• Title/Summary/Keyword: mobile-government information security management system

Search Result 7, Processing Time 0.021 seconds

National Institution's Information Security Management on the Smart phone use environment (스마트폰 이용 환경에서 국가기관 정보보호 관리방안)

  • Kim, Ji-Sook;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.83-96
    • /
    • 2010
  • The rapid spread of smart phone in recent years changes not only personal life but also work environment of organizations. Moreover, smart phone provoke service combination between industries and transit the digital paradigm in our society because of the character that anyone can develop or use the application of smart phone. Under these circumstances, the government hastens the construction of mobile-government in order to improve national services and communication with people. However, since security threats on smart phone become more critical recently, we should hurry the counter measures against mobile threats or we will face obstacles to the activation of mobile-government. On this article, we suggest the methods of information security and the Mobile-government Information Security Management System(M-ISMS) on the smart phone use environment for building up the secure and convenient mobile system in the national institution.

An Empirical Study on the Influencing Factors of Intention to Adoption of Mobile Government Service (모바일 전자정부 서비스 수용의도의 영향요인에 관한 연구)

  • Han, Kihun;Kim, Jinsoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.77-104
    • /
    • 2013
  • Mobile technology is accelerating innovative changes across all fields of our society as well as business environments. Especially, demands on mobile government (M-government) services have been increased gradually since e-government has improved national administration services dramatically. However, high-quality services which are acceptable to may users are not actually supplied because technical issues such as security on mobile e-government services have not solved and governance policy was not established yet. Previous studies show that most researches are devoted to technical ones or limited to theoretical exploratory study. As a result, developing useful guidelines which are practically and theoretically proved is one of the very important research issues. This study reviews the previous research works such as concept of mobile, e-government, M-government, technical trends of mobile, market situations, present status, and various case studies. And then we develop a research model with five factors, twenty four variables and seventy six measurement for measuring the influencing factors to adoption of M-government services. The model is composed of total 16 hypotheses, 22 variables, and 76 measurements. The model is analyzed by using statistical package SPSS (18.0) and AMOS (18.0) together with structural equation method based on 294 samples. The results show that the model is valid and there are statistically significant influence between ease of use and usefulness, ease of use and user's satisfactions, usefulness and intent of re-use, and user's satisfactions and intent of re-use, excepting usefulness and user's satisfaction, ease of use and intent of re-use did not affect significant influences. Especially, service quality, system quality, and relationship quality are identified as influencing factors to adaption of M-government service. The results are expected to provide a theoretical research framework which generate new research issues in M-government service area. It also can provide an useful guidelines to practical experts in successfully implementing M-government services. Further research directions are as follows. User's intents have to be studied in details by classifying users by individual, enterprise, and government as well as developing a new hypothetical model. Since M-government service is at the initial stage, longitudinal studies have to be conducted to trace the peoples' need in order to develop new high-quality mobile services.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

NFC-based Smartwork Service Model Design (NFC 기반의 스마트워크 서비스 모델 설계)

  • Park, Arum;Kang, Min Su;Jun, Jungho;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.157-175
    • /
    • 2013
  • Since Korean government announced 'Smartwork promotion strategy' in 2010, Korean firms and government organizations have started to adopt smartwork. However, the smartwork has been implemented only in a few of large enterprises and government organizations rather than SMEs (small and medium enterprises). In USA, both Yahoo! and Best Buy have stopped their flexible work because of its reported low productivity and job loafing problems. In addition, according to the literature on smartwork, we could draw obstacles of smartwork adoption and categorize them into the three types: institutional, organizational, and technological. The first category of smartwork adoption obstacles, institutional, include the difficulties of smartwork performance evaluation metrics, the lack of readiness of organizational processes, limitation of smartwork types and models, lack of employee participation in smartwork adoption procedure, high cost of building smartwork system, and insufficiency of government support. The second category, organizational, includes limitation of the organization hierarchy, wrong perception of employees and employers, a difficulty in close collaboration, low productivity with remote coworkers, insufficient understanding on remote working, and lack of training about smartwork. The third category, technological, obstacles include security concern of mobile work, lack of specialized solution, and lack of adoption and operation know-how. To overcome the current problems of smartwork in reality and the reported obstacles in literature, we suggest a novel smartwork service model based on NFC(Near Field Communication). This paper suggests NFC-based Smartwork Service Model composed of NFC-based Smartworker networking service and NFC-based Smartwork space management service. NFC-based smartworker networking service is comprised of NFC-based communication/SNS service and NFC-based recruiting/job seeking service. NFC-based communication/SNS Service Model supplements the key shortcomings that existing smartwork service model has. By connecting to existing legacy system of a company through NFC tags and systems, the low productivity and the difficulty of collaboration and attendance management can be overcome since managers can get work processing information, work time information and work space information of employees and employees can do real-time communication with coworkers and get location information of coworkers. Shortly, this service model has features such as affordable system cost, provision of location-based information, and possibility of knowledge accumulation. NFC-based recruiting/job-seeking service provides new value by linking NFC tag service and sharing economy sites. This service model has features such as easiness of service attachment and removal, efficient space-based work provision, easy search of location-based recruiting/job-seeking information, and system flexibility. This service model combines advantages of sharing economy sites with the advantages of NFC. By cooperation with sharing economy sites, the model can provide recruiters with human resource who finds not only long-term works but also short-term works. Additionally, SMEs (Small Medium-sized Enterprises) can easily find job seeker by attaching NFC tags to any spaces at which human resource with qualification may be located. In short, this service model helps efficient human resource distribution by providing location of job hunters and job applicants. NFC-based smartwork space management service can promote smartwork by linking NFC tags attached to the work space and existing smartwork system. This service has features such as low cost, provision of indoor and outdoor location information, and customized service. In particular, this model can help small company adopt smartwork system because it is light-weight system and cost-effective compared to existing smartwork system. This paper proposes the scenarios of the service models, the roles and incentives of the participants, and the comparative analysis. The superiority of NFC-based smartwork service model is shown by comparing and analyzing the new service models and the existing service models. The service model can expand scope of enterprises and organizations that adopt smartwork and expand the scope of employees that take advantages of smartwork.

Factors Affecting South Korean Disaster Officials' Readiness to Facilitate Public Participation in Disaster Management Using Smart Technologies (재난안전 실무자의 스마트 재난관리 준비도에 영향을 미치는 요인에 관한 실증 연구 - 스마트 기술을 활용한 재난관리 민간참여 중심으로 -)

  • Lyu, Hyeon-Suk;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.35-63
    • /
    • 2020
  • As the frequency and intensity of catastrophic disasters increase, there is widespread public sentiment that government capacity for disaster response and recovery is fundamentally limited, and that the involvement of civil society and the private sector is ever more vital. That is, in order to strengthen national disaster response capacity, governments need to build disaster systems that are more participatory and function through the channels of civil society, rather than continuing themselves to bear sole responsibility for these "wicked problems." With the advancement of smart mobile technology and social media, government and society as a whole have been called upon to apply these new information and communication technologies to address the current shortcomings of government-led disaster management. As illustrated in such catastrophic disasters as the 2011 Tohoku earthquake and tsunami in Japan, the 2010 Haitian earthquake, and Hurricane Katrina in the United States in 2005, the realization of participatory potential of smart technologies for better disaster response has enabled citizen participation via new smart technologies during disasters and resulted in positive impact on the management of such disasters. In this context, this study focuses on the South Korean context, and aims to analyze Korean government officials' readiness for public participation using smart technologies. On this basis, it aims to offer policy suggestions aimed at promoting smart technology-enabled citizen participation. For this purpose, it proposes a particular model, termed SMART (System, Motivation, Ability, Response, and Technology).

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

Analyzing the Importance and Priority of Safety Information in Walking Tourism: Focusing on Open Data Utilization (도보여행 안전정보의 유형별 중요도 및 우선순위 도출: 오픈데이터 활용을 중심으로)

  • Ham, Juyeon;Choi, Sujeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • The tourism industry is now changing to smart tourism, which maximizes tourists' overall tourism experience with the use of advanced mobile technologies and emphasizes the utilization of tourism information. Despite the quantitative expansion of the tourism industry, there is a lack of academic and practical discussion on tourism safety. Especially, in the context of walking tourism, tourists are more likely to be exposed to natural or social disasters and emergencies. Therefore, it is necessary to build a system that can provide walking tourists with safety information not only on dangerous factors which are anticipated to be confronted during a walking trip in advance but also on specific dangers in real time. Under the circumstances, this study seeks to identify the types of tourism safety information that can be offered by using publicly available open data, drawing on the safety information framework on the walking tourism that is presented in Choi et al. (2017)'s study. More specifically, this study focuses on the use of open data which is provided by the Korean government. Furthermore, this study verifies the types of safety information that are most urgently needed in walking travel situations. Specifically, this study aims to derive the importance and priority of each type of safety information for a walking trip by applying the analytic hierarchy process (AHP) analysis. For this, we collected 35 questionnaires from walking tour operators (practitioners) and walking tourists. The main results are as follows. First, natural disaster information is the most important factor in the top-level factor of safety information for walking tourists, followed by social disaster, life safety, and exhibition (security crisis) information. Second, information on natural disasters, environmental pollution, and weather is considered to be important at the sub-level factor. Lastly, the noteworthy result of this study is that the importance of each type of safety information varies depending on the walking tour operators (practitioners) and the walking tourists. That is, there is a recognition difference between the operator (practitioner) and the user in the importance and priority of the safety information of the walking trip. Therefore, it is necessary to develop policies and services reflecting the opinions of potential users when providing safety information so that the most importantly recognized information can be provided first.