• Title/Summary/Keyword: 보안인식

Search Result 1,368, Processing Time 0.031 seconds

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

The Impact of Utilizing Online Outsourcing in Startups on Member Organizational Commitment and Job Satisfaction (스타트업의 온라인 아웃소싱 활용이 구성원 조직몰입과 직무만족에 미치는 영향에 관한 연구)

  • Kim, Joonhak;Park, Jae-Whan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.3
    • /
    • pp.139-153
    • /
    • 2024
  • The importance of sustainable growth and cost reduction has increased globally, leading to the expansion of outsourcing by companies. Additionally, the spread of the platform economy has brought changes in the way we work, and the online outsourcing market, where tasks are mediated through platforms, is growing. Academically, while research on general outsourcing is actively conducted, studies on online outsourcing are relatively insufficient compared to its actual utilization. This study aims to analyze the factors and performance factors of online outsourcing utilization by startups, to identify the effects and concerns of using online outsourcing from multiple perspectives, and to suggest the roles of various stakeholders for effective utilization and industry development. For the research, a survey was conducted with 281 employees of startups who have experience in using online outsourcing, and the main findings are as follows. First, the enhancement of efficiency, profitability, and innovation through the use of online outsourcing positively affects organizational commitment and job satisfaction of startup members. Especially, the improvement of efficiency due to the use of online outsourcing has a significant effect on enhancing job satisfaction. Second, concerns about the burden of online outsourcing fees or uncertain outcomes negatively affect organizational commitment and job satisfaction. Third, there are perceptual differences in the motivations and performance regarding the utilization of online outsourcing depending on the job position. Practitioners perceive that the use of online outsourcing increases organizational commitment, whereas managers have relatively higher concerns about the uncertainty of outsourced task outcomes and information security. Through this study, the possibility that human resource shortages and employee management issues in startups can be improved through online outsourcing was confirmed. By verifying the influence of various factors of online outsourcing utilization, this study also provides meaningful implications for establishing business strategies for online outsourcing intermediary platform companies and for formulating startup support policies by government and other startup support organizations.

  • PDF

Investigation of Infection Prevention by Dental Hygienist's Personal Protection (치과위생사의 개인방호에 관한 감염방지 실태조사)

  • Kim, Chang-Hee;Jang, Hee-Kyung
    • Journal of dental hygiene science
    • /
    • v.5 no.2
    • /
    • pp.63-70
    • /
    • 2005
  • The relation among the variables of dental hygienists' both personal protection and infection prevention education was investigated in order to identify the necessity of realization of personal protection and utilize in the development of educational programs. The study tools included structured questionnaire and in-home interview. Data analysis included frequency and t-test, and the relations among the variables were as below: (1) Dental hygienist's maskwearing was most well observed in Kyonggi-do (90.0%) by locations, and in the dental hospitals (84.8%) by working places, which was statistically significant. (2) Glove-wearing was most well observed in the university and the higher graduates population (59.1%) by academic background, and in the dental hospital (73.9%) by working place, which was statistically significant. (3) Protection glasses-wearing was most well observed in Guns, Ups, and Myons (82.4%) by locations, which was statistically significant. (4) Uniforms were hand-laundered at home in the 40.9% of the university and the higher graduates, which was statistically significant. (5) About infection management, 67.0% of 2-year college graduates and 71.7% of the respondents from dental hospitals had been educated during their college days, which was statistically significant. (6) About the necessity of infection education, 77.3% of the university graduates responded it is very necessary, which was statistically significant.

  • PDF

Aviation Safety Regulation and ICAO's Response to Emerging Issues (항공안전규제와 새로운 이슈에 대한 ICAO의 대응)

  • Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.207-244
    • /
    • 2015
  • Aviation safety is the stage in which the risk of harm to persons or of property damage is reduced to, and maintained at or below, an acceptable level through a continuing process of hazard identification and risk management. Many accidents and incidents have been taking place since 2014, while there had been relatively safer skies before 2014. International civil aviation community has been exerting great efforts to deal with these emerging issues, thus enhancing and ensuring safety throughout the world over the years. The Preamble of the Chicago Convention emphasizes safety and order of international air transport, and so many Articles in the Convention are related to the safety. Furthermore, most of the Annexes to the Convention are International Standards and Recommended Practices pertaining to the safety. In particular, Annex 19, which was promulgated in Nov. 2013, dealing with safety management system. ICAO, as law-making body, has Air Navigation Commission, Council, Assembly to deliberate and make decisions regarding safety issues. It is also implementing USOAP and USAP to supervise safety functions of member States. After MH 370 disappeared in 2014, ICAO is developing Global Tracking System whereby there should be no loophole in tracking the location of aircraft anywhere in world with the information provided by many stakeholders concerned. MH 17 accident drove ICAO to install web-based repository where information relating to the operation in conflict zones is provided and shared. In addition, ICAO has been initiating various solutions to emerging issues such as ebola outbreak and operation under extreme meteorological conditions. Considering the necessity of protection and sharing of safety data and information to enhance safety level, ICAO is now suggesting enhanced provisions to do so, and getting feedback from member States. It has been observed that ICAO has been approaching issues towards problem-solving from four different dimensions. First regarding time, it analyses past experiences and best practices, and make solutions in short, mid and long terms. Second, from space perspective, ICAO covers States, region and the world as a whole. Third, regarding stakeholders it consults with and hear from as many entities as it could, including airlines, airports, community, consumers, manufacturers, air traffic control centers, air navigation service providers, industry and insurers. Last not but least, in terms of regulatory changes, it identifies best practices, guidance materials and provisions which could become standards and recommended practices.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

The Relationship with Electronic Trust, Web Site Commitment and Service Transaction Intention in Public Shipping B2B e-marketplace (해운 B2B e-marketplace의 전자적 신뢰, 사이트몰입 및 서비스 거래의도와의 관계성)

  • Kim, Yong-Man;Kim, Seog-Yong;Lee, Jong-Hwan;Shim, Gyu-Yeol
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.4
    • /
    • pp.113-139
    • /
    • 2007
  • This study aims to, looking from a standpoint of network, has investigated the shipping industry's B2B e-marketplace, the characteristics that can earn electronic trust from the users, and characteristics of the web-site. It has examined the mechanism whereby electronic trust be earned and how it affects web-site involvement and service transaction intention. Ultimately, The study attempts to make proposals whereby such trust can lead for a cooperative trading community in the shipping industry's B2B e-marketplace The Covalence structural equation modeling was designed and empirically tested for the shipping industry's B2B e-marketplace. The shipping industry employees were given questionnaires and data were analyzed. Except for perceived security of the three characteristic factors on the web-site, the perceived site quality and characteristics factors in operation only affected co-variables. Transaction Fairness was determined to be the most important factor among exogenous factors increasing electronic trust. With regards to transaction rules, if a transaction is beneficial only to one side, then no long term transaction will not take place. If the concerned parties properly recognize that transaction fairness is crucial to electronic transaction, then it will enormously contribute to successful operations of shipping e-marketplace. Also, Perceived efficiency in transaction also affects electronic trust. This reduces transaction costs and speeds up and simplifies the transaction process. It has reduced greater time and costs than existing off-line transaction, and would positively affect electronic trust. By making an open forum for participants to obtain information for transaction, they can gather useful information, and at the same time, the web-site operator can provide information, which, in turn, will increase electronic trust in electronic transaction. Furthermore, such formation of trust in electronic transaction influences shipping companies in such a way that they will want to continuously participate in the transaction, raising web-site involvement. The result of increased trust is that shipping companies in the future will do business with each other and form a foundation for continuous transactions amongst themselves. Consequently, the formation of trust in electronic transaction greatly influences web-site involvement and service transaction intention. The results of the study have again proved that in order to maintain continuous business relationship with the current clients, electronic trust in virtual space, which operates the shipping industry's B2B e-marketplace, is important for the interested parties.

  • PDF

Strategy for Bio-Diversity and Genetic Conservation of Forest Resources in Korea (생물종(生物種) 다양성(多樣性) 및 삼림유전자원(森林遺傳資源) 보존(保存) 전략(戰略))

  • Park, Young Goo
    • Journal of Korean Society of Forest Science
    • /
    • v.83 no.2
    • /
    • pp.191-204
    • /
    • 1994
  • Due to its topographic complexities and various climatical condition, Korea exhibits diverse forest types. Dominant tree species in this zone are Quercus spp., Betula spp., Zelkova spp., Fraxinus spp., Pinus densiflora, Pinus koraiensis, and Pinus thunbergii ete. Genetic conservation in forest species in Korea there are three ways ; one is in situ, other is ex situ and third is in-facility conservation. In situ conservation include that are the present status of conservation of rare and endangered flora and ecosystem, the reserved forest, the national and provincial park, and the gene pool of natural forests. Ex situ conservation means to be established the new forest from in situ forest stands, progeny and provenance test populations, seed orchard and clone banks, and gene conservation in-facility. As a tool for low temperature storage, several aspects on in vitro system were studied ; (1) establishment of in vitro cultures from juvenile and/or rejuvenated tissues, (2) induction of multiple shoots from the individual micropropagules, (3) elongation of the proliferated shoots. Studies on cold storage for short-and long-term maintenance of in vitro cultures under $4^{\circ}C$ in the refrigerator were conducted. For the cryopreservation at $-196^{\circ}C$, various factors affecting survivability of the plant materials are being examined. The necessity of gene conservation of forest trees is enlarged not only to increase the adaptability for various environments but also to gain the breeding materials in the future. For effective gene conservation of forest trees, I would like to suggest followings ; 1. Forest stands reserved for other than the gene conservation purposes such as national parks should be investigated by botanical and gene-ecological studies for selecting bio-diversity and gene conservation stands. 2. Reserved forest for gene pool should be extented both economically important tree spp. and non-economical species. 3. Reserved forest for progeny test and clone bank should be systematically investigated for the use of Ex situ forest gene conservation. 4. We have to find out a new methodology of genetic analysis determining the proper and effective size of subpopulation for in situ gene conservation. 5. We should develop a new tree breeding systems for successful gene conservation and utilization of the genetic resources. 6. New method of in-facility gene conservation using advanced genetic engineering should be developed to save time and economic resources. 7. For the conservation of species with short-life span of seed or shortage of knowledge of seed physiology, tissue culture techniques will be played a great role for gene conservation of those species. 8. It is are very useful conservation not only of genes but of genotypes which were selected already by breeding program. 9. Institutional and administrative arrangements including legistlation must be necessarily taken for gene conservation of forest trees. 10. It is national problems for conservation of forest resources which have been rapidly destroyed because of degenerating environmental condition and of inexperienced management system of bio-diversity and gene conservation. 11. In order to international cooperation for exchanging data of bio-diversity and gene conservation, we should connect to international net works as soon as possible.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.