• Title/Summary/Keyword: Security organization

Search Result 965, Processing Time 0.03 seconds

A Relationship between Security Engineering and Security Evaluation

  • Kim, Tai-Hoon
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2004
  • The Common Criteria (CC) philosophy is to provide assurance based upon an evaluation of the IT product or system that is to be trusted. Evaluation has been the traditional means of providing assurance. It is essential that not only the customer' srequirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Unless suitable requirements are established at the start of the software development process, the re suiting end product, however well engineered, may not meet the objectives of its anticipated consumers. By the security evaluation, customer can sure about the quality of the products or sys tems they will buy and operate. In this paper, we propose a selection guide for If products by show ing relationship between security engineering and security evaluation and make help user and customer select appropriate products or system.

  • PDF

Empirical analysis on Information Management Performance Impact of Information Security activities (정보보호 활동이 정보경영성과에 미치는 영향에 관한 실증분석)

  • Son, Tae Hyun;Park, Jung Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.205-213
    • /
    • 2015
  • This study aims to verify the structural correlation empirically between information security performance and information management performance. To verify the correlation, three factors such as managerial controlled activity, technical controlled activity, and physical controlled activity are divided for the information security activities variable. the security performance are divided into accident prevention and accident response variables. As a result, security organization activity is a unique factor being positively significant to information security and management performance. And three activities such as human security, security training, development security do not affect at all on both information security and management performance.

A literature review of Korean and International research on the supply chain security (공급 사슬 보안에 관한 국내외 문헌 조사 연구)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.87-96
    • /
    • 2011
  • This research is a literature survey on the Supply chain security. International organization and governments have build security regulations to improve the security in the shipment through supply chain. The researches on supply chain security were increasing during last 10 years. We were surveyed 53 research including Korean and international papers. ills study was classified by research subjects, security regulation, and research methods. Korean researches were focused to introducing and reviewing on the security regulation, but the researches on specific security reinforcement were very rare. International researches were concerned with the subject of the airport security scanning problem, transportation security problem, port selection problem.

The Influence of Agile Management on the Competence of the Personnel of the Socio-Economic System in the Digital Economy

  • Larysa Lutay;Olena Chornenka;Mariia Markiv;Igor Grybyk;Natalia Fedynets
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.123-128
    • /
    • 2023
  • The main purpose of the study is to analyze the features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy. The research methodology implies the use of modern methods of analysis. Improving the business processes of an organization is associated with improving activities, the formation of effective management systems and processes, especially the organization's policy in the field of quality, rational use of resources, increasing the responsibility of management, social responsibility of the organization, etc. The modern knowledge economy places high demands on the effectiveness of behavioral models of employees of the organization. The role of the human factor in the production system is becoming more and more obvious. Therefore, it is important to study the competence of the personnel of any socio-economic system. Based on the results of the study, the key features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy were identified.

The Influence of Agile Management on the Competence of the Personnel of the Socio-Economic System in the Digital Economy

  • Larysa Lutay;Olena Chornenka;Mariia Markiv;Igor Grybyk;Natalia Fedynets
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.161-166
    • /
    • 2023
  • The main purpose of the study is to analyze the features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy. The research methodology implies the use of modern methods of analysis. Improving the business processes of an organization is associated with improving activities, the formation of effective management systems and processes, especially the organization's policy in the field of quality, rational use of resources, increasing the responsibility of management, social responsibility of the organization, etc. The modern knowledge economy places high demands on the effectiveness of behavioral models of employees of the organization. The role of the human factor in the production system is becoming more and more obvious. Therefore, it is important to study the competence of the personnel of any socio-economic system. Based on the results of the study, the key features of the influence of Agile management on the competence of the personnel of the socio-economic system in the digital economy were identified.

A Study on the Role of Maritime Enforcement Organization As Response of Illegal Fishing (불법어업에 대한 해상집행기관의 역할 및 방향 - 중국어선의 불법어업을 중심으로 -)

  • Jung, Bong-Kyu;Choi, Jung-Ho;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.26 no.4
    • /
    • pp.769-788
    • /
    • 2014
  • Today, all the countries of the world newly recognize importance of sea on 70% area of the earth, which are focused on efforts for security of marine territory and fishes resources. On the security concerns of the ocean & fishes resources, Sea are very important on the ground of the importance of the ocean, thus international community has been trying to combat a maritime security threat and illegal fisheries. Coastal states need to have proper state's jurisdiction and exercise it's jurisdiction to response effectively to a maritime security threat and illegal fisheries. Here, many of the coastal states strengthened the rights in Exclusive Economic Zone(;EEZ) naturally, there are made cooperation activities and keen competition in the sea because deepening of complex understanding of the relationship between the surrounding countries with marine surveys & continental shelf development, island territorial sovereignty & marine jurisdiction in overlap of sea area on EEZ. In these circumstances, foreign fishing boats invaded to our territorial waters and EEZ many times. in addition, Chinese fishing boats are going to illegal fisheries naturally. On this point, a powerful crackdown of maritime enforcement organization had no effect on them. Also more and more their resistance gathered strength and tendency of a illegal activities became systematization, group action and atrocity little by little. So this thesis includes a study on the regal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the activities of illegal fishing and boats controlled by Korea Coast Guard(KCG), fishing patrol vessels of Ministry of Maritime Affaires and Fisheries(MOMAF) and Navy etc. from in adjacent sea area of Korea. In relation to this, the policy and activity plan were devised to crackdown to illegal fisheries of foreign fishing boats and then it was enforced every year. According to this, analyze the present conditions of illegal fisheries of a foreign fishing boats on this study, also analyze the present conditions of maritime enforcement organization & found out problems to compared it. protect the territorial waters, at the same time protection of marine mineral resources & fishes resources of EEZ including continental shelf, which has want to study for the role & response of maritime enforcement organization for the protection of fisheries resources and a proper, a realistic confrontation plan of maritime enforcement organization against illegal fisheries of foreign fishing boats.

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

Effect of Security Manager's Servant Leadership on the Cohesion and Organization Outcome (시큐리티 관리자의 서번트 리더십이 응집력 및 조직성과에 미치는 영향)

  • Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.378-388
    • /
    • 2011
  • The purpose of this study is to clarify the impact on cohesiveness and organizational performance of the servant leadership of the security manager. The subjects of study selected final 287 persons by using the systematic random sampling for security companies in Seoul in 2009. However, the number of cases used in the final analysis is 256 persons. Reliability of the questionnaire used in this study showed that the value of Cronbach's ${\alpha}$ was above 0.796. The collected data used the methods such as factor analysis, reliability analysis, and multiple regression analysis etc. by using SPSSWIN 17.0. The conclusions are as follows. First, servant leadership has a positive impact on cohesiveness. Second, one of the factors of servant leadership, trust, has a positive impact on organizational performance. Third, individual, social cohesiveness and group cohesiveness among the factors of cohesiveness have a positive impact on organizational performance. Fourth, with the results of path analysis, servant leadership has direct impact on organizational effectiveness and indirect impact through cohesiveness. In other words, a servant leadership among the leaderships that a security worker is conscious of administrator affects cohesiveness and organizational performance in management to promote the management of the organization.

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung;Jung, Suhyun;Lee, Insung;Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.428-437
    • /
    • 2015
  • This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.

Knowledge-based modeling and simulation of access control system representing security policies (보안정책을 표현하는 침입차단시스템의 지식기반 모델링 및 시뮬레이션)

  • 고종영;이미라;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.4
    • /
    • pp.51-64
    • /
    • 2001
  • It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. Our goal is to build a foundation of knowledge-based modeling and simulation environment for the network security. With this environment, users can construct the abstracted model of security mechanisms, apply various security policies, and quantitatively analyze their security performance against possible attacks. In this study, we considered security domain from several points of view and implemented the models based on a systematic modeling approach. We enabled the model to include knowledge in modular fashion and provided well-defined guidelines for transforming security policy to concrete rule set.

  • PDF