• Title/Summary/Keyword: Social security

Search Result 1,945, Processing Time 0.026 seconds

Theoretical Foundations Of Election Campaign Research: Problems, Approaches And Methods

  • Dreshpak, Valerii;Pavlenko, Evgen;Babachenko, Nataliia;Prokopenko, liudmyla;Senkevych, Hennadii;Marchuk, Mykola
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.113-117
    • /
    • 2021
  • The article defines the basic concepts: "election campaign", "social capital", "conversion of social capital"; the principles and methods of research of social capital conversion in election campaigns are studied; the process of using social capital in politics is defined; ways of converting social capital into politics are considered; the possibilities of converting social capital in election campaigns are described. Election campaigns have been found to be a successful form of social capital conversion. The ability to use social capital in the election campaign speaks of its high potential. Election campaigns are not an effective use of social capital.

An Integrated Computer Security Model Based on the General Trust Theory (신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구)

  • Lee, Sang-Gun;Yoo, Sang-Jin
    • Asia pacific journal of information systems
    • /
    • v.12 no.1
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

The Relationship of Security Organization's Social Capital and Job Satisfaction and Organizational Commitment (시큐리티 조직의 사회적 자본과 직무만족 및 조직몰입의 관계)

  • Kim, Il-Gon;Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.45-54
    • /
    • 2011
  • The purpose of this study is to investigate the causal relationships among social capital, job satisfaction, and organization commitment in the Korean Security Organizations. One hundred eight one questionnaires, with a 72.4% response rate from a convenient sample of 10 security organization guards, were utilized to study the relationships between research constructs. SPSS(12.0 version) were guard to analyze the unintentionality of research concepts and reliability test, and confirmatory factor analysis were performed. Factor analyses identified three internal dimensions of relational factor as superior relation. There are among results, first, the social capital is influencing to job satisfaction positively. second, the social capital is influencing to organizational commitment positively. third, the job satisfaction is influencing to organizational commitment positively.

The Relationship of Private Security Provider's Corporate Social Responsibility and Job Satisfaction and Organizational Commitment (민간경비업자의 사회적 책임과 직무만족 및 조직몰입의 관계)

  • Bae, Du-Yeol;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.53-63
    • /
    • 2011
  • The purpose of this study is to investigate the causal relationships among corporate social responsibility, job satisfaction, and organization commitment in the Private Security Provides's. One hundred eight one questionnaires, with a 72.4% response rate from a convenient sample of 12 security organization guards, were utilized to study the relationships between research constructs. SPSS(14.0 version) were guard to analyze the unintentionality of research concepts and reliability test, and confirmatory factor analysis were performed. Factor analyses identified three internal dimensions of relational factor as superior relation. There are among results, first, the corporate social responsibility is influencing to job satisfaction positively. second, the corporate social responsibility is influencing to organizational commitment positively. third, the job satisfaction is influencing to organizational commitment positively.

The Relationship Analysis of Online Security, Social Network Service, and Smartphone Expenses (보안 우려, 소셜네트워크서비스, 스마트폰 지출과의 관계분석: 잠재성장모형을 중심으로)

  • Noh, Mijin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.648-659
    • /
    • 2019
  • The social network services have spread rapidly with new issues in terms of the security. The purpose of this study is to longitudinally verify the influence of relationships among online security, social network service, and smartphone expense. The analyses were conducted on panel data of SNS users from 2015 to 2017 based on the SEM methodologies. The results indicated that anxiety of online security had an effect on the SNS usage. In addition, The results showed that anxiety of online security and SNS usage had a significant influence on the smartphone expenses. This study could provide useful guidelines for researchers and company managers, and an opportunity to develop an understanding of social network trends.

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.

An Empirical Study on the Influence of Social Network Services(SNS) and Individual Characteristics on Intention to Continuous Use of SNS (소셜 네트워크 서비스의 지속적 사용의도에 영향을 미치는 서비스 및 개인 특성에 대한 실증연구)

  • Kim, Sanghyun;Park, Hyun-Sun
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.17-38
    • /
    • 2012
  • Social network service(SNS), provided by social network sites such as Facebook, Twitter and Cyworld is rapidly growing in online business. Furthermore, many companies have growing interests in finding effective ways to use SNSs for their innovations, marketing and advertisement. In fact, firms have recognized the utility value of the SNS for their business. In this aspect, this study attempts to identify key factors influencing the intention to continuous use of SNSs. Based on the UTAUT(the Unified Theory of Acceptance and Usage of Technology)model, this study proposes the research model, including the effects of social network service characteristics(social relationship support, information sharing, image expression) and individual characteristics(self-disclosure, extroversion, familiarity) on performance expectancy as well as the moderating effect of perceived information security among UTAUT variables. The 412T sets of data collected in a survey were tested against the modeling using SEM using SmartPLS. Results indicated that social network service and individual characteristics had significant effect on performance expectancy with exception of self-disclosure. In addition, the moderating effect of perceived information security had significant effect. The results had important implications for firms providing SNSs hoping to develop a successful business model.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

A Risk Assessment Scheme of Social Engineering Attacks for Enterprise Organizations (사회공학 공격에 대한 기업조직의 위험 수준 평가 방안)

  • Park, Younghoo;Shin, Dongcheon
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.103-110
    • /
    • 2019
  • Recently security related attacks occur in very diverse ways, aiming at people who operate the system rather than the system itself by exploiting vulnerabilities of the system. However, to the our best knowledge, there has been very few works to analyze and strategically to deal with the risks of social engineering attacks targeting people. In this paper, in order to access risks of social engineering attacks we analyze those attacks in terms of attack routes, attack means, attack steps, attack tools, attack goals. Then, with the purpose of accessing the organizational risks we consider the characteristics and environments of the organizations because the impacts of attacks on the organizations obviously depend on the characteristics and environments of the organizations. In addition, we analyze general attack risk assessment methods such as CVSS, CWSS, and OWASP Risk Rating Methodolog. Finally, we propose the risk access scheme of social engineering attacks for the organizations. The proposed scheme allows each organization to take its own proper actions to address social engineering attacks according to the changes of its environments.

Countermeasures against Security Threats on Smart Device in Educational Institutions (교육기관에서의 스마트단말기 보안위협에 대한 대응방안)

  • In Ho Lee;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.13-29
    • /
    • 2024
  • Recently, with the rapid spread of mobile terminals such as smartphones and tablet PCs, social demand for mobile information security is increasing as new security issues that are difficult to predict as well as service evolution and lifestyle changes are raised. Smart terminals include smartphones, smart pads, chromebooks, laptops, etc. that provide various functions such as phone calls, text messages, Internet browsing, social media apps, games, and education. Along with the explosive spread of these smart terminals, they are naturally being used in our daily life and educational environment. In the mobile environment, behind the convenience of portability, there are more various security threats and vulnerabilities than in the general PC environment, and threats such as device loss, information leakage, and malicious codes exist, so it is necessary to take fundamental security measures at a higher level. In this study, we suggest ways to improve security by identifying trends in mobile smart information security and effectively responding to security threats to the mobile environment. In addition, it presents implications for various measures for effective class utilization along with correct security management methods and security measures related to the supply of smart devices that the Office of Education is promoting for schools at each level.