• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.026초

금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이 (Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors)

  • 이정하;이상용
    • 경영정보학연구
    • /
    • 제18권4호
    • /
    • pp.17-42
    • /
    • 2016
  • 금융회사의 정보보안사고는 정당한 접근 권한을 가진 내부자에 의해 발생하는 사례가 증가하고 있으며, 특히 외주직원에 의한 사고가 증가하고 있다. 금융회사의 외주용역 증가에 따라, 내부자 위협관점에서 정당한 권한을 가진 외주직원은 조직의 정보보안정책을 위반할 수 있는 위협적인 존재가 되고 있다. 본 연구의 목적은 내부직원과 외주직원의 차이를 분석하고 정보보안정책의 위반요인을 확인하여 금융회사의 정보보안정책이 바르게 작용할 수 있도록 하기 위함이다. 금융회사 조직원의 정보보안정책에 대한 위반요인에 대해 계획된 행동이론, 일반억제이론 및 정보보안인식을 기초하여 연구모형을 설계하고, 내부직원과 외주직원 간의 차이를 분석하였다. 분석에 사용된 설문은 온라인과 오프라인으로 수집된 363개의 샘플이 사용되었으며, 그룹 간 차이를 분석하기 위해 내부직원 246명(68%)과 외주직원 117명(32%)을 두 그룹으로 나누어 다중 집단 분석을 이용하였다. 차이 분석을 수행한 결과, 외주직원은 내부직원과 달리 정보보안정책에 대한 위반의도가 정보보안정책에 대한 주관적규범에 영향을 받지 않고 정보보안정책에 대한 행동통제에 영향을 받아 억제되는 것으로 나타났다. 이는 외주직원은 자신이 스스로 할 수 있다고 여기는 자기효능감과 같은 요인에 의해 정보보안정책에 대한 위반의도가 통제되는 것을 나타내는 것이며, 외주직원관리에 이를 응용하여 정보보안교육을 내부직원과 달리 정보보안정책에 대한 조직의 기대를 강조하기보다는 스스로 지킬 수 있을 정도로 외주직원이 기술을 가지고 있음을 강조하고 쉽게 지킬 수 있다는 것을 강조하면 더욱 효과적일 것이다. 결론적으로 금융회사의 외주직원에 대한 정보보안교육 프로그램은 정보보안정책에 대한 이해도를 높일 수 있도록 하여야 하며, 외주직원관리에서는 외주직원이 스스로 지킬 수 있도록 쉬운 보안체계를 유지하는 것이 효과적이라 할 수 있다.

해상보험 클레임의 면책위험에 관한 고찰 (A Study on the Risks Excluded of Marine Insurance Claims)

  • 정성훈;최혁준
    • 한국중재학회지:중재연구
    • /
    • 제15권2호
    • /
    • pp.125-162
    • /
    • 2005
  • This paper examined excluded risks of insurer in marine insurance generally, and found out the existing studies on the excluded risks, which were accomplished partially and fragmentarily, to conduct a comparative analysis of marine insurance based on the general flow of claim adjustment. It arranges the existing studies to settle a dispute between the parties -insurer and assurer- and studies the excluded risk based on risk change of the insured by analyzing characteristic and class of security violation, and meaning, form, effect of risk change. it inquires into and analysis cases of the Korean Supreme Court related to the exclusion and illegal act of marine insurance to compare marine theorists' opinion with commercial law.

  • PDF

한국 유비쿼터스 정부 서비스에서의 사생활 침해와 심리적 거리와의 관계 (The Relationship of Privacy Violation and Psychological Distance in Korean Ubiquitous Government Service)

  • 조성빈;김진화;하병천
    • 한국경영과학회지
    • /
    • 제34권2호
    • /
    • pp.15-34
    • /
    • 2009
  • Today the u-government services are becoming more personalized and intelligent. For the successful implementation of personalization, individual user's privacy concerns must be respected and taken care of. Based on the empirical survey results, this research summarizes the reluctance to the government's use of private information using six categories. We measure user's psychological distance toward e-government using the four levels, adopting the suggestions by the Proxemics. Since a positive correlation is Identified between people's psychological Intimacy toward e-government and their tolerance to the use of private Information, the amount and/or types of private information should be sequentially used in personalization systems. Initially allowing the least intolerable private information such as occupation information, the personalization system should additionally use the next tolerable Information such as health information or service request/interest information, as user's psychological distance toward government services becomes shorter.

Linux 시스템의 보안커널에 관한 연구 (A Study on Security Kernel of Linux System)

  • 한명묵;이준환
    • 융합보안논문지
    • /
    • 제8권3호
    • /
    • pp.25-31
    • /
    • 2008
  • 보안 운영체제인 SELinux는 임의 접근제어만을 제공하는 기존의 리눅스 커널에 리눅스 보안 모듈을 이용하여 강제적인 접근제어를 구현한 보안 시스템이다. 그러나 시스템 침입이 발생하였을 때, 침입 탐지 및 로깅만으로는 부족하다. 본 논문에서는 동적인 접근 제어를 활용하여 접근 위반 탐지 및 권한 제한을 수행하는 SELinux 보안 커널에 대해 제안한다. 시스템의 불법적인 접근이 발생할 시에 보안 검사 기능을 통해 이를 탐지하고 권한 제한 기능으로 동적으로 침입자에 대한 시스템의 권한을 변경하여 재침입을 방지할 수 있는 시스템을 실험을 통해 구현하였다.

  • PDF

COMPUTATIONAL PITFALLS OF HIGH-ORDER METHODS FOR NONLINEAR EQUATIONS

  • Sen, Syamal K.;Agarwal, Ravi P.;Khattri, Sanjay K.
    • Journal of applied mathematics & informatics
    • /
    • 제30권3_4호
    • /
    • pp.395-411
    • /
    • 2012
  • Several methods with order higher than that of Newton methods which are of order 2 have been reported in literature for solving nonlinear equations. The focus of most of these methods was to economize on/minimize the number of function evaluations per iterations. We have demonstrated here that there are several computational pit-falls, such as the violation of fixed-point theorem, that one could encounter while using these methods. Further it was also shown that the overall computational complexity could be more in these high-order methods than that in the second-order Newton method.

Bootstrap 기법을 이용한 BOD 평균 농도 및 신뢰구간 분석 (Analysis of BOD Mean Concentration and Confidence Interval using Bootstrap Technique)

  • 김경섭
    • 한국물환경학회지
    • /
    • 제26권2호
    • /
    • pp.297-302
    • /
    • 2010
  • It is very important to know mean and confidence interval of water-quality constituents such as BOD for water-quality control and management of rivers and reservoirs effectively. The mean and confidence interval of BOD at Anseong2 and Hwangguji3 sampling stations which are located at the border of local governments in Anseong Stream were estimated and analyzed in this paper using Bootstrap technique which is one of non-parametric statistics. The results of Bootstrap were compared with arithmetic mean, geometric mean, Biweight method mean as a point estimator and distribution mean came from the appropriate probability distribution of Log-normal. In Bootstrap technique 12 data set was randomly selected in each year and 1000 samples was produced to get parameter of population. Visual Basic for Applications (VBA) of Microsoft Excel was utilized in Bootstrap. It was revealed that the Bootstrap technique can be used to explain more rigorously and robustly the achievement or violation of BOD target concentration in Total Maximum Daily Load (TMDL).

분산전원이 연계된 배전계통에서 ULTC와 분산전원의 전압제어 (Voltage Control of ULTC and Distributed Generations in Distribution System)

  • 전재근;원동준;김태현
    • 전기학회논문지
    • /
    • 제60권12호
    • /
    • pp.2206-2214
    • /
    • 2011
  • LDC(Line Drop Compensation) is widely used in controlling ULTC(Under Load Tap Changer) output voltage at distribution substation. However, LDC may experience some difficulties in voltage control due to renewable energy resources and distributed generations. Therefore, more advanced voltage control algorithm is necessary to deal with these problems. In this paper, a modified voltage control algorithm for ULTC and DG is suggested. ULTC is operated with the voltages measured at various points in distribution system and prevents overvoltage and undervoltage in the distribution feeders. Reactive power controller in DG compensates the voltage drop in each distribution feeders. By these algorithms, the voltage unbalance between feeders and voltage limit violation will be reduced and the voltage profile in each feeder will become more flat.

New Initialization method for the robust self-calibration of the camera

  • Ha, Jong-Eun;Kang, Dong-Joong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.752-757
    • /
    • 2003
  • Recently, 3D structure recovery through self-calibration of camera has been actively researched. Traditional calibration algorithm requires known 3D coordinates of the control points while self-calibration only requires the corresponding points of images, thus it has more flexibility in real application. In general, self-calibration algorithm results in the nonlinear optimization problem using constraints from the intrinsic parameters of the camera. Thus, it requires initial value for the nonlinear minimization. Traditional approaches get the initial values assuming they have the same intrinsic parameters while they are dealing with the situation where the intrinsic parameters of the camera may change. In this paper, we propose new initialization method using the minimum 2 images. Proposed method is based on the assumption that the least violation of the camera’s intrinsic parameter gives more stable initial value. Synthetic and real experiment shows this result.

  • PDF

물질전달함수를 이용한 영상 암호화 알고리즘 (An encryption algorithm of images using a mass transfer function)

  • 김승종;최병욱
    • 전자공학회논문지B
    • /
    • 제33B권11호
    • /
    • pp.31-43
    • /
    • 1996
  • In this paper, we propsoe an encryption algorithm of image information using a mass transfer function (MTF). The algorithm is based on a diffusion phenomenon of black ink when black ink dropped in the stationary water. We mathematically analyze the phenomenon, in consideration of characteristics of image information, and apply the results of analysis to the security of image transfer phenomenon. The cryptosystem proposed in this paper enables the security services of information in narrow-band channel communication network to be provided. And in transmission of important information, it can secure against intentional disturbance and violation. Also, it can guarantee the safe flow of information.

  • PDF

Thermal Aware Buffer Insertion in the Early Stage of Physical Designs

  • Kim, Jaehwan;Ahn, Byung-Gyu;Kim, Minbeom;Chong, Jongwha
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권4호
    • /
    • pp.397-404
    • /
    • 2012
  • Thermal generation by power dissipation of the highly integrated System on Chip (SoC) device is irregularly distributed on the intra chip. It leads to thermal increment of the each thermally different region and effects on the propagation timing; consequently, the timing violation occurs due to the misestimated number of buffers. In this paper, the timing budgeting methodology considering thermal variation which contains buffer insertion with wire segmentation is proposed. Thermal aware LUT modeling for cell intrinsic delay is also proposed. Simulation results show the reduction of the worst delay after implementing thermal aware buffer insertion using by proposed wire segmentation up to 33% in contrast to the original buffer insertion. The error rates are measured by SPICE simulation results.