• Title/Summary/Keyword: information.

Search Result 267,419, Processing Time 0.118 seconds

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Study about the Impact of Information Security Systems on Corporate Performance: Based on IT Relatedness Theory (정보보안체계 수립이 Multibusiness 기업 성과에 미치는 영향에 관한 연구: IT Relatedness 이론 관점에서)

  • Koo, Ja Myon;Park, Joo Seok;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.129-149
    • /
    • 2013
  • According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.

Information Credibility between Social Media Site and Review Site : Which One Do I Trust More?

  • Seo, DongBack;Lee, Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.35-52
    • /
    • 2014
  • This study aims to examine how the relationship with an information source affects people to perceive credibility of online information. We developed a conceptual framework that explained how people perceived information credibility when they were familiar with the information source and/or when the information source seemed credible. We then compared the models in two different contexts, namely, online review and social media sites, to examine differences. We surveyed 136 online social media users with their online shopping experiences. Among our eight hypotheses, three (H6: the personality similarity between an information provider and an information seeker enhances the perceived credibility of the former; H7: the credibility of an information provider produces a much stronger mediating effect in review sites than in social media sites; H8: the familiarity of an information seeker with an information provider produces a stronger mediating effect in social media sites than in review sites) are fully supported and four (H1: the credibility of an information provider has a positive influence on the perceived credibility of the online information; H2: the familiarity of an information seeker with an information provider has a positive influence on the perceived credibility of the online information; H3: the goal similarity between an information provider and an information seeker enhances the perceived familiarity of the latter with the former; H5: the personality similarity between an information provider and an information seeker enhances the perceived familiarity of the latter with the former) are partially supported. The hypothesis of H4: the goal similarity between an information provider and an information seeker enhances the perceived credibility of the former is rejected. The result confirms that credibility of information is strongly mediated by credibility of information source than familiarity with information source in online review sites and vice versa in social media sites.

A Study on the influence of the tourism destination image on the Tourism Information System evaluation (관광지 이미지가 관광안내정보시스템 평가에 미치는 영향에 관한 연구)

  • Shin, Young Kee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.207-220
    • /
    • 2012
  • The goal of the information system in tourism, like that of general information systems, is to create users' information needs so that the users continuously revisit the information system and retrieve the information on a regular basis. However, unlike any other information systems, the primary objective of the tourism information system is to attract tourists to the tourist sites rather than to create the users' needs for their future revisits to the information system. The tourism information system is therefore more closely related to tourists' overall tourism destination image towards the tourism destination. In this respect, the evaluation of the tourism information system should be based on tourists' overall tourism destination image towards the sites. This study examines how tourists' overall tourism destination image towards the sites affect the evaluation of the tourism information system. Specifically, I employ the tourism information system provided by Sokcho and Delone and Mclean(2003)'s the Information System Success Model in order to investigate this research question.

Research Trends in Information Security Economics : Focused on Information Systems Journals (보안경제성 연구동향 분석 : IS 저널 중심으로)

  • Kang, Mi-Hwa;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.79-96
    • /
    • 2016
  • As numerous security breaches on a variety of information assets such as personal information, corporate secrets, computer servers, and networks have occurred, information security has emerged as a critical social issue. However, researches on economically rational information security decision-making have been few. Such researches are especially rare in South Korea where information security is considered to be a discipline of engineers. This study aims to identify the preferred themes and methodologies of information security economics research in the field of information systems by reviewing papers published in Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), European Journal of Information Systems (EJIS), Management Science (MS), and Information and Management (I&M). We hope that the results of the study will be helpful in rational managerial or policy decision-making for practitioners and suggest future research topics for researchers.

Information Mapping for Corporate Information Resources Managements (기업의 정보자원관리(情報資源管理)를 위한 정보(情報) 매핑)

  • Kim, Jae-Soo
    • Journal of Information Management
    • /
    • v.23 no.4
    • /
    • pp.39-58
    • /
    • 1992
  • Using information mapping methodology we will discover which of the multitude of information sources, services and systems used by corporation are actually resources and which are less important, redundant, or unnecessary. The discovery process of information resources will illuminate problems and opportunities related corporation's strengths and weeknesses in information quality, accessibility, performance, use, and effectiveness.

  • PDF

A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era (디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.

From Information to Knowledge: The Information Literacy Conundrum

  • Todd, Ross J.
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.131-153
    • /
    • 2010
  • The fusion of learning, information, and technology presents dynamic challenges for all librarians, educators and students in 21st century libraries and schools. At the heart of this fusion is the growth of a pervasive, integrated information environment characterized by vast quantities of digital content, open choice, collaborative and participatory digital spaces, and the transition of the web environments from consumption of information to creation of information. This environment heralds important opportunities for librarians and teachers to rethink, re-imagine and recreate a dynamic approaches to information literacy instruction. Drawing on an extensive body of research undertaken through the Center for International Scholarship in School Libraries (CISSL), and published research on both information literacy and constructivist learning, this paper provides a critical examination of the current status of information literacy: its multiple conceptualizations, competing models, viewpoints, and its operationalizations in educational and library environments. The paper will challenge information literacy practices which center on simplistic, reductionist approaches to information literacy development, and the separation of information process and knowledge content. In particular it will address apparent contradictions in espoused conceptions of information literacy which revolve around "knowledge": knowledge construction, critical thinking, problem solving and the development of knowledgeable people; and information literacy practices which revolve around "information": a predominant focus on skills of access and evaluation of resources and with less attention given to engaging with found information to develop deep knowledge and understanding. The paper will present a series of challenges for moving forward with information literacy agendas in libraries and schools.

[ $Computer{\cdot}Information$ ] Use Curriculum toy Information Literacy Development (정보능력 개발을 위한 컴퓨터${\cdot}$정보 이용 교육과정 -교과 교육의 관점을 중심으로-)

  • Hahm Myung-Shik
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.33 no.3
    • /
    • pp.127-144
    • /
    • 1999
  • The purpose of this study is to develop information use curriculum for information literacy development of students. School education in information society needs the development of students' information capabilities, and the curriculum of Information use for it. As the speed that the knowledge learned in schools became useless, has been accelerated, the importance of ability to manage new information and knowledge has risen Information capability means capabilities to access, analyze, apply and evaluate information through various kinds of Information media such as printed information, audiovisual information, electronic communication information. experiences information. The information use curriculum is to develop information capabilities to inquiry new information with his own established knowledge, settle ali information tasks and create new information.

  • PDF

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.