p. 49-54
We propose the information-sharing system which improves information security action of general users. Requirements and functions were arranged based on the information security behavior model. As a result, we said that the system which shares an information security action log is effective.