빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 정성훈 | - |
dc.contributor.author | 김휘강 | - |
dc.contributor.author | 우지영 | - |
dc.date.accessioned | 2021-08-11T15:44:09Z | - |
dc.date.available | 2021-08-11T15:44:09Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2017 | - |
dc.identifier.issn | 1598-849X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8051 | - |
dc.description.abstract | In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements. | - |
dc.language | 한국어 | - |
dc.language.iso | ko | - |
dc.publisher | 한국컴퓨터정보학회 | - |
dc.title | 빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론 | - |
dc.title.alternative | The big data analysis framework of information security policy based on security incidents | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 우지영 | - |
dc.identifier.doi | 10.9708/jksci.2017.22.10.073 | - |
dc.identifier.bibliographicCitation | 한국컴퓨터정보학회논문지, v.22, no.10, pp.73 - 81 | - |
dc.relation.isPartOf | 한국컴퓨터정보학회논문지 | - |
dc.citation.title | 한국컴퓨터정보학회논문지 | - |
dc.citation.volume | 22 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 73 | - |
dc.citation.endPage | 81 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART002277299 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | big data | - |
dc.subject.keywordAuthor | information security policy | - |
dc.subject.keywordAuthor | information security incident | - |
dc.subject.keywordAuthor | text analysis | - |
dc.subject.keywordAuthor | policy evaluation | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.