• Title/Summary/Keyword: information policy

Search Result 10,247, Processing Time 0.032 seconds

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

A Case Study on Efficiency Evaluation of DMUs Performances for Digital Pioneer Project by Data Envelopment Analysis Model (DEA를 활용한 차세대첨단콘텐츠육성사업 참여 DMU의 효율성 평가에 관한 사례 연구)

  • Shin, Jae-Shig;Yang, Hae-Sool
    • Journal of Information Technology Services
    • /
    • v.6 no.1
    • /
    • pp.65-81
    • /
    • 2007
  • Recently, the affiliates of the Ministry of Information and Communication have been conducting a performance evaluation study on IT policy projects, based on the performance evaluation model of the U.S. Office of Management and Budgets, with regard to investment in computerization. The performance evaluation model for the policy project could provide the objective information required for the planning, development, and operation of the policy project. However, the performance of the most policy project is likely to be evaluated using the subjective evaluation criteria of evaluators. Therefore, this case study evaluates the relative efficiency using DEA (Data Envelopment Analysis) in order to improve the performance evaluation method of the digital pioneer' project implemented by the Korea IT Industry Promotion Agency. The improvement value of inefficient Decision Making Units (DMUs) was measured by a static efficiency analysis. The measured value will suggest a objective viewpoint of the performance between DMUs to evaluators. In doing so, it will show an appropriate direction for the policy project to be evaluated successfully.

Latency Hiding based Warp Scheduling Policy for High Performance GPUs

  • Kim, Gwang Bok;Kim, Jong Myon;Kim, Cheol Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • LRR(Loose Round Robin) warp scheduling policy for GPU architecture results in high warp-level parallelism and balanced loads across multiple warps. However, traditional LRR policy makes multiple warps execute long latency operations at the same time. In cases that no more warps to be issued under long latency, the throughput of GPUs may be degraded significantly. In this paper, we propose a new warp scheduling policy which utilizes latency hiding, leading to more utilized memory resources in high performance GPUs. The proposed warp scheduler prioritizes memory instruction based on GTO(Greedy Then Oldest) policy in order to provide reduced memory stalls. When no warps can execute memory instruction any more, the warp scheduler selects a warp for computation instruction by round robin manner. Furthermore, our proposed technique achieves high performance by using additional information about recently committed warps. According to our experimental results, our proposed technique improves GPU performance by 12.7% and 5.6% over LRR and GTO on average, respectively.

Understanding an Employee Information Systems Security Violations (조직 구성원들의 정보보안 정책 위반에 영향을 미치는 요인)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.19-32
    • /
    • 2013
  • The purpose of this paper is to find an answer why employees in organization violate the organizational information security policy. To do this, this study is rooted in the moral disengagment theory. This study found that moral belief and perceived sanction have an effect on security policy violation. However, if moral disengagement is involved in the research model, perceived sanction is not significant. Finally, SETA, moral belief, and perceived sanction have a negative effect on moral disengagement, which in turn moral disengagement influences positively the security policy violation. The conclusions and implications are discussed.

Implication of ICT Policy to the Agriculture and Rural Development: Opportunities and Challenges for the Case of Bangladesh

  • Hossain, Md. Dulal
    • Agribusiness and Information Management
    • /
    • v.2 no.1
    • /
    • pp.105-116
    • /
    • 2010
  • In this knowledge based society, the debate on ICT has permanently shifted from 'why' ICT for development, to 'how' comprehensive and holistic ICT policies can unleash human potential and enhance people's capabilities to improve their lives. Recognizing this untapped potential and development strategies incorporating ICT are being increasingly promoted and launched across the developing countries. While the potential advantages of ICT for development are enormous in developed countries, national policies of developing countries are yet to adequately reflect truly comprehensive and integrated strategies for harnessing and exploiting this potential. This paper presents an analysis of National ICT policy of Bangladesh. Through the examination of ICT policy, in particular in the field of agriculture and rural development and analysis of applied policies and strategies implemented in these area, this paper identifies challenges and opportunities which provides lessons for policy-makers and practitioners involved in the field. This analysis reveals that the policy is inadequate to impact positively on the agriculture and rural development of Bangladesh. The policy places little emphasis on the integration and infusion of ICT in the country's agriculture and rural development. Policy implications and suggestions are offered to ensure maximum use of ICT potentials in the country's agriculture and rural development.

  • PDF

A System Simulation for Investigation of IT and Society Co-evolution Dynamics and Its Policy Implications (시스템 시뮬레이션을 통한 기술과 사회 공진화의 동태성 고찰)

  • Kim, Sang-Wook;Jung, Jae-Lim
    • Korean System Dynamics Review
    • /
    • v.9 no.1
    • /
    • pp.171-197
    • /
    • 2008
  • By applying Systems Simulation technique, this paper aims to investigates the dynamics underlying the coevolution of IT(information technology) and the society. Particularly, a series of basic questions are explored to answer by developing a simulation model for the mechanisms underlying the 'hype curve' ever occurring in the course of technology diffusion into society: First, why hype curve appears in the process of technology and society coevolution. Second, how to enhance the tapering level at the final stage of coevolution. Third, what are the key policy leverages and when is the right time for the policy intervention. As now, inflated expectations regarding ubiquitous information technology (u-IT) are growing very fast and higher than those for the previous technologies, which would result in overshoot followed by collapse of visibility and thus incur tremendous amount of social costs. In this regard implications drawn from this study perhaps give some insights not necessarily to the academics but also to the practitioners and policy makers facing the advent of u-IT as a new emerging horizon of information society.

  • PDF

Optimal Packet Scheduling for Energy Harvesting Sources on Time Varying Wireless Channels

  • Kashef, Mohamed;Ephremides, Anthony
    • Journal of Communications and Networks
    • /
    • v.14 no.2
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we consider a source node that operates over a time varying channel with energy harvesting capability. The goal of the source is to maximize the average number of successfully delivered packets per time slot. The source is able to choose whether to transmit a packet or defer the transmission in each time slot. The decision which is chosen by the source depends on the channel information available and the length of the energy queue. We formulate the problem of finding the optimal policy as a Markovian decision problem. We show some properties of the value function that represents the discounted number of successfully delivered packets per time slot. We prove that the optimal policy is a threshold type policy depending on the state of the channel and the length of the energy queue. We also derive an upper bound for the average number of packets per time slots successfully received by the destination. We show using numerical results that this bound is a tight bound on the performance of the optimal policy. And we consider the case of time varying channel but without channel state information (CSI). Then, we study the impact of channel time varying nature and the availability of CSI. In this case, we show that the optimal policy is a greedy policy. The performance of this greedy policy is also calculated.

Factors Affecting Accounting Policy Choice: Evidence from Small and Medium Enterprises in Vietnam

  • DOAN, Anh Thi Thuy;LE, Binh Thi Hai;LE, Nguyet Thi My;DANG, Ly Ai
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.327-337
    • /
    • 2022
  • The purpose of this study is to determine the direction and significance of variables influencing small and medium enterprises (SMEs) decisions regarding accounting policy in Vietnam. Research data was collected through a survey of 296 subjects, including chief accountants, accountants, managers, and lecturers with practical experience in accounting work at enterprises. With the help of specialized software SPSS, determining the impact of factors on the choice of accounting policy of enterprises is done through a multivariate regression model with control tools Cronbach's alpha determination, EFA factor analysis, and Pearson correlation analysis. Research results show that there are seven factors affecting the choice of accounting policy in Vietnamese SMEs; in which, the factors information technology, legal environment, information demand, manager's awareness, and accounting qualification have a positive impact; and two factors are tax pressure, and financial leverage have a negative impact on accounting policy choice. These results are consistent with most of the previously published studies. However, in contrast to many previous studies, our research shows that accounting's psychological factor does not affect the accounting policy choice. This is consistent with the characteristics of SMEs in Vietnam because the role of accountants is not appreciated in the business.

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

The Associations of Online Health Information Search and eHealth Literacy with Perceived Information Usefulness: Analysis in the Context of Diet and Weight Control (인터넷 건강정보이해능력과 정보탐색 유형별 인지된 정보유용성 분석: 다이어트 및 체중조절 관련 정보탐색을 중심으로)

  • Shim, Minsun;Jo, Heui Sug;Jung, Su Mi
    • Health Policy and Management
    • /
    • v.28 no.2
    • /
    • pp.119-127
    • /
    • 2018
  • Background: This study aimed to examine (1) the patterns of online health information search with respect to seeking and scanning, and (2) how online search, along with eHealth literacy, predicts perceived information usefulness in the context of diet and weight control. Methods: Online survey was conducted with 299 adults from the consumer panel recruited for the purpose of quality assessment of the Korean National Health Information Portal in 2016. We conducted paired sample t-test and multiple logistic regression to address the research questions. Data analysis was performed using IBM SPSS Statistics ver. 24.0 (IBM Corp., Armonk, NY, USA) and SAS ver. 9.3 (SAS Institute Inc., Cary, NC, USA). Results: Of the respondents, 38.8% were 'high seek-high scanners,' 35.8% were 'low seek-low scanners,' 13.0% were 'high seek-low scanners,' and 12.4% were 'low seek-high scanners.' eHealth literacy was a significant, positive predictor of online information scanning (odds ratio [OR], 2.46; 95% confidence interval [CI], 1.41-4.29), but not for online information seeking (OR, 1.75; 95% CI, 1.00-3.05). With respect to perceived usefulness of online information seeking, online seeking (OR, 4.90; 95% CI, 2.19-11.00) and eHealth literacy (OR, 2.30; 95% CI, 1.11-4.75) were significant predictors. Perceived usefulness of online scanning had a significant association with online scanning (OR, 2.38; 95% CI, 1.08-5.22), but not with eHealth literacy. Conclusion: To increase the effectiveness of the health policy for online information search and related outcomes in the context of diet and weight control, it is important to develop education programs promoting eHealth literacy.