Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Im, Hyuk
- Will the Certification System for Information Security Management Help to Improve Organizations’ Information Security Performance? The Case of K-ISMS
Abstract Views :148 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Computer Engineering, Chungbuk National University, 1 Chungdae-ro, Seowon-gu, Cheongju, Chungbuk - 28644, KR
2 Department of Information Security Management, Chungbuk National University, 1 Chungdae-ro, Seowon-gu, Cheongju, Chungbuk - 28644, KR
1 Department of Electrical and Computer Engineering, Chungbuk National University, 1 Chungdae-ro, Seowon-gu, Cheongju, Chungbuk - 28644, KR
2 Department of Information Security Management, Chungbuk National University, 1 Chungdae-ro, Seowon-gu, Cheongju, Chungbuk - 28644, KR
Source
Indian Journal of Science and Technology, Vol 9, No 24 (2016), Pagination:Abstract
Background/Objectives: Recognizing the importance of systematic security management in organizations, the government of South Korea introduced the Information Security Management System (ISMS) certification. Methods/ Statistical Analysis: In this study, based on prior studies dealing with the goal and evaluation items of ISMS certification, we developed a model to measure the performance of ISMS certification, using the SERVQUAL models, which are service evaluation models. Also, we carried out a survey of organizations that have acquired the certification in order to prove the model’s validity and suggest ways to develop ISMS certification. Findings: In the present study, we found that investment and concern in security can influence organisational security performance based on prior research, and developed survey items for performance measurement by acquisition of ISMS certification. We conducted surveys of organisations that required ISMS certification and tried to find some factors recognisable as a performance of ISMS certification. The result of the experiment was that factors influencing security performance are responsiveness and specialty. Application/ Improvements: Future research is increased ISMS certified company in accordance with the satisfaction and effectiveness of the ISMS certified company improved through systematic empirical and hope enhance the overall security level.Keywords
Information Security Management System, ISMS Certification, Information Security Performance, Service Quality, SERVQUAL.- Necessity and Expectation for an Identification Scheme in IoT Service: Cases in South Korea
Abstract Views :136 |
PDF Views:0
Authors
Affiliations
1 Department of Management Information Systems, Chungbuk National University, KR
2 Center for Free Semester and Career and Experience Program, Korea Research Institute for Vocational Education and Training, KR
3 Department of Information Security Management, Chungbuk National University, KR
1 Department of Management Information Systems, Chungbuk National University, KR
2 Center for Free Semester and Career and Experience Program, Korea Research Institute for Vocational Education and Training, KR
3 Department of Information Security Management, Chungbuk National University, KR
Source
Indian Journal of Science and Technology, Vol 9, No 24 (2016), Pagination:Abstract
Background/Objectives: Individual things should uniquely be identified internationally, so that IoT services can be realized. Thus, a 'standardized, universal identification information system,' which can uniquely identify individual things and entities, is needed. Methods/Statistical Analysis: This study investigated the status of the use of identification schemes by industrial sector and by service through a keyword search in order to understand the global status of the use of the identification schemes. In addition, for an empirical analysis of the use of identification schemes in South Korea, a survey on the present condition of use and management of identification schemes was conducted with the entire industry sectors. Findings: As a result of a survey on the status of the use and management of identification schemes by industrial area and service investigated, it was found that identification number systems used uniquely for each industry varied. There is no standardized identification scheme used dominantly, but entry of each identification scheme into the IoT environment will play an essential role in implementing IoT service in various fields, such as smart farm, smart city, smart manufacturing, smart building, smart transportation, smart medical care, etc. Services and products in the initial stage of IoT currently implemented are themselves serving as a unique identifier or use a smart sticker or local area communication technology. In terms of technology, they are based on technologies centered on sensing and network rather than technologies about identification scheme. Application/Improvements: Not all IoT services must use an identification scheme in the future, an analysis of demands for identification schemes should precede, and based on this, a cost-benefit analysis is needed.Keywords
Identification Scheme, Internet of Things, Ipv6, Identification, MAC, URL.- A Study of Factors that Affect the Right to be Forgotten and Self-Disclosure Intent in SNS
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Center for Free Semester and Career Experience Program, Korea Research Institute for Vocational Education and Training, Republic of Korea
2 Department of Management Information Systems, Chungbuk National University, Republic of Korea
3 Department of Policy Research, Korea Institute of Science and Technology Information, Republic of Korea
1 Center for Free Semester and Career Experience Program, Korea Research Institute for Vocational Education and Training, Republic of Korea
2 Department of Management Information Systems, Chungbuk National University, Republic of Korea
3 Department of Policy Research, Korea Institute of Science and Technology Information, Republic of Korea
Source
Indian Journal of Science and Technology, Vol 9, No 26 (2016), Pagination:Abstract
Background/Objectives: We wanted to find out the relationship between self-disclosure intent to disclose themselves online openly and the right to be forgotten that they want their information to be forgotten online. Methods/Statistical Analysis: In order to measure each variable of the research model, all items of the questionnaire were measured with fivepoint Likert scale. Questionnaire items were modified according to the environment called social network service from existing studies. Also, verification for the measurement model was carried out targeting a total of 115 responses used in the analysis. For measurement model verification, we used Partial Least Square, a structural equation approach and used SmartPLS 2.0. Findings: According to the study results, perceived privacy risk had a significant effect both on privacy protection awareness and privacy concern. Perceived privacy can be understood to affect acceptance of the right to be forgotten by a medium of privacy protection awareness and privacy concern because the path known for privacy protection awareness and privacy concern to affect acceptance of the right to be forgotten was also found to be significant. On the other hand, the hypothesis that privacy self-efficacy affects privacy protection awareness and the hypothesis that privacy concern and acceptance of the right to be forgotten have a significant effect on self-disclosure intent were rejected. In order to use SNS, some degree of personal information disclosure is inevitable. Therefore, feeling concerned about privacy or not does not have any effect on self-disclosure intent in SNS. Likewise, the relationship between acceptance of the right to be forgotten and self-disclosure intent also turned out not to be related each other. Application/Improvements: Protection Motivation Theory should be applied as the antecedent of privacy protection awareness or in-depth research on other privacy-related factors affecting self-disclosure intent in addition to self-presentation needs.Keywords
Partial Least Square, Privacy Self-Disclosure, Social Network Services, The Right to be Forgotten- An Empirical Study on a Tradeoff between Security and Convenience: The Case of i-PIN System
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 Deparment of Management Information Systems, Chungbuk National University, Cheongju, Chungcheongbuk - do - 362763, KR
2 Department of Policy Research, Korea Institute of Science and Technology Information, Daejeon - 305806, KR
1 Deparment of Management Information Systems, Chungbuk National University, Cheongju, Chungcheongbuk - do - 362763, KR
2 Department of Policy Research, Korea Institute of Science and Technology Information, Daejeon - 305806, KR
Source
Indian Journal of Science and Technology, Vol 8, No 23 (2015), Pagination:Abstract
The resident registration numbers were used for administrative purposes including people's up-to-date residence information and vital statistics or provision of public services in Korea. In 2005, the government of Korea devised the i-PIN, a new online personal identification system replacing resident registration numbers. In the context of the i-PIN, the present study intended to shed light on the relationship between security and convenience. Also, we tried to explore the antecedents of adoption of the i-PIN. As a result, user support and perceived security had positive effects on the perceived ease of use, perceived usefulness respectively. The perceived ease of use also had significant effects on the perceived usefulness and satisfaction, whereas it did not exert direct effects on the use intention. Not surprisingly, the most significant variable influencing the use intention and satisfaction was perceived usefulness.Keywords
Authentication, i-PIN, Resident Registration Numbers.- An Exploratory Study on Service Quality Measurement of the Fourth Generation Mobile Telecommunication: The Case of the Korean Market
Abstract Views :131 |
PDF Views:0
Authors
Affiliations
1 Department of Management Information Systems, Chungbuk National University, KR
2 Department of Business Administration, Sunmoon University, KR
1 Department of Management Information Systems, Chungbuk National University, KR
2 Department of Business Administration, Sunmoon University, KR