• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.027 seconds

The Effects of Leadership on the Cockpit Culture in Commercial Airlines (리더십이 민간항공 조종실 문화에 미치는 영향)

  • Kim, Young-Kil;Byeon, Soon-cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.344-356
    • /
    • 2021
  • In the field of civil aviation in Korea, inappropriate crew resources management(CRM) constantly occurs between captains and first officers during flight. Therefore, the active role of first officers is emphasized in pilot training for CRM, threat & error management(TEM), safety management system(SMS), fatigue risk management system(FRMS), and training in simulators. Thus, it is urgent for captains to change their transformational leadership to emotional leadership, advantages of which include horizontal interpersonal relationship, open-mindedness, leading by example, considerateness, mutual respect, and using informal language. For the direction to improve 'the cockpit culture' in civil aviation, the key idea of the current thesis paper is the influence of captains' transformational and emotional leadership on the emotions of first officers.

A Study on Cybersecurity Regulation for Financial Sector: Policy Suggestion based on New York's Cybersecurity Regulation (23 NYCRR 500) (국내 금융 사이버보안 규제의 국제경쟁력 제고를 위한 연구: 미(美) 뉴욕 주 금융 사이버보안 규정 (23 NYCRR 500)을 중심으로)

  • Kim, Docheol;Kim, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.87-107
    • /
    • 2018
  • In March 2017, the State of New York became the first state to implement regulation specific to cybersecurity for financial institutions. Unlike previous regulations regarding information security, it has set a minimum requirements to establish cybersecurity program based on risk assessment results, protect Nonpublic Information, designate of CISO, and report to regulatory entity. This paper presents a need for a new cybersecurity policy in Korea by examining newly adopted cybersecurity regulation in the United States. Finally, the paper identify policy suggestions based on the United States's approach as they have successfully implemented the program.

The Effects of Product Attributes, Brand and Corporate's Images on Consumer's Purchasing Intension - Focusing on Chinese Cellular Phone Markets in 9 Areas - (제품속성, 브랜드 및 기업 이미지가 소비자의 구매의도에 미치는 영향 -중국 9개 지역의 휴대폰시장을 중심으로-)

  • Jin, Cheng-Zhe;Park, Eui-Burm
    • International Area Studies Review
    • /
    • v.12 no.3
    • /
    • pp.367-390
    • /
    • 2008
  • The Chinese cellular phone markets growth has the character which is two-sided gives the chance and threat in Korean mobile communication industry. This also demands the localization of the international marketing strategies which establishes in grasp of consumer consuming propensity and purchase intention. It is the goal that provides a strategic current point to the Korean enterprise which enter to China. To observe a test of hypothesis results concretely from empirical analysis with after words is same. The hypothesis 1, 'corporate image really will plus affect(+) in purchase intention' the hypothesis was adopted. The hypothesis 2, 'brand image really will plus affect(+) in purchase intention' also the hypothesis was adopted. The hypothesis 3, 'product attributes really will plus affect(+) in purchase intention' also the hypothesis was adopted. The other research hypothesis which sex and age were rejected, school was adopted partially, others was adopted. When about the consumer who is used from empirical analysis measurement items in the center application presents the strategies which is possible in fact.

Civil liability and criminal liability of accidents caused by autonomous vehicle hacking (해킹으로 인한 자율주행자동차 사고 관련 책임 법제에 관한 연구 -민사상, 형사상, 행정책임 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.19-30
    • /
    • 2019
  • As the 4th industrial revolution has recently become a hot topic, the importance of autonomous vehicles has increased and interest has been increasing worldwide, and accidents involving autonomous vehicles have also occurred. With the development of autonomous vehicles, the possibility of a cyber-hacking threat to the car network is increasing. Various countries, including the US, UK and Germany, have developed guidelines to counter cyber-hacking of autonomous vehicles, In the case of Korea, limited temporary operation of autonomous vehicles is being carried out, but the legal system to be applied in case of accidents caused by vehicle network hacking is insufficient. In this paper, based on the existing legal system, we examine the civil liability caused by the cyber hacking of the autonomous driving car, while we propose a law amendment suited to the characteristics of autonomous driving car and a legal system improvement plan that can give sustainable trust to autonomous driving car.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Expectations and Anxieties Affecting Attitudes toward Artificial Intelligence Revolution (인공지능 혁신에 대한 기대와 불안 요인 및 영향 연구)

  • Rhee, Chang Seop;Rhee, Hyunjung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.37-46
    • /
    • 2019
  • Humans have anxieties as well as expectations for artificial intelligence. This study attempted to identify the expectation and anxiety factors affecting the attitude toward artificial intelligence innovation and to ascertain how much influence they have on current artificial intelligence innovation. This study considered that attitudes toward artificial intelligence may be different for each generation sharing a similar technology change culture. Therefore, the researchers limited the research subjects to I generation, which is the main users of artificial intelligence in the future. As a main result, the factors of expectiation of 'performance gain', 'positive social impact', and the factor of anxiety of 'threat to human-oriented social value' were drawn, and these factors influenced weak and strong artificial intelligence respectively. The results of this study suggests that artificial intelligence should develop into a pleasant relationship with humankind.

A Study on the Method for Judging the Required Protection Capacity through Decision Making (의사결정론을 통한 방호요구수준 판단방안 제시에 관한 연구)

  • Lee, Sung-Hak;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.167-174
    • /
    • 2019
  • Protective facilities are the last means of ensuring the survivability of personnel and assets, and there is a greater amount of matters to consider than those of general buildings. However, the Defense Military Facilities Criteria and the Ministry of the Interior and Safety, Ordinance No. 20, are only considering the expected enemy threats. In this study, we use objective and statistical methods to refine the consideration of the required capacity of protection based on the opinions of the experts. Specifically, the study adopts the Delphi technique associating the experts related to 30 defense military facilities criteria. The first-round questions were open-ended, and it compiled the points to consider related to the bulletproof and explosion - proof design. The second questionnaire was applied as closed questionnaire with 7 points scale methods. As a result of the factor analysis on the opinions of the experts, it was confirmed that the protection requirement level was due to METT + TC.

A Study on the Application of Block Chain to Ensure Data Integrity in MANET Environment (MANET 환경에서 데이터 무결성 보장을 위한 블록체인 적용에 관한 연구)

  • Yang, Hwanseok;Choi, Daesoo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.53-58
    • /
    • 2018
  • MANET transmits data by hop-by-hop method because it is composed of mobile nodes without support of any infrastructure. Its structure is very similar to a block chain. However, it is exposed to various threats such as data tampering or destruction by malicious nodes because of transmission method. So, ensuring the integrity of transmitted data is an important complement to MANET. In this paper, we propose a method to apply the block chain technique in order to protect the reliability value of the nodes consisting the network from malicious nodes. For this, hierarchical structure of a cluster type is used. Only cluster head stores the reliability information of the nodes in a block and then, this can be spread. In addition, we applied block generation difficulty automatic setting technique using the number of nodes selecting cluster head and the reliability of cluster head to prevent the spread of wrong blocks. This can prevent block generation and spread by malicious nodes. The superior performance of the proposed technique can be verified by comparing experiments with the SAODV technique.

  • PDF

A Study on the Disaster Prevention Design Of School Zone (어린이 보호구역 방재디자인 연구)

  • Kim, Youngjun;Noh, Hwangwoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.868-876
    • /
    • 2021
  • A school zone means a certain section designated among facilities, such as schools, childcare facilities, academies, etc., to protect children from the risk of traffic accidents. Since the school zone was established in September 1995, school zone accidents have not decreased even though it has been strengthened through a total of nine revisions until January 2021. This paper aims to present a standard model for child protection zones based on disaster prevention design. Methods of research included literature research, empirical research, and cognition research. Awareness survey was conducted on children, parents and drivers. Environmental surveys included crosswalks, motorways, pedestrian roads, and traffic lights. The investigation found that visual recognition of school zones by vehicle drivers was difficult, and found that motorcycles using pedestrian roads were a very threat to children. Accordingly, improved school zone standard model design centered on disaster prevention design was presented.