• Title/Summary/Keyword: Information Evaluation

Search Result 14,720, Processing Time 0.033 seconds

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A Study on the Evaluation Factors of Websites that Offer Clothing and Ornament Related Information (의류관련정보를 제공하는 웹사이트 평가요인에 관한 연구)

  • 박길순;류신아
    • Journal of the Korean Society of Costume
    • /
    • v.52 no.7
    • /
    • pp.71-85
    • /
    • 2002
  • The purpose of this study is (1) to research on the diverse evaluation criteria suggested in the existing literatures, selected the contents of the evaluation according to the evaluation factors, and examined whether they are appropriate for the evaluation of websites that offer Clothing and Ornament related information through reliability analysis - all to set the evaluation criteria for the websites that acquire data. In addition. (2) contents of evaluation which are deemed important by the users and developers were compared and recommended as the detailed evaluation contents according to evaluation factors. The results of this study were as follows. 1. The evaluation factors for the fashion websites that provide Clothing and Ornament related information were selected as follows: contents of the information(11 contents of evaluation), ease of use(12), screen design(10), accessibility(9), sensitive enjoyment(4), scope of information use(3), purpose(1), and target user(1). As result of reliability analysis. Cronbach's a contents of the information (0.76), ease of use (0.77), screen design (0.85), accessibility (0.81), sensitive enjoyment (0.71), and scope of information use (0.52). 2. When the level of importance for the detailed evaluation contents was examined from the user and developer point of view, recency of information. rapid speed for the websites access. fast loading of webtext and fast transmission speed topped the list as first, second and third places.

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)

A Study on the Reliability Evaluation Index Development for the Information Resources Retained by Institutions: Focusing on Humanities Assets

  • Jeong, Dae-Keun;Noh, Younghee
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.2
    • /
    • pp.65-89
    • /
    • 2019
  • This study has the aim of developing an evaluation index that can help evaluate the reliability of the information resources of institutions retaining humanities assets for the purposes of laying out the foundation for providing one-stop portal service for humanities assets. To this end, the evaluation index was derived through the analysis of previous research, case studies, and interviews with experts, the derived evaluation index was then applied to the humanities assets retaining institutions to verify the utility. The institutional information resources' reliability evaluation index consisted of the two dimensions of the institutions' own reliability evaluation index. The institution provided a service and system evaluation index. The institutions' own reliability evaluation index consisted of 25 points for institutional authority, 25 points for data collection and construction, 30 points for data provision, and 20 points for appropriateness of data, for a total of 100 points, respectively. The institution provided service and system evaluation indexes consisting of 25 points for information quality, 15 points for appropriateness (decency), 15 points for accessibility, 20 points for tangibility, 15 points for form, and 10 points for cooperation, for the total of 100 points, respectively. The derived evaluation index was used to evaluate the utility of 6 institutions representing humanities assets through application. Consequently, the reliability of the information resources retained by the Research Information Service System (RISS) of the Korea Education & Research Information Service (KERIS) turned out to be the highest.

Interactive Information Retrieval: An Introduction

  • Borlund, Pia
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.3
    • /
    • pp.12-32
    • /
    • 2013
  • The paper introduces the research area of interactive information retrieval (IIR) from a historical point of view. Further, the focus here is on evaluation, because much research in IR deals with IR evaluation methodology due to the core research interest in IR performance, system interaction and satisfaction with retrieved information. In order to position IIR evaluation, the Cranfield model and the series of tests that led to the Cranfield model are outlined. Three iconic user-oriented studies and projects that all have contributed to how IIR is perceived and understood today are presented: The MEDLARS test, the Book House fiction retrieval system, and the OKAPI project. On this basis the call for alternative IIR evaluation approaches motivated by the three revolutions (the cognitive, the relevance, and the interactive revolutions) put forward by Robertson & Hancock-Beaulieu (1992) is presented. As a response to this call the 'IIR evaluation model' by Borlund (e.g., 2003a) is introduced. The objective of the IIR evaluation model is to facilitate IIR evaluation as close as possible to actual information searching and IR processes, though still in a relatively controlled evaluation environment, in which the test instrument of a simulated work task situation plays a central part.

A Study on Integrated Quality Evaluation Model of Information System (정보시스템 종합품질평가 모형 연구)

  • Seo, Jang-Hoon;Lee, Gi-Jun;Park, Myeong-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.4
    • /
    • pp.151-166
    • /
    • 2006
  • One of The standard issue in riding on the wave of the information system(IS) is records of performance, grow unprecedently fast, and has highly uncertain future. Within the framework of IS Evaluation, The main purpose of this study is to suggest performance quality evaluation system as follows, The Integrated Quality Evaluation Model Design(IQEMD) of Information System helps corporations to improve productivity, customer service and corporate competitive power. To respond flexibly this trend, we have to realize that the information system has to keep the most effective optimal information network at the proper time. The existing evaluation method has been concentrated on the evaluation of a degree of the information system maturity focused on static viewpoints. The evaluation of potential factors to affect the future-oriented performance, that can analyze both unit business being able to apply an information system base was used efficiently well and what performance evaluation item was obtained actually, was insufficient relatively. In this paper, An integrated quality evaluation method will analyze a degree of information system maturity in dynamic evaluation viewpoints rather than in static evaluation viewpoints. finally we estimated the relative degree of importance of each determinant using the AHP methodology The validity of the proposed model was also partially proved using two different methods, holistic and historical approach.

Development of the Information Security Methodology for Defense Organization (국방조직의 정보보호 평가 방법론 개발)

  • Cho, Sung Rim;Choi, In Soo;Park, Ji Hoon;Shin, Woo Chang
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

The Student-Centered Educational Evaluation and Reporting on School Mathematics (수학교과에서 학습자 중심의 교육평가 결과보고 방안 논의)

  • Ko Hyoung-Jun;Won Seoung-Joun
    • The Mathematical Education
    • /
    • v.45 no.2 s.113
    • /
    • pp.205-215
    • /
    • 2006
  • One of the most important concepts in the 7th curriculum of Korea is the student-centered education. Since educational evaluation has significant influence on the whole curriculum, if we realize the importance of the student-center education on the curriculum we should establish the student-centered educational evaluation system. Educational evaluation is defined by the theory of information to permit information users to identify, to measure, to manipulate and to communicate useful educational information concerning an educational curriculum for making decisions. If we accept the above definitions, the demands of information users are significant in the light of conceptual framework of educational evaluation. The purpose of this study is to analyze the conceptual framework of educational evaluation from information users' perspectives and to investigate the qualitative characteristics which satisfy information users' need for making decisions. We also show that students aren't provided sufficient evaluation results information to decide for their study plans by analyzing an evaluation study of the 7th primary curriculum. Finally, this study suggests how to improve an evaluation system for students in mathematics.

  • PDF

On-line Shared Platform Evaluation Framework for Advanced Persistent Threats

  • Sohn, Dongsik;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2610-2628
    • /
    • 2019
  • Advanced persistent threats (APTs) are constant attacks of specific targets by hackers using intelligent methods. All current internal infrastructures are constantly subject to APT attacks created by external and unknown malware. Therefore, information security officers require a framework that can assess whether information security systems are capable of detecting and blocking APT attacks. Furthermore, an on-line evaluation of information security systems is required to cope with various malicious code attacks. A regular evaluation of the information security system is thus essential. In this paper, we propose a dynamic updated evaluation framework to improve the detection rate of internal information systems for malware that is unknown to most (over 60 %) existing static information security system evaluation methodologies using non-updated unknown malware.

A Case on the Evaluation of the Information System Project to Enhance the Performance of DIMS(Defense Material Information System) (국방물자정보시스템 성능개선 사업평가에 대한 사례)

  • Cho, Sung-Rim;Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.109-123
    • /
    • 2012
  • There are many evaluation models to measure the informatization level of an organization and information system project in the ministry of National Defense of Korea. A information system has to keep up with the environment change as well as the advanced recent information technology (IT). Therefore, the evaluation of an information system project to enhance the performance of the information system should be different from the existing evaluation methods. This study suggests an evaluation case of information system projects to enhance the performance of an information system. In order to achieve the objective of this study, the following steps are taken. First, it reviews the background and the scope of the project to enhance the performance of the Defense Material Information System (DMIS). And it sets up the evaluation logic and develops performance indexes. Then it applies these newly developed performance indexes to the information system project and measures the performance. From this study, we found that both the diffusion and the experience accumulation by its continuous use are significant factors in such evaluations.