The characteristics of smartwork security compare to traditional telework
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Y.-J. | - |
dc.contributor.author | Ra, J.H. | - |
dc.contributor.author | Shin, D.I. | - |
dc.contributor.author | Jung, Y.-G. | - |
dc.date.accessioned | 2021-12-02T04:44:53Z | - |
dc.date.available | 2021-12-02T04:44:53Z | - |
dc.date.created | 2021-11-30 | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19064 | - |
dc.description.abstract | Smartwork has been thought to satisfy both employee and company's interests. Nonetheless, there are critical barriers of introducing smartwork because of security problem. In order to derive threats and vulnerabilities of smartwork, we derive threats through structured interview with heavy users or designers of smartwork, then verify the derived threats by survey. Three layers, which are devices/networks/servers, are proposed as a common framework for analyzing characteristics of two types of smartwork. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.title | The characteristics of smartwork security compare to traditional telework | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Shin, D.I. | - |
dc.identifier.scopusid | 2-s2.0-84864781097 | - |
dc.identifier.bibliographicCitation | International Journal of Security and its Applications, v.6, no.2, pp.463 - 468 | - |
dc.relation.isPartOf | International Journal of Security and its Applications | - |
dc.citation.title | International Journal of Security and its Applications | - |
dc.citation.volume | 6 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 463 | - |
dc.citation.endPage | 468 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Home-based | - |
dc.subject.keywordAuthor | Mobile office | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Smartwork | - |
dc.subject.keywordAuthor | Telework | - |
dc.subject.keywordAuthor | Threats | - |
dc.subject.keywordAuthor | Vulnerability | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.