• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.026초

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • 제18권4호
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Study on the Risks Excluded of Marine Insurance Claims (해상보험 클레임의 면책위험에 관한 고찰)

  • Jung Sung-Hoon;Choi Hyuk-Jun
    • Journal of Arbitration Studies
    • /
    • 제15권2호
    • /
    • pp.125-162
    • /
    • 2005
  • This paper examined excluded risks of insurer in marine insurance generally, and found out the existing studies on the excluded risks, which were accomplished partially and fragmentarily, to conduct a comparative analysis of marine insurance based on the general flow of claim adjustment. It arranges the existing studies to settle a dispute between the parties -insurer and assurer- and studies the excluded risk based on risk change of the insured by analyzing characteristic and class of security violation, and meaning, form, effect of risk change. it inquires into and analysis cases of the Korean Supreme Court related to the exclusion and illegal act of marine insurance to compare marine theorists' opinion with commercial law.

  • PDF

The Relationship of Privacy Violation and Psychological Distance in Korean Ubiquitous Government Service (한국 유비쿼터스 정부 서비스에서의 사생활 침해와 심리적 거리와의 관계)

  • Cho, Sung-Bin;Kim, Jin-Hwa;Ha, Byoung-Chun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • 제34권2호
    • /
    • pp.15-34
    • /
    • 2009
  • Today the u-government services are becoming more personalized and intelligent. For the successful implementation of personalization, individual user's privacy concerns must be respected and taken care of. Based on the empirical survey results, this research summarizes the reluctance to the government's use of private information using six categories. We measure user's psychological distance toward e-government using the four levels, adopting the suggestions by the Proxemics. Since a positive correlation is Identified between people's psychological Intimacy toward e-government and their tolerance to the use of private Information, the amount and/or types of private information should be sequentially used in personalization systems. Initially allowing the least intolerable private information such as occupation information, the personalization system should additionally use the next tolerable Information such as health information or service request/interest information, as user's psychological distance toward government services becomes shorter.

A Study on Security Kernel of Linux System (Linux 시스템의 보안커널에 관한 연구)

  • Han, Myung-Mook;Lee, Jun-Hwan
    • Convergence Security Journal
    • /
    • 제8권3호
    • /
    • pp.25-31
    • /
    • 2008
  • SELinux, security operating system, is the security system which implements mandatory access control using linux security module on the traditional linux kernel supporting discretionary access control. But intrusion detection and logging are lacked when system intrusions are happened. This study proposes a SELinux security kernel which performs detection of access violation and privilege restriction using dynamic access control. It detects the intrusion using security check when the abnormal access of system is happened, and dynamically changes the system privilege for the intruder through privilege restriction. Finally we prevent reintrusion and explain the result of experiment.

  • PDF

COMPUTATIONAL PITFALLS OF HIGH-ORDER METHODS FOR NONLINEAR EQUATIONS

  • Sen, Syamal K.;Agarwal, Ravi P.;Khattri, Sanjay K.
    • Journal of applied mathematics & informatics
    • /
    • 제30권3_4호
    • /
    • pp.395-411
    • /
    • 2012
  • Several methods with order higher than that of Newton methods which are of order 2 have been reported in literature for solving nonlinear equations. The focus of most of these methods was to economize on/minimize the number of function evaluations per iterations. We have demonstrated here that there are several computational pit-falls, such as the violation of fixed-point theorem, that one could encounter while using these methods. Further it was also shown that the overall computational complexity could be more in these high-order methods than that in the second-order Newton method.

Analysis of BOD Mean Concentration and Confidence Interval using Bootstrap Technique (Bootstrap 기법을 이용한 BOD 평균 농도 및 신뢰구간 분석)

  • Kim, Kyung Sub
    • Journal of Korean Society on Water Environment
    • /
    • 제26권2호
    • /
    • pp.297-302
    • /
    • 2010
  • It is very important to know mean and confidence interval of water-quality constituents such as BOD for water-quality control and management of rivers and reservoirs effectively. The mean and confidence interval of BOD at Anseong2 and Hwangguji3 sampling stations which are located at the border of local governments in Anseong Stream were estimated and analyzed in this paper using Bootstrap technique which is one of non-parametric statistics. The results of Bootstrap were compared with arithmetic mean, geometric mean, Biweight method mean as a point estimator and distribution mean came from the appropriate probability distribution of Log-normal. In Bootstrap technique 12 data set was randomly selected in each year and 1000 samples was produced to get parameter of population. Visual Basic for Applications (VBA) of Microsoft Excel was utilized in Bootstrap. It was revealed that the Bootstrap technique can be used to explain more rigorously and robustly the achievement or violation of BOD target concentration in Total Maximum Daily Load (TMDL).

Voltage Control of ULTC and Distributed Generations in Distribution System (분산전원이 연계된 배전계통에서 ULTC와 분산전원의 전압제어)

  • Jeon, Jae-Geun;Won, Dong-Jun;Kim, Tae-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • 제60권12호
    • /
    • pp.2206-2214
    • /
    • 2011
  • LDC(Line Drop Compensation) is widely used in controlling ULTC(Under Load Tap Changer) output voltage at distribution substation. However, LDC may experience some difficulties in voltage control due to renewable energy resources and distributed generations. Therefore, more advanced voltage control algorithm is necessary to deal with these problems. In this paper, a modified voltage control algorithm for ULTC and DG is suggested. ULTC is operated with the voltages measured at various points in distribution system and prevents overvoltage and undervoltage in the distribution feeders. Reactive power controller in DG compensates the voltage drop in each distribution feeders. By these algorithms, the voltage unbalance between feeders and voltage limit violation will be reduced and the voltage profile in each feeder will become more flat.

New Initialization method for the robust self-calibration of the camera

  • Ha, Jong-Eun;Kang, Dong-Joong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.752-757
    • /
    • 2003
  • Recently, 3D structure recovery through self-calibration of camera has been actively researched. Traditional calibration algorithm requires known 3D coordinates of the control points while self-calibration only requires the corresponding points of images, thus it has more flexibility in real application. In general, self-calibration algorithm results in the nonlinear optimization problem using constraints from the intrinsic parameters of the camera. Thus, it requires initial value for the nonlinear minimization. Traditional approaches get the initial values assuming they have the same intrinsic parameters while they are dealing with the situation where the intrinsic parameters of the camera may change. In this paper, we propose new initialization method using the minimum 2 images. Proposed method is based on the assumption that the least violation of the camera’s intrinsic parameter gives more stable initial value. Synthetic and real experiment shows this result.

  • PDF

An encryption algorithm of images using a mass transfer function (물질전달함수를 이용한 영상 암호화 알고리즘)

  • 김승종;최병욱
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • 제33B권11호
    • /
    • pp.31-43
    • /
    • 1996
  • In this paper, we propsoe an encryption algorithm of image information using a mass transfer function (MTF). The algorithm is based on a diffusion phenomenon of black ink when black ink dropped in the stationary water. We mathematically analyze the phenomenon, in consideration of characteristics of image information, and apply the results of analysis to the security of image transfer phenomenon. The cryptosystem proposed in this paper enables the security services of information in narrow-band channel communication network to be provided. And in transmission of important information, it can secure against intentional disturbance and violation. Also, it can guarantee the safe flow of information.

  • PDF

Thermal Aware Buffer Insertion in the Early Stage of Physical Designs

  • Kim, Jaehwan;Ahn, Byung-Gyu;Kim, Minbeom;Chong, Jongwha
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권4호
    • /
    • pp.397-404
    • /
    • 2012
  • Thermal generation by power dissipation of the highly integrated System on Chip (SoC) device is irregularly distributed on the intra chip. It leads to thermal increment of the each thermally different region and effects on the propagation timing; consequently, the timing violation occurs due to the misestimated number of buffers. In this paper, the timing budgeting methodology considering thermal variation which contains buffer insertion with wire segmentation is proposed. Thermal aware LUT modeling for cell intrinsic delay is also proposed. Simulation results show the reduction of the worst delay after implementing thermal aware buffer insertion using by proposed wire segmentation up to 33% in contrast to the original buffer insertion. The error rates are measured by SPICE simulation results.