• 제목/요약/키워드: the awareness of national security

Search Result 131, Processing Time 0.025 seconds

Analysis on the effects of the Security Awareness on Knowledge Sharing Process : Focusing on National Defence Intranet (군 조직지식 공유과정에 보안의식이 미치는 영향 분석(국방인트라넷 활용중심))

  • Han, Gyu-Ha;Kim, Hyeon-Jeong;Chung, Do-Bum;Lee, Choong-C.
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.139-156
    • /
    • 2009
  • This study reviewed influential factors on knowledge sharing and examined to verify how attitude and recognition serve toward security in knowledge-related activities. This two-part study will dedicate to diffusion of knowledge sharing in the ROK Army. The findings indicate that trust and computer self-efficacy are influential factors which cause increase in knowledge sharing intention. Friendly attitude of the members result in strengthening the knowledge sharing in National Defense Intranet. As a result, it could be inferred that organizational and systematic efforts are required to foster the knowledge sharing in the army and policy to induce members' friendly attitude toward security is in need as well.

Effect of Information Security Training and Services on Employees' Compliance to Security Policies (보안교육 및 보안서비스가 조직구성원의 정보보안정책 준수에 미치는 영향)

  • Kim, Bo-ra;Lee, Jong-Won;Kim, Beom-Soo
    • Informatization Policy
    • /
    • v.25 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • In the past, organizations tended to focus on physical and technical aspects of managing corporate's information security (IS), rather than the aspect of human resources related to IS. Recently, increasing security incidents caused by organization members raise the issue of how to improve employees' compliance with security policies. This study conducted a field experiment to examine the effect of security awareness training and technical security services on employee's security behaviors. In Study 1, the number of spam opening cases were measured right after the IS training and re-measured three months later. In Study 2, a spam warning message was provided and then the number of employees' spam opening cases were counted to find out the effect of security services. It was found that both the IS training and the technical IS service were effective; they significantly decreased spam opening rates. However, the training effect did not last longer than three months. These findings suggest that organizations need to consider providing regular training programs and supplementary technical services to improve employees' compliance with security policies.

A Role-play Approach for Privacy Protection Inspiration of Elementary Students

  • Park, Gwi-Ja;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1796-1808
    • /
    • 2009
  • Elementary school students have a little awareness of privacy protection since they do not have many opportunities for systematic education on information and communication ethics. Hence, they are likely to expose their own information to others and sometimes bring on a lot of misuses by using others' information. In this paper, we provide an idea for teaching and learning methods which the elementary school students acquire privacy protection and management methods and raise their practical capabilities. We develop a role play teaching and learning model in connection with various Information and Communication Technology (ICT) activities and establish the instruction plans. Moreover, we apply them to the actual classes at grade five and six of the elementary school students respectively, and finally analyze the results. The proposed teaching and learning method shows that the students participated in a series of learning activities have higher learning effects on awareness of privacy protection than those learned with the conventional methods.

  • PDF

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung;Lee, Hyundong;Rhyoo, Shi-Kook;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.12
    • /
    • pp.1475-1484
    • /
    • 2012
  • Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

Evidence of the need for Security National Competency Standards Training (경호 NCS 교육의 필요성에 대한 실증분석)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.33-42
    • /
    • 2016
  • This study was set up hypothesis "NCS recognition ➩ NCS training needs ➩ Performance of the NCS training". The survey was conducted to explore the need for Security-related NCS education at university and awareness of the NCS for Security Studies students. Results of analyzing the internal consistency, this study showed that ensure internal consistency is calculated Chronbach's Alpha coefficient of more than 0.8. Validation of the survey was investigated by secured Convergent validity and discriminant validity among the variables calculated all over the reference value. This study showed that the model is appropriate with results using the structural equation modeling to validate the research model The correlation analysis of this hypothesis was very high as calculated the standardization factor 0.726 and 0.870 for each relationship by hypothesis testing results.

Context-Aware Security System for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 보안 시스템)

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • Many security issues occur in cloud computing service environment such as authentication, access control, and so on. In this paper, we propose an effective authentication and access control model which provide integrated management and control when we access various resources in cloud computing environment. To address these problems, we suggest a context-aware single sign-on and access control system using context-awareness, integrated authentication, access control, and OSGi service platform in cloud computing environment. And we show design and implementation of context-aware single sign-on and access control system. Also we verified the flexibility and convenience of the proposed system through multi fact based integrated authentication in cloud computing environment. We could provide flexible and secure seamless security service by user context in cloud computing environment.

A study on development strategies for military spiritual education complying with the era of peace and prosperity on the Korean Peninsula (한반도 평화와 번영시대에 부합하는 군 정신전력 교육 발전방안)

  • Kim, Nam-Seok;Park, Hyo-Sun
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.1-30
    • /
    • 2018
  • This study focused on how to supplement and develop military spiritual education in response to promotion of peace and prosperity and Change of Security Environment on the Korean Peninsula. In order to succeed in the peace and prosperity on the Korean Peninsula policy, Strengthening the military spiritual education is necessary. This study was analyzed through the survey and the results are as follows: First, the awareness level of military spiritual education is more than 68%. Second, the satisfaction level of education has been quit motivated, but, the respondents demands various methods of eduction. Third, the current mental power scores showed no significant difference for environmental change. In addition, based on the results of the research, the problem of military spiritual education is as follows. It is not enough to secure the identity that can firmly support the era of peace and prosperity on the Korean peninsula. Poor budget support might hinder improving poor education facilities and outdated equipment. Furthermore, there is a lack of research on future-oriented educational system in support of traditional education methods of repetition-type repeated education and unification. Therefore, we deducted the following development strategies for the military spiritual education in this paper. First, it is necessary to strengthen the military spiritual education to support the era of peace and prosperity on the Korean Peninsula. Second, for enhancing educational environments, the educational facilities and equipments should be improved by understanding the characteristics of the education target. Third, the integrated management of military research institutes specialized in military spiritual education should be pursued as a system development for ensuring the continuous effect of education. In conclusion, continuous attention and research are needed to establish national perspective and national security perspective, raise the military spirit and utilize various education development programs in order to develop efficient military spiritual education in the future.

  • PDF

Methodological Fundamentals Of Application Of Competencies For Teachers Of Foreign Languages

  • Zahrebniuk, Yuliia;Zheliaskov, Vasyl;Romanyshyn, Ihor;Varekh, Nonna;Yakymenko, Polina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.328-332
    • /
    • 2021
  • The article considers general tendencies in world and education, and also both principles and methods of forming professional, communicative, intercultural competences and in the process of teaching foreign language for professional purposes in the conditions of engineering, economic and other non-linguistic specialties at technical university. The article views some essential issues of this competence including awareness of pedagogical values, the construction of the pedagogical process, pedagogical communication and behavior; pedagogical technology, its essence, structural components, understanding of innovative components of professional activity, requirements for the design and engineering of pedagogical technologies.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

The attribution of the security guard failure and grope for efficient operational measures of security guard through the analysis of failures : propensity eduction of failure-factors of security guard and patterns of danger and injury (경호실패귀인과 실패사례 분석을 통한 효율적인 경호운용방안 모색 : 경호환경의 실패요인과 위해패턴 성향 도출)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.143-155
    • /
    • 2018
  • The purpose of this study is to extract the failure attributions to identify the failure factors of the security guards and to derive the risk factor factors through failure cases analysis. Failure attributions were prepared by using semi-structured questionnaires(17) and closed questionnaires(179) starting from the fully open questionnaires(8), and processed through SPSS 21.0 and AMOS 21.O statistical packages. As a result of summarizing the causal relationship between the failure attribution and the failure case (patrol failure pattern factor), In Park Jung-Hee's assassination, lack of experience(2), negative mind(1), lack of work ability(1), lack of experience(2), organizational non-system activeness(2), lack of awareness of mission(1) Failure(2), lack of consciousness(2), and 14 failure patterns were found. Aung-San National Cemetery explosion occurred in eight failure patterns including insecurity(1), negative mind(1), lack of work skills(2), lack of experience(2), individualism(1), There were eight failure patterns in the case of Mr. Yook Young-Su 's sniping, including insincerity(2), negative mind (1), lack of experience(2), lack of awareness of mission(2) and failure to share work(1).

  • PDF