• Title/Summary/Keyword: policy information services

Search Result 1,603, Processing Time 0.03 seconds

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy (정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로)

  • Oh, Jinwouk;Baek, Seung Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

A Study of Trade Policy on telecommunications services and Its Implications (우리나라의 통신서비스 통상정책의 시사점과 방향에 관한 연구)

  • Kang, Shin-Won;Jo, Seok-Hong;Bae, Hong-Kyun
    • International Commerce and Information Review
    • /
    • v.11 no.2
    • /
    • pp.259-279
    • /
    • 2009
  • Recently, FTA is quickly spreading out all over the world. In Korea, roles of trade in the economy are significantly important. Therefore, in order to adapt quickly to changed international trade environment, FTA negotiation and its agreements have been accelerated. In Korea, the trade deficit is expected to continue in telecommunications services sector. Meanwhile, pressures to open the market have been intensified in telecommunications services at WTO and FTA negotiations. Therefore, in the middle of opening the market, the expansion plans to increase the competitiveness of our telecommunications services are required to be searched. Thus, in this paper, we reviewed the Korea trade policy status related to telecommunications services based on realistic situation. Also, after reviewing the trade issues which are raised in the WTO and FTA negotiations, the major issues in WTO and FTA were driven to the lessons.

  • PDF

A Study on Developing Science Service of Science and Technology Policy (과학기술 정책의 과학화 서비스 개발에 관한 연구)

  • Shin, Mun-Bong;Chun, Seung-Su;WhangBo, Taeg-Keun
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.83-92
    • /
    • 2012
  • The development of science and technology oriented knowledge society accelerates the convergence between scientific theory and industrial technology and increases the complexity problem of social and economic sectors. These cause the difficulty of securing the reliability and objectivity of science and technology policy. These also are barriers of balanced evaluation between rational science and technology policy making, management, and policy coordination. In this regard, Advanced countries in science and technology develops policy support system and promotes the program of evidence-based SciSIP(Science of Science and Innovation policy) together. This paper introduces a new approach developing science service of science and technology policy utilizing business intelligence technology in Korea. Also, it proposes the integration method of policy knowledge base and component-based service supporting S&T policy decision-making process and introduces services case studies.

A Study of Priority of Policies for Strengthening Capability in the Information and Communication Work Business (스마트융합 환경 하의 정보통신공사업 역량강화를 위한 정책우선순위 연구)

  • Kwak, Jeong Ho;Park, Sang Soo;Kim, Jeong Yeon
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.85-97
    • /
    • 2015
  • The information and communications construction business has the characteristics of an infrastructure industry and responsibility for the construction and maintenance of all ICT infrastructures. With the recent proliferation of the smart convergence of various industries based on ICT infrastructure, the role of the information and communications construction business has been highlighted to accommodate the convergence and implementation environment in construction and medical industries. Therefore, this paper seeks policy measures to establish the new role of the information and communications business under the rapidly developing smart convergence environment and the priorities of policy measures to strengthen the capability of the information and communications business using a quantitative model. The analysis result suggests that the difference in importance of each policy measure should be considered in order to execute effectively the policy of promoting the information and communications construction business. Given the constraint of limited budget, policy priorities include the development of new markets, and establishment of incentive for new technology. This study is significant for its theoretical contribution, being the first quantitative approach to policy priorities for the promotion of information and communications construction business under the smart convertgence environment.

The Study on the Policies of the Public Libraries for the People with Disabilities (장애인에 대한 공공 도서관 서비스 정책에 관한 연구)

  • Jeon, Jae-Bong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.4
    • /
    • pp.157-173
    • /
    • 2002
  • To bridge digital divide, the nation's information services should be focused their attentions on people with disabilities. According to this philosophy, the public library's services for people with disabilities should be main streamed into its regular services. Providing equitable access for people with disabilities to public library's resources, facilities, and services, the standard library services policy or guideline should be developed as soon as possible. A draft in this papers may be helpful to a policy maker for public library services for people with disabilities

A Model of Quality Grading Policy for Location Information (위치정보의 품질 등급화 정책 모델)

  • Lee, Jun-Wook;Nam, Kwang-Woo;Kim, Kwang-Soo
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.13-24
    • /
    • 2005
  • This paper proposes a model for the location information grading policy. Location information grading policy is that government would give a public notice of criterion for location information quality, and location information operators should elucidate the grade of provided location information. As the quality grade of services is provided in the 'terms of use' with the detailed quality specification and quality range, the user can understand the quality of location information, and can select more suitable service for their purposes. Additionally, the qualiy grading policy can enforce the location information operators and location service providers to support more stable and reliable service quality. In this paper, we propose the model of location information grades, the typical classification of quality, and the realitic policy applying model. Recent enacted 'Location Information Law' are expected to activate korean information market. In this situation, proposed location information grading policy take a role in protecting location privacy and improving the reliability of location information services.

  • PDF

Web Service Migration based on Contexts (컨텍스트에 기반한 웹 서비스 이동)

  • Kim, Yeon-Seok;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.106-116
    • /
    • 2008
  • It is difficult to provide Web services on a mobile environment because of the intermittent disconnection of a wireless network and the frequent change of context information. To resolve this, Web services must be migrate to devices, which can provide services to users seamlessly. However, researches on hosting, migrating, and replicating Web services on mobile devices are still in an early stage. This paper presents a lightweight Web service framework and an efficient method for establishing a policy of migrating Web services. Based on the WS-Policy standard, the proposed method defines a policy schema, which provides constructs for describing various kinds of contextual information. Specifically, the schema is designed to be extensible enough for different service providers to use different vocabularies to describe their policies. To show the validity, the proposed method for establishing a migration policy has been applied to our mobile Web services framework, resulting in a seamless provisioning of services.

  • PDF

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.