Skip to main content
Log in

An exploratory research on advanced smart media security design for sustainable intelligence information system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The recent issue of cyber security accident and internal information leakage accident is becoming a big obstacle in entering into sustainable intelligence information. To guarantee a sustainable smart media technology and establish an intelligence information system environment, it is necessary to firmly cultivate information security industry with the need for a study on forming multi-dimensional foundation for promoting the use of information security product & service for organizations in intelligence information system environment. Accordingly, an exploratory study was conducted for identifying risk elements caused by intelligence information system environment and forming multi-dimensional smart media information security ecosystem to minimize such risk elements. As a result, a scenario was designed by deducing issues in information security resulting from entering into internet of things environment, while exploring and analyzing future direction by classifying into four areas of law & policy, information security business management, security accident criminal psychology and information security economic feasibility. Based on this study, it is expected that a fundamental & comprehensive solution can be presented as a prerequisite for ensuring sustainable internet of things environment, along with the establishment of response system against various forms of security accidents occurring recently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Da Veiga A, Eloff JHP (2007) An information security governance framework. Inf Syst Manag 24(4):361–372

  2. Guo KH (2013) Security-related behavior in using information systems in the workplace: a review and synthesis. Comput Secur 32:242–251

  3. Hellriegel D, SlocumJr. JW, Woodman RW (1998) Organizational behavior, Eighth edition, South-Western College Publishing

  4. Kim M, Park SO Trust management on user behavioral patterns for a mobile cloud computing, Cluster Computing, Vol. 16, No. 4, pp.725–731

  5. Kim Y, Chang H (2013) A study on project selection framework for future ICT technologies. Wirel Pers Commun 73:1591–1600

  6. Kim Y, Chang H (2013) A u-IT collaboration evaluation model for value networks. Pers Ubiquit Comput 17(7):1459–1467

  7. Moore JF (2003) Predators and prey: a new ecology of competition, harvard business review, Vol. 73, Issue 3

  8. Rho S, Yeo S-S (2013) Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment. J Supercomput 65(1):274–286

  9. Robbins S, Odendaal A, Roodt G (2003) Organizational behaviour – global and southern African perspectives. Pearson Education South Africa, Cape Town

    Google Scholar 

  10. Rock P (2007) Sociological theories of crime. In: Maguire M, Morgan R, Reiner R (eds) The oxford handbook of criminology. The Oxford University Press, New York

    Google Scholar 

  11. Sun J, Zhengquan X, Liu J, Yao Y (2011) An objective visual security assessment for cipher-images based on local entropy. Multimed Tools Appl 53(1):75–95

  12. Whitman ME, Mattord HK (2003) Principles of information security, Thomson Course Technology

Download references

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT & Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2014-H0301-14-1044) supervised by the NIPA (National ICT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, W., Na, O. & Chang, H. An exploratory research on advanced smart media security design for sustainable intelligence information system. Multimed Tools Appl 75, 6059–6070 (2016). https://doi.org/10.1007/s11042-014-2393-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2393-4

Keywords

Navigation