Correlation Analysis in Information Security Checklist Based on Knowledge Network

Chang Young Jin, Ae Chan Kim, Jong In Lim


As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, ‘FSS’, ‘FISS’, ‘G’) are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, ‘FSS’, ‘FISS’and ‘G’.

Full Text:



Choi, Y. C. and Park, S. J., “Trend Analysis on Public Administration Research : Applications of Network Text Analysis methods,” The Journal of Korea Public Administration, Vol. 45, No. 1, pp. 123- 139, 2011.

Jang, S. O. and Lim, J. I., “Developing key Performance Indicators for Financial IT Security,” The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 125-142, 2013.

Jeong, J. H. and Kim, D. W., “A research on the methods and target of privacy risk in smart social,” Korea Journal of Local Information Society, Vol. 16, No. 3, pp. 113-136, 2013.

Kim, A. C., Lee, S. M., and Lee, D. H., “Compliance Risk Assessment Measures of Financial Information Security using System Dynamics,” IJSIA(International Journal of Security and Its Applications), Vol. 6, No. 4, pp. 191-200, 2012.

Kim, K. C. and Kim, S. J., “Evaluation Criteria for Korean Smart Grid based on K-ISMS,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 6, pp. 1375-1391, 2012.

Kim, K. C., Heo, O., and Kim, S. J., “A Security Evaluation Criteria for Korean Cloud Computing Service,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 23, No. 2, pp. 251-265, 2013.

Kim, Y. H., Yoon, J. R., Cho, H. S., and Kim, Y. J., “Structure of Collaboration Network among Korean Scientists-‘Small World’ and Position Effect,” Korea Journal of Sociology, Vol. 41, No. 4, pp. 68- 103, 2007.

Lee, S. S., Network Analysis Methodology. Social Science Research Institute, Pusan ​​National University Studies series, Vol. 2, Seoul, 2012.

NIST, SP 800-53, Recommended Security Controls for Federal Information Systems, Oct 2003.

Park, H. W. and Loet Leydesdorff., “KrKwic for Korean content analysis and understanding of the applicable program,” Journal of the Korean Data Analysis Society, Vol. 6, No. 5, pp. 1377-1387, 2004.

Popping, R., Computer-assisted Text Analysis. London, Sage Publications, 2000.

Shim, J. S. and Kim, J. S., “Understanding Conflict Frames about a Nuclear Power Plant : Focusing on the Effect of the Fukushima Nuclear Accident,” The Journal of Korea Public Administration, Vol. 45, No. 3, pp. 173-202, 2011.

TTA, TTAK.KO-12.0093, A Guide to Establishing Information Security Policies of Organization, Dec 2008.

White, H. D., “Pathfinder networks and author cocitation analysis : A remapping of paradigmatic information scientists,” Journal of the American Society for Information Science and Technology, Vol. 54, No. 5, pp. 423-434, 2003.

Wi, C. K., Kim, H. J., and Lee, S. J., “A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 4, pp. 851-868, 2012.

Won, D. K. et al., Development and implementation of knowledge Map in academic social science research area, Korea Institute of Science and Technology Information Research Report, 2009.

Wikipedia, “Power law,”

Wikipedia, “NIACAP,” http://en.wikipedia. org/wiki/NIACAP.


  • There are currently no refbacks.