information security maturity did not affect organizational performance. It suggests that information security maturity affects organizational performance, but information security regulations have their limitation as being a catalyst to improve organizational performance.

Models of State Clusterisation Management, Marketing and Labour Market Management in Conditions of Globalization, Risk of Bankruptcy and Services Market Development

  • Prokopenko, Oleksii;Martyn, Olga;Bilyk, Olha;Vivcharuk, Olga;Zos-Kior, Mykola;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.228-234
    • /
    • 2021
  • The article defines the problems of forming the models of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and services market development. The clustering models based on the optimal partner network cooperation were proposed in order to ensure the strategic development of territories, to attract budget leading enterprises and to support small businesses. A descriptive model of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and Covid-19 was determined.

A Study of Priority for Policy Implement of Personal Information Security in Public Sector: Focused on Personal Information Security Index (공공분야 개인정보보호 정책 집행과제의 우선순위 분석: 개인정보보호 수준진단 지표의 선정 및 중요도를 중심으로)

  • Shin, Young-Jin;Jeong, Hyeong-Chul;Kang, Won-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.379-390
    • /
    • 2012
  • This study is to consider political implication of indicators to measure personal information security in public sector studied by Ministry of Public Adminstration and Security from 2008 to 2011. The study analyzed the priority of personal information security policy dividing into personal information security infrastructure, personal information management with life cycle, correspondence of information infringement by scholars, experts, and chargers. As the results, to progress personal information security policy is important to management of personal identification information on web site; specially institutional infrastructure as responsible organization, exclusive manpower, and security budget; personal information security infrastructure. As like the results, it would be reflected in the progress of personal information security policy and tried to provide systematic management program with improving safe information distribution and usefulness.

The Influence of Community Characteristics on Food Insecurity Korean Adults (지역사회의 특성이 우리나라 성인의 식품불안정에 미치는 영향)

  • Park, Jun;Kang, Gilwon;Tak, Yangju;Chang, Sounghoon;Lee, Kunsei;Kim, Hyeongsu
    • Health Policy and Management
    • /
    • v.26 no.3
    • /
    • pp.226-232
    • /
    • 2016
  • Background: This study was conducted to analyze the influence of socioeconomic characteristics of community on the food insecurity under the control of personal socioeconomic factors which may be influence to the food security. Methods: Food insecurity and individual socioeconomic characteristics were obtained from 2012 community health survey. Socioeconomic characteristics of communities were extracted from the data of Statistics Korea and local governments. Personal socioeconomic factors were sex, age, educational status, job, and monthly family income. Socioeconomic characteristics of communities were administrative district (urban vs. rural), senior population rate, degree of financial self reliance, degree of financial independence, portion of welfare budget, number of welfare facilities, and unemployment rate. We analysed the relationships between the food insecurity and socioeconomic characteristics of community using multi-level analysis under the control of personal characteristics. Results: On personal level age, sex, education status, and monthly family income were related with food insecurity. On community level administrative district (urban vs. rural), degree of financial independence, unemployment rate, and proportion of welfare budget among local general government accounts were related to individual food insecurity. Rural area, district with low levels of financial independence, low portion of welfare budget, and greater unemployment rate showed a higher level of food insecurity. Conclusion: To reduce the level of food insecurity in a community it is necessary to decrease the unemployment rate, in addition to providing support from the central government by increasing the proportion of the welfare budget so that both factors contribute to raising the degree of financial independence.

The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention (중소기업 산업기술 유출방지를 위한 정보보호 관리체계 설계)

  • Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.111-121
    • /
    • 2010
  • Since SMEs have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet they cannot organize information security team to operate integrated information security management system with consistency and it is fact that there only occur instant introductions of certain system. In this study, we designed information security management system for SMEs' industrial technique leakage prevention which is differentiated from those of large enterprises based on current status of SMEs' industrial technique leakage. Specifically we analyzed current status and vulnerability of SMEs' industrial technique leakage and we designed industrial technique leakage prevention management system for SMEs. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that SMEs may estimate a appropriate level of investment on information security and develop countermeasures for control by utilizing this study result.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.