Skip to main content

A Study About Security Awareness Program Based on RFID Access Control System

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

In this study, a security method that protects data from an information system accessed by unauthorized persons through physical ways like eye contacts is proposed. In addition, it is applied to security awareness programs for improving security recognition and to contribute to the protection of important information. The security awareness program proposed in this study is able to detect the violation in physical security policies and to implement additional training related to warning messages or such violated security policies and that leads to present positive effects of changing user security awareness and corresponding works. It is expected that these effects are to be spreaded to the whole organization and influence for all members.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jeong S-J, Kim M, Lee C-K, Lee C-H, Son B-C, Kim D-H, Kim J-H, Lee J-T, Chang G-R, Hong K-H, Suh C-H (2011) Cognition and practice on medical information protection of industrial health care manager of small and medium sized enterprises. Korean J Occup Environ Med 23(1):53–63

    Google Scholar 

  2. Kim J-J, Kweon E-H (2012) A study on the therapists’ protective actions of medical information privacy—with a focus on physical and occupational therapists. Korea Inst Electron Commun Sci 7(2):447–455

    Google Scholar 

  3. Drevin L, Kruger HA, Steyn T (2007) Value-focused assessment of ICT security awareness in an academic environment. Comput Secur 26(1):36–43

    Article  Google Scholar 

  4. Goucher W (2011) Look behind you: the dangers of shoulder surfing. Comput Fraud Secur 2011(11):17–20

    Article  Google Scholar 

  5. Johnny L, Scott P, Jack W, Kevin DM (2008) No tech hacking. Syngress, Rockland

    Google Scholar 

  6. Kim MS, Lee DH (2012) A way of securing the access by using PCA. J Inf Secur 12(3):3–10

    Google Scholar 

  7. Choi KH, Kim JM, Lee D (2012) Network 2-factor access control system based on RFID security control system. J Inf Secur 12(3):53–58

    Google Scholar 

  8. Kim JM, Choi KH, Lee DH (2012) Network group access control system using piggy-backing prevention technique based on infrared-ray. J Inf Secur 12(4)

    Google Scholar 

  9. Eminagaoglu M, Ucar E, Eren S (2009) The positive outcomes of information security awareness training in companies—a case study. Inf Secur Tech Rep 14(4):223–229

    Article  Google Scholar 

  10. Broderick JS (2006) ISMS, security standards and security regulations. Inf Secur Tech Rep 11:26–31

    Google Scholar 

Download references

Acknowledgments

This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to DongHwi Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Choi, KH., Lee, D. (2013). A Study About Security Awareness Program Based on RFID Access Control System. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_11

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics