• Title/Summary/Keyword: policy information model

Search Result 2,144, Processing Time 0.029 seconds

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.

Development of Cross Reference R&D Information Model using Topic Map (Topic Map을 활용한 연구개발정보의 연계 모델 개발)

  • Kim, Jae-Sung;Yoon, Chong-Min
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.155-174
    • /
    • 2005
  • Recently, under the pressure of national necessity, the national S&T information system(NTIS) for collecting, managing and distributing various R&D information is under discussion. The close inter-connections and cooperations among elements in R&D process, activity, information and data levels are the basis of national S&T information system. In this paper, we propose a cross reference model of R&D information. The proposed model includes research project, person and output information which are essential in the R&D activities. By using the proposed model, a cross navigating and referencing among R&D information is possible. And various queries on the models from various viewpoints are also possible. XML Topic Map, ISO13250 Standard, is used for development of the proposed model. The efficiencies and further practical usages of proposed model are discussed by demonstrating the proposed model with an example.

Empirical Investigation of User Behavior for Financial Mydata: The Moderating Effects of Organizational Information Transparency and Data Security Policy (금융마이데이터 사용자 행동에 관한 실증 연구: 기관정보투명성, 데이터 보안정책의 조절효과)

  • Sohn, Chang Yong;Park, Hyun Sun;Kim, Sang Hyun
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.85-116
    • /
    • 2023
  • Purpose The importance of data as a key resource of the intelligence revolution is being highlighted, among all those phenomena MyData is attracting attention as a key concept by organizations and individuals that eventually leads the data economy. In this regard, this study was started to contribute to the successful settlement and continuous growth of the domestic MyData industry, which has just entered the system. Design/methodology/approach To develop and test all proposed casual relationships within the research model, we used the Value-Attitude-Behavior(VAB) model as a basic framework. A total of 385 copies were used for the final analysis, and for SPSS 25.0, MS-Excel 2016, and AMOS 24.0 to summarize respondent demographic characteristics, measurement model, and structural model. Findings Findings show that all proposed hypotheses were supported with the exception of the moderating effect of organizational information transparency between data controllability and perceived value, and between data controllability and attitude toward MyData service.

Design of Security Policy-based Intrusion Detection System Model (보안정책 기반 침입탐지 시스템 모델 설계)

  • Kim, Kang;Jeon, Jong-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.81-86
    • /
    • 2003
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion Detection System has been an active research area to reduce the risk from intruders. Especially, The paper proposes a new Security Policy-based Intrusion Detection System Model, which consists of several computer with Intrusion Detection System, based on Intrusion Detection System and describes design of the Security Policy-based Intrusion Detection System model and prototype implementation of it. The Security Policy-based Intrusion Detection Systems are distributed and if any of distributed Security Policy- based Intrusion Detection Systems detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with Security Policy-based Intrusion Detection Systems, This makes the Security Policy - based Intrusion Detection Systems improve the ability of countermeasures for new intruders.

  • PDF

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

A Study on the Operational Model for Open Access Based e-Journal Subscription of University Library (대학도서관의 오픈액세스 기반 전자저널 구독을 위한 운영모델 연구)

  • Kang, Jeong Won;Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.3
    • /
    • pp.123-145
    • /
    • 2018
  • In this study, we investigated the problems of existing e-journal subscriptions caused by open access of e-journals faced by university libraries. To solve these problems, we proposed an operational model for open access based subscription. The proposed operational model, which adapts the four concepts of subscription model, system, policy, and operation interpreted according to reality, applies open access on the premise of rational subscription of electronic journals. The proposed operational model was constructed based on national support, comprehensive operation, open access based model, and cooperation system. In particular, it emphasized the need for stable and continuous access to scholarly information through national support policy. The proposed operational model can be used as a basic data for the realization and research of open access in the domestic environment.

Development of Inventory Control System for Large-scale Retailers using Neural Network and (s*,S*) Policy (신경회로망과 (s*,S*) 정책을 이용한 대규모 유통업을 위한 재고 관리 시스템의 개발)

  • 김우주
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.223-256
    • /
    • 1997
  • Since the business scales of retailing companies become to be very large and the number of items dealt increases explosively, automation of inventory management becomes one of the most important issues to solve in retailing industry. In order to accomplish this automation of inventory management, there must be a great need to a method which can perform real-time decision making on inventory control in an automatic fashion, while communicating with inventory information systems like POS system and automatic warehousing system. But even in this circumstance, there are also many obstructions to such automation like varying demands, limited capacity of warehouse and exhibition room, need for strategic consideration on inventory control, etc., in a real sense. Due to these reasons, it seems very difficult that most large-scaled retailing companies get fully automated inventory management system. To overcome those difficulties and reflect them into inventory control, we propose a automated inventory control methodology for retailing industry based on neural network and policy model. Especially, policy model is devised to deal with dynamic varying demands and using this model, strategic goals on inventory can be considered into inventory control mechanism. Our proposed approach is implemented in workstation and its performance is also empirically verified also against to real case of one of the major retailing firm in Korea.

  • PDF

A Policy Direction for Promoting Wireless Industry by the Widespread Utilization of Radio Waves (전파이용 확산에 따른 전파 산업 활성화 방향)

  • Park, Seok-Ji;Park, Duk-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.7
    • /
    • pp.701-709
    • /
    • 2013
  • In this paper, we studied a policy direction for promoting wireless industry. For this, we defined the concept of wireless industry and classified their structure and suggested a growth model of wireless industry and policy elements, which is composed of technology development, service development, advancement of law and regulations, business model development, assistance of production and use, publicity enforcement for promotion. Also, we had a survey on the policy elements for promoting the industry by experts interview. We drew some policy directions for promotion of wireless industry from survey results.

An Analysis and Evaluation of Policy-Based Network Management Approaches (정책기반 네트워크 관리 구조의 분석과 평가)

  • Lim Hyung J.;Lee Hyun J.;Lee Jong H.;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.289-300
    • /
    • 2005
  • This paper proposed an analytical framework to compare and model the policy-based network management; centralized and distributed typed model. Policy-based network is introduced in various application fields, and a policy framework can offer different processing performance according to application. Therefore, we evaluated the performance and extensibility of each PBNM model when we apply the policy process to the models. The evaluated measurement metrics are policy provisioning time, traffic occurrence amount, PDP processing rate, and global conflict detection in qualitative simulation. The results show that the suitable structure is required according to the analysis for the careful application characteristics, when PBNM is adopted. The modeling framework presented in this paper is intended to quantify the merits and demerits among the currently suggested PBNM models.