• Title/Summary/Keyword: 방어유형

Search Result 162, Processing Time 0.03 seconds

The Impact of Crisis Response Strategy on Brand Attitude - Focus on the Crisis Type and Cause Related Marketing - (기업의 위기대응전략이 브랜드 태도에 미치는 영향 - 위기 유형과 기업의 공익연계 마케팅을 중심으로 -)

  • Seol, Sang-Chul;Jung, Sung-Gwang;Choi, Woo-Young
    • Management & Information Systems Review
    • /
    • v.34 no.5
    • /
    • pp.251-276
    • /
    • 2015
  • This study is to review the attitude of consumers on the crisis response strategy (defensive vs. receptive) that the company implements in crisis situations. Also, the interaction between the crisis response strategy that the company implements and the crisis type of companies (corporate ability vs corporate social responsibility) was discussed. In addition, the interaction between the messages (abstract vs. concrete) of public interest associated marketing implemented prior to crisis situations and the crisis response strategy implemented after crisis situations was discussed. And these results were reviewed to see if the same result can come out after controlling the involvement on consumer's public interest associated marketing as a covariate. The main results of this study are as follows. First, regarding the crisis response strategy, in the company's crisis response strategy, the receptive attitude was more favorable for the consumer's attitude than the defensive attitude. Second, it was seen that there is a significant interaction between the crisis response strategy of companies and the crisis type of companies. Third, it was seen that the crisis response strategy of companies has a significant interaction with the message type of public interest associated marketing. Lastly, the involvement showed a significant effect as a covariate and the interaction between the crisis response strategy of companies, the crisis type of company and the message type of public interest associated marketing can be confirmed even after controlling the involvement. In the conclusion of the study, the direction on implications, limitations and future.

  • PDF

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.

Circadian Preference and Defense in Medical Students : Greater Consumption and Lesser Sublimation Predicting Eveningness (의학전문대학원 학생들의 일주기 선호와 방어기제)

  • Lee, So-Jin;Park, Chul-Soo;Kim, Bong-Jo;Lee, Cheol-Soon;Cha, Bo-Seok;Kang, Hyoseung
    • Sleep Medicine and Psychophysiology
    • /
    • v.20 no.2
    • /
    • pp.82-87
    • /
    • 2013
  • Objectives: Previous studies have reported an association between circadian preference and personality. Defense mechanism is unconscious ego process which deals with an individual's anxiety and is closely associated with one's personality. Our aim is to investigate the association between defense mechanism and circadian preference in medical students. Methods: One hundred forty eight medical students (70 males, 78 females), aged 22 to 30, answered the Beck Depression Inventory-II, Morningness-eveningness Questionnaire, and Korean version of Defense Style Questinnaire. Results: Consumption (beta=-0.262, p=0.001) and being a male (beta=0.175, p=0.031) were significant positive predictors of eveningness, while sublimation (beta=0.185, p=0.023) was a significant negative predictor of eveningness. Conclusion: Our study showed a relationship between specific defense mechanisms (i.e., consumption and sublimation) and eveningness in medical students, but it did not address whether the relationship is a causal one.

A Correlation between Stress and Activities of Daily Living related to the Ego-defense Mechanism in Stroke patients (뇌졸중 환자의 자아방어기제에 따른 스트레스와 일상생활활동 수행능력과의 상관관계)

  • Ryu, Sung-Hyun;Choi, Hyeon;Jeon, Ji-Hye;Choi, Su-Ji
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2015
  • Objective : This study is to investigate the correlation of Ego-degense mechanism, stress and activities of daily living of stroke patients. Methods : The study was carried out from March 14, 2014 to May 15, 2015. A survey was conducted at a university hospital and three rehabilitation hospitals located in Daegu and Busan. For statistical analysis, frequency analysis, independent sample t-test, and Pearson correlation coefficient were used in this study. Results : As a result of the mature Ego-defense mechanism grop was more stressful than immature Ego-defense mechanism group(p<.05), mechanism group also showed better performance in activities of daily living activity(p<.05). Conclusion : The higher stress in stroke patients related to the disability to perform activities of daily living. Psychosocial rehabilitation for factors such as stress as well as physical function in stroke patients in the rehabilitation of stroke patients by using the Ego-defense will have a significant impact on an individual's personality or lifestyle.

Discrimination between Silence and Voice Behavior in measurement and the incremental validity (침묵과 발언 행동의 변별성: 측정 모형 비교 및 침묵 행동의 증분 설명력)

  • Hyun-Sun Chung
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.1
    • /
    • pp.1-17
    • /
    • 2013
  • The present study aimed to investigate the discrimination between employee voice and silence behavior in measurement: it is silence behavior the absence of voice or not? It was examined using confirmatory factor analysis. Five measurement models based on the suggestion of Pinder & Harlos(2001) and Van Dyne, Ang, & Botero(2003) were compared. Additionally, the hierarchical multiple regression analysis was conducted for examining the incremental validity of silence behaviors over voice. A total of 204 employees who worked with their own supervisor were surveyed. Results indicated that silence behavior could be a separate construct from voice. Findings also showed that silence behaviors could be distinguished by the level of concreteness in definition, difference in content of motivation and have the incremental validity over voice in only acquiescent Silence. From these results, the theoretical implications of findings, limitations, suggestions for future research were discussed in discussion.

A Study on the Outport for the conquest of Usanguk through the Location Analysis of Natural Environment in the Port of the East Coast (동해안 항포구의 자연환경 입지분석을 통한 우산국 정벌의 출항지 검토)

  • JANG, Dong-Ho;KIM, Jang-soo
    • Journal of The Geomorphological Association of Korea
    • /
    • v.17 no.3
    • /
    • pp.59-75
    • /
    • 2010
  • In this study, location evaluation of the natural environment of ports in the Joseon Dynasty was carried out to investigate the outport of east coast for the conquest of Usanguk. As a result of study, there were 55 ports and naval stations in the Joseon Dynasty, including the Yeongokpo, Aninpo, Samcheokpo, Susanpo, and Wolsongpo. As a result of the restoration work in the sea level that was done in the sixth century, the sea level at that time was about 1m higher than that at present. In terms of the location type, three types were identified via natural-environment analysis. Location type I consists of a total of 21 ports suitable for defense due to the sand spit in all the sides and because it is located in the bay of small and medium rivers. Location type II is composed of 22 ports close to the open seas, and location type III consists of a total of 12 ports centering on the bay. A total of nine ports satisfied the location factor in the shortest distance analysis(targeting location type I), 15 ports in the slope analysis, 13 ports in the hinterland analysis, 13 ports in the visibility analysis, and 11 ports in the ocean current analysis. It was found in the final evaluation that the I level regions consist of two ports(Obunjin and Mangyangjin). Obunjin has a location characteristic that is advantageous for defense and that makes it suitable to serve as an anchorage harbor for a large-scale fleet as its water level is deep and as it has a wide embayment. In conclusion, Obunjin is considered the outport that has the highest possibility of serving as Isabu's departure port for the conquest of Usanguk.

The Study on the psychological characteristics of learning types in the e-learning environment (사이버 학습 환경에서의 학습자 유형과 그 특성에 대한 탐색)

  • Whang, Sang-Min;Kim, Jee-Yeon;Ko, Beom-Seog;Seo, Jeong-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.206-212
    • /
    • 2007
  • 웹을 기반으로 하는 e-러닝에 대한 교육적 수요는 증가하고 있다. 이와 동시에, 학습 공간으로서의 사이버 공간의 활용에 대한 고민도 증가하였다. 전통적인 학습활동을 사이버 공간에 복제하려 했던 고전적 방식이 e-러닝 또는 사이버 학습이 아니라는 사실을 확인하기 시작했기 때문이다. e-러닝의 가치가 강조됨에도 불구하고, 실제 사이버 공간에서 일어나는 학습자의 특성과 학습활동이 구체적으로 어떻게 일어나는 지에 대한 탐색은 미흡하다. 산재한 정보를 스스로 가공한 지식, '학습하는 방법을 학습'하는 것이라는 개념들이 제시됨에도 불구하고, 사이버 공간에 산재한 정보, 학습하는 방법의 학습, 그리고 사이버 공간의 학습특성에 대한 논란은 여전하다. 본 연구에서는 실제 사이버 학습 사이트를 이용하고 있는 학습자들의 행동을 중심으로, 학습자의 특성을 탐색하였다. 사이버 공간에서 보이는 스스로 학습하는 방법이 무엇인지 확인하고 이것이 다양한 학습자 유형으로 구분되는 지를 확인하고자 하였다. 연구대상이 된 사이버 학습 사이트는 서울, 부산, 대구, 광주 교육청에서 운영하는 사이버 가정 학습관이었다. 총 1535명의 사이버 가정 학습관 이용자들의 특성이 분석되었다. 사이버 가정학습관 이용자들의 행동특성은 9개의 요인-놀이 활동, 공동 경험, 현실 정체, 공동 성취, 개인주의, 경쟁 지향, 성취감, 편리성(조작 용이), 생생함-으로 구분되었다. 9개의 활동 요인을 기준으로 하여 확인된 학습자 유형은 4가지로 나타났다. 4가지 학습자 유형은 각각 독야청청형, 동고동락형, 의무방어형, 희희낙낙형으로 명명되었다. 이들 유형은 학습 활동 정도 및 사이트 이용 행동, 학습 스타일(사이버 학습 활동 양식)에서 서로 차이가 있었다. 본 연구는 기존의 이론적인 모델에 기초하여 임의적으로 구분된 사이버 학습자 유형 구분이 아닌, 실제 학습 활동을 탐색하였다는 측면에서 의미가 있다. 특히, 기존의 오프라인 학습 이론 및 학습자 특성 연구를 사이버 학습에 그대로 적용할 것이 아니라 사이버 공간의 특성이 실제 학습 활동에서 어떻게 나타났는지를 밝히려고 했다는데 그 의의가 있다. 향후, 사이버 학습자 유형에 따른, 사이버 학습활동의 촉진방안이나 학습 효과의 차이를 높일 수 있는 구체적인 학습 시스템의 설계 및 운영 모델에 대한 탐색이 필요할 것이다.

  • PDF

Security Audit System for Secure Router (보안 라우터를 위한 보안 감사추적 시스템)

  • Doo, S.Y.;Kim, J.N.;Jang, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.17-21
    • /
    • 2005
  • 감사추적기능은 시스템의 공격을 방어하기 위한 마지막 방법 중 하나이다. 공격을 사전에 차단하거나 공격이 이루어지는 순간에 실시간으로 대응하는 능동적 방법이라기보다 공격이 이루어진 후에 시스템에 남겨진 정보를 분석하여 공격의 유형과 상황을 유추해내기 위한 수동적인 방법이다. 본 논문에서는 감사추적 기능이 보안 네트워크 장비에서 중요한 이유를 설명하고 반드시 기록으로 남겨야 하는 내용이 어떤 것인지 정리하며 실제로 보안 라우터에 구현된 보안 감사추적 시스템의 구성과 기능을 설명한다. 본 논문에서는 일반 감사기록과 보안 감사기록을 분리하여 관리하고 있는데 그 필요성에 대해 설명한다.

테러방어과학

  • Korean Federation of Science and Technology Societies
    • The Science & Technology
    • /
    • v.35 no.2 s.393
    • /
    • pp.45-74
    • /
    • 2002
  • [테러리즘 현황] - 현대사회 테러리스트 공격에 속수무책, 유형ㆍ시대따라 달라도 늘 빈틈노려 덮쳐/[무력테러] - 인터넷 등 첨단기술이용 무기 현지조달, 국가안보차원서 테러 대처능력 갖춰야/[생물테러] - 생명공학 접목ㆍ소량으로 대량살상 가능, 무미ㆍ무취에 은밀ㆍ잠재성 커 무기화 박차/[화학테러] - 1차 대전때 겨자가스공격 1백30만명 사상, 북한은 61년 김일성지시에 따라 5천톤 비축/[방사능테러] 원자력발전소 등 각종 핵시설 공격 목표, 한국은 북한의 핵위협 예방 종합대책 필요/[사이버테러] 마음만 먹으면 누구나 전산망 파괴 가능, 미래 전쟁은 네트워크 파괴가 성패 갈라

  • PDF

인공지능 보안 공격 및 대응 방안 연구 동향

  • Ryu, Gwonsang;Choi, Daeseon
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.93-99
    • /
    • 2020
  • 인공지능은 다양한 분야에서 사람을 뛰어넘는 성능을 보여주고 있어 다양한 서비스에 활용되어 삶의 편리함을 주고 있다. 하지만, 인공지능의 핵심 기술인 딥러닝은 많은 보안 취약점을 가지고 있어 딥러닝 보안 문제에 대한 관심이 증가하고 있다. 본 논문은 인공지능 보안 취약점을 유발하는 각 공격 유형에 대한 최신 연구와 보안 위협에 대응하기 위한 방어 기술에 대한 최신 연구에 대해 설명한다.