• Title/Summary/Keyword: information security knowledge

Search Result 569, Processing Time 0.034 seconds

The Effects of Information Security Vaccine User's Construal Level and Message Type on the Information Security Behavior (정보보안 백신 사용자의 해석수준과 메시지유형이 정보보안행동에 미치는 영향)

  • Lee, Kyong Eun;Kim, Jung Yoon;Hyun, Jung Suk;Park, Chan Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.6
    • /
    • pp.33-42
    • /
    • 2015
  • Based on the Construal Level Theory, this study aims to investigate how information security vaccine users' selection intentions differ from each other according to the selection time of information security vaccine, advertisement message types, and information security knowledge levels. For the foregoing, this study conducted an experiment by applying an experimental design of 2(knowledge level: high/low) ${\times}2$(temporal distances: short distance/long distance) ${\times}2$(advertisement message types: how(concrete)/why(abstract)) on computer security vaccine softwares. As a result, this study confirmed that the selection intentions about information security vaccines differed from each other according to the temporal distance and advertisement message type, and also varied according to the information security knowledge level. In conclusion, this study provides an implication that the consideration of well-timed persuasive message is especially important for the users at the high level of knowledge. Also, this research implies the necessity of development of abstract thinking ability based on temporal distance for the users at the low level of knowledge.

The Effect of Information Security Related Stress and Person-Organization Fit on Knowledge Sharing Behavior (정보보안 관련 스트레스와 개인조직 적합성이 정보보안 지식공유행동에 미치는 영향)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.247-258
    • /
    • 2021
  • Recently, organizations are demanding strict information security behavior from their employees. Strict information security policies and techniques can cause information security related stress. The purpose of this study is to present the negative effects of information security related techno stress and role stress that reduce knowledge sharing behavior and person-organization fit. The survey was conducted to people working in organizations with information security policies and system, and the research hypothesis was verified by structural equation modeling using 309 samples. As a result of the study, person-organization fit had a positive effect on knowledge sharing behavior, but role stress had a negative effect. And, techno-stress negatively affected the person-organization fit. Additionally, role ambiguity had a moderating effect between person-organization fit and knowledge sharing behavior. The implications of the study were to confirm the negative effects of information security related techno stress and role stress, and to suggest directions for minimizing negative behavior of insiders.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

Design of document security to maximize knowledge value (지식가치를 극대화하기 위한 다큐먼트 보안 디자인)

  • Jang, Deok-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.161-170
    • /
    • 2003
  • Knowledge management system building knowledge acquisition, knowledge share, and knowledge maintenance for the member of corporation is expanded throughout whole industry to cope with rapid business environment. Electronic document basing knowledge management system can copy, print, and transfer knowledge to another party, so it is being regarded as a essential infrastructure to share knowledge. However, considering most of information leakage is sprung up by insider of organization, it is considered to provide countermeasure to protect illegal use from information leakage. The purpose of this paper is to establish digital information security system through design of document and manage digital information assets safely through electronic document security system protecting illegal leakage of digital information assets.

  • PDF

A Study on the Capability of Cyber Security Education and Training Professional Personnel (사이버보안 교육훈련 전문 인력의 역량에 관한 연구)

  • Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

Food Security and Nutrition Information and Knowledge Management in Case of Cambodia

  • Vong, Sokha
    • Agribusiness and Information Management
    • /
    • v.2 no.1
    • /
    • pp.117-128
    • /
    • 2010
  • Coordination has been identified as a concern in the cross-cutting issues of food security and nutrition (FSN) in Cambodia. Food Security and Nutrition Information System (FSNIS) in Cambodia is the only "entry portal" to support policy formulation and decision-making with regard to FSN. While this knowledge and information management system has earned a respectful reputation, Council for Agricultural and Rural Development (CARD) faces many challenges in the implementation of the system. This paper will present how FSNIS has been developed and impacts on policy or strategy related to FSN. In addition, sustainability of the system is a key challenge for FSNIS; yet it is interesting to see how it works. Along with a success story, FSNIS is recognized by its stakeholders as the most successful knowledge and information management system in the field of FSN in Cambodia.

  • PDF

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance (4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석)

  • Kim, Kihyun;Cho, Hyejin;Lim, Sohee
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.41-59
    • /
    • 2020
  • This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

Extended OTP Mechanism For Mobile Financial Services (모바일 금융 서비스를 위한 확장된 OTP 메커니즘)

  • Han, Changyun;Lim, Naseok;Choi, Okkyung;Hong, Manpyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.762-764
    • /
    • 2011
  • 스마트폰 보급의 확산으로 모바일 금융 서비스 이용자 수는 증가하고 모바일 금융 보안에 대한 중요성이 증가되고 있는 실정이지만 해마다 다양해지는 금융 공격에 대비하기는 결코 쉽지 않다. 최근 주로 사용되고 있는 금융 보안 인증 방식인 OTP(One-Time Password)는 세션 공격에 대한 보안 대비가 가능하지만 차별화된 OTP 생성 메커니즘을 적용하는 것이 힘든 단점이 있다. 본 연구에서는 이러한 기존 방식의 문제점을 해결하기 위해 확장된 OTP 메커니즘을 이용한 새로운 금융 보안 방식을 제안하고자 한다. 제안 방식은 센서 네트워크를 금융 보안 알고리즘에 적용시킨 위치 기반 동기화 방식의 OTP 생성 메커니즘으로서 다양한 금융 해킹과 공격 기법에 대비가 가능하다.

The Technology of the Audio Feature Extraction for Classifying Contents (콘덴츠 분류를 위한 오디오 신호 특징 추출 기술)

  • Lim, J.D.;Han, S.W.;Choi, B.C.;Chung, B.H.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.6
    • /
    • pp.121-132
    • /
    • 2009
  • 음성을 비롯하여 음악, 음향 등을 포함하는 오디오 신호는 멀티미디어 콘텐츠를 구성하는 매우 중요한 미디어 타입이며, 미디어 기록 매체와 네트워크의 발전으로 인한 데이터 양의 급격한 증대는 수동적 관리의 어려움을 유발하게 되고, 이로 인해 오디오 신호를 자동으로 구분하는 기술은 매우 중요한 기술로 인식되고 있다. 다양한 오디오 신호를 분류하기 위한 오디오 신호의 특징을 추출하는 기술은 많은 연구들을 통해 발전하여 왔으며, 본 논문은 오디오 콘텐츠 자동 분류에서 높은 성능을 갖는 오디오 신호 특징 추출에 대해서 분석한다. 그리고 특징 분류기 중에서 안정적인 성능을 가지는 SVM을 사용한 오디오 신호 분류 방법을 알아본다.

A Brief Survey of Zero Knowledge Proofs

  • Shin, Hyunyong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.25-40
    • /
    • 1992
  • In cryptography, the notion of zero-knowledge is important. It is also related to complexity theory. In this paper we briefly survey the zero-knowledge proofs in the literature.

  • PDF