• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.026 seconds

The Research on the Influence of the Mobbing by Forming on Alienation in Job Attitude of the Private Security Guards and Control of Self-esteem : focused on Seoul-Kyunggi area (직장 내 소외감형성의 따돌림이 민간경호원의 직무태도에 대한 영향 및 자아 존중감의 조절효과에 관한 연구 : 서울·경기지역을 중심으로)

  • Kim, Yonghak;Park, Seungbyeol;Kim, Taebock;Kim, Hyunmi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.365-375
    • /
    • 2015
  • This study is significant in the sense that it minimize the negative effect of workplace bullying, ultimately it maximize organizational performance and keep private security guards physical and mental health. We tested the hypothesis that workplace bullying negatively impacts private security guard's office attitude, but there will be significant difference in influence with their level of self-esteem scale. First of all, as the result of the correlation analysis of each of variables, a positive correlation was found between self-esteem and job satisfaction but negative correlation between self-esteem they have, the more job satisfaction they get, the lower turnover intention they have. Second, we tried to find out how self-esteem affect them on their job satisfaction. Using regression analysis, we can see that job satisfaction is affected by age, workplace bullying, relational aggression and self-esteem. For example, job satisfaction is increased as they get old and self-esteem is improved, on the other hand, workplace bullying and relational aggression is decreased. Third, to find out how self-esteem affects their turnover intention, we did regression analysis. The result shows that turnover intention is affected by age, working period, workplace bulling, relational aggression and self-esteem. For example, turnover intention if higher as working period, workplace bullying, relational aggression is increased while age and self-esteem is decreased.

A weigth-based algorithm for network stability measurement (네트워크 안정성 측정을 위한 가중치 기반의 계산알고리즘 연구)

  • Lee, Wonhyuk;Noh, Minki;Cho, Buseung;Kim, TaeYeon;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.37-43
    • /
    • 2014
  • Today, group research efforts are increasing for cutting edge technologies related to climate, radio astronomy, co-utilization of high performance computing resources and more. Accordingly, networks for cutting-edge researches a re also regarded as means for cutting-edge researches nowadays. Therefore, it is necessary for administrating cutti ng-edge network to be considered, reflecting such a current trend. In this sense, 'Research which can help to admin istrate the networks which are usually used as means for a lot researches' was set as a goal of this paper.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

Firm's Market Value Trends after Information Security Management System(ISMS) Certification acquisition (정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구)

  • Jo, Jung-Gi;Choi, Sang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.237-247
    • /
    • 2016
  • This study analyzed quantitative effects of ISMS certification. To measure the company value change the stock data was used and the methodology of event study was also applied. Event study methodology is a method of analyzing the effects of information or public announcement about certain events on the stock market through abnormal return of stock price. First, ISMS certification was acquired followed by the measurement of abnormal excess return of company. Based on the increase or decrease of abnormal excess return, the group was classified. There are 3 types of groups("Increase", "Reduce", "Maintain"). Next, the cluster analysis was performed for each group. Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups(clusters). The purpose of this study is to have a quantitative measurement of performance of ISMS certification. So, the result of this study will be promoted a company's ISMS certification acquisition. And it would further be beneficial to your company's information security activities.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

A Study on Pseudo-random Number Generator with Fixed Length Tap unrelated to the variable sensing nodes for IoT Environments (IoT 환경에서 가변 센싱 노드들에 무관한 고정 길이 탭을 가지는 의사 난수 발생기에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.676-682
    • /
    • 2018
  • As the IoT world including WSNs develops, the number of sensor systems that sense information according to the environment based on the principle of IoT is increasing. In order to perform security for each sensor system in such a complicated environment, the security modules must be varied. These problems make hardware/software implementation difficult when considering the system efficiency and hacking/cracking. Therefore, to solve this problem, this paper proposes a pseudorandom number generator (FLT: Pseudo-random Number Generator with Fixed Length Tap unrelated to the variable sensing nodes) with a fixed-length tap that generates a pseudorandom number with a constant period, irrespective of the number of sensing nodes, and has the purpose of detecting anomalies. The proposed FLT-LFSR architecture allows the security level and overall data formatting to be kept constant for hardware/software implementations in an IoT environment. Therefore, the proposed FLT-LFSR architecture emphasizes the scalability of the network, regardless of the ease of implementation of the sensor system and the number of sensing nodes.

Design and Implementation of Real-Time Indirect Health Monitoring System for the Availability of Physical Systems and Minimizing Cyber Attack Damage (사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현)

  • Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1403-1412
    • /
    • 2019
  • Effect of damage and loss cost for downtime is huge, if physical devices such as turbines, pipe, and storage tanks are in the abnormal state originated from not only aging, but also cyber attacks on the control and monitoring system like PLC (Programmable Logic Controller). To improve availability and dependability of the physical devices, we design and implement an indirect health monitoring system which sense temperature, acceleration, current, etc. indirectly, and put sensor data into Influx DB in real-time. Then, the actual performance of detecting abnormal state is shown using the indirect health monitoring system. Analyzing data are acquired using the real-time indirect health monitoring system, abnormal state and security threats can be double-monitored and lower maintenance cost utilizing prognostics and health management.

Proposes the Total Management Model by using Directory Service and through the development HR Solution (Directory Service와 HR 솔루션 개발을 통한 IT 통합 관리 모델 제안)

  • Lee, Sung-jun;Kim, Min-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.684-689
    • /
    • 2013
  • The reality is that many security and administrative issues with the expansion of the IT assets in accordance with the abrupt change in the business environment, most companies today are struggling. Information within an organization is a party through external hackers and viruses that are increasingly intelligent risk, and the risk of internal data spills occur through an unauthorized party and internal information in accordance with the co-operation of the outsourcing company and the employee wants to see a sense of security and due to the frequent project asset outflows the risk is increasing gradually. In this paper, in preparation for such a growing security risk management and the increasing of problems, proposes the Total Management Model by using Microsoft's Directory Service & HR Solution that is an integrated management model that can take low-cost, high-efficiency.

  • PDF

An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems (임베디드 시스템 동적 프로그램 분석을 위한 JTAG API 구현)

  • Kim, Hyung Chan;Park, Il Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.31-42
    • /
    • 2014
  • Debugger systems are necessary to apply dynamic program analysis when evaluating security properties of embedded system software. It may be possible to make the use of software-based debugger and/or DBI framework if target devices support general purpose operating systems, however, constraints on applicability as well as environmental transparency might be incurred thereby hindering overall analyzability. Analysis with JTAG (IEEE 1149.1) debugging devices can overcome these difficulties in that no change would be involved in terms of internal software environment. In that sense, JTAG API can facilitate to practically perform dynamic program analysis for evaluating security properties of target device software. In this paper, we introduce an implementation of JTAG API to enable analysis of ARM core based embedded systems. The API function set includes the categories of debugger and target device controls: debugging environment and operation. To verify API applicability, we also provide example analysis tool implementations: our JTAG API could be used to build kernel function fuzzing and live memory forensics modules.

Characteristics of Social Security Contained in Mecius's People-Care Theory(保民論) (맹자의 보민론(保民論)이 지닌 사회보장적 성격)

  • Yoo, Jong Kook
    • Korean Journal of Social Welfare
    • /
    • v.65 no.1
    • /
    • pp.109-126
    • /
    • 2013
  • This paper aims to define Mecius's people-care theory(保民論), and aims to recognize the characteristics of social security contained in Mecius's people-care theory. Mecius considered to the public relief as King's obligation. So to speak, the King protects to the property of the people. Especially his people-care theory implicate to continuity of safety life, a relief fund on the property, protection of disaster damage. Continuity of safety life means to enabling the people procurable food, clothing and bury dead persons without difficulties. It's may be said that implicated to the theory and system of modern social-welfare. It is reason for his opinion that a state should construct in the minimum social safety network by taking responsibility for basis needs of life. He was a humanist so much. He thought about the pursuit of the human happiness and the improvement in quality of life. Therefore his idea nearly means to the social security system in a modern sense. His thought is not only an ideal background on the public assistance and a social relief security in the contemporary but also a relief activity system such as Jindaebup called historical prototype of social welfare. It is an important fact that his people-care theory implicate to social security system.

  • PDF