Abstract
In this study, a security method that protects data from an information system accessed by unauthorized persons through physical ways like eye contacts is proposed. In addition, it is applied to security awareness programs for improving security recognition and to contribute to the protection of important information. The security awareness program proposed in this study is able to detect the violation in physical security policies and to implement additional training related to warning messages or such violated security policies and that leads to present positive effects of changing user security awareness and corresponding works. It is expected that these effects are to be spreaded to the whole organization and influence for all members.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jeong S-J, Kim M, Lee C-K, Lee C-H, Son B-C, Kim D-H, Kim J-H, Lee J-T, Chang G-R, Hong K-H, Suh C-H (2011) Cognition and practice on medical information protection of industrial health care manager of small and medium sized enterprises. Korean J Occup Environ Med 23(1):53–63
Kim J-J, Kweon E-H (2012) A study on the therapists’ protective actions of medical information privacy—with a focus on physical and occupational therapists. Korea Inst Electron Commun Sci 7(2):447–455
Drevin L, Kruger HA, Steyn T (2007) Value-focused assessment of ICT security awareness in an academic environment. Comput Secur 26(1):36–43
Goucher W (2011) Look behind you: the dangers of shoulder surfing. Comput Fraud Secur 2011(11):17–20
Johnny L, Scott P, Jack W, Kevin DM (2008) No tech hacking. Syngress, Rockland
Kim MS, Lee DH (2012) A way of securing the access by using PCA. J Inf Secur 12(3):3–10
Choi KH, Kim JM, Lee D (2012) Network 2-factor access control system based on RFID security control system. J Inf Secur 12(3):53–58
Kim JM, Choi KH, Lee DH (2012) Network group access control system using piggy-backing prevention technique based on infrared-ray. J Inf Secur 12(4)
Eminagaoglu M, Ucar E, Eren S (2009) The positive outcomes of information security awareness training in companies—a case study. Inf Secur Tech Rep 14(4):223–229
Broderick JS (2006) ISMS, security standards and security regulations. Inf Secur Tech Rep 11:26–31
Acknowledgments
This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Choi, KH., Lee, D. (2013). A Study About Security Awareness Program Based on RFID Access Control System. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_11
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_11
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)