• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.022 seconds

Securing Safety in Collaborative Cyber-Physical Systems Through Fault Criticality Analysis (협업 사이버물리시스템의 결함 치명도 분석을 통한 안전성 확보)

  • Hussain, Manzoor;Ali, Nazakat;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.8
    • /
    • pp.287-300
    • /
    • 2021
  • Collaborative Cyber-Physical Systems (CCPS) are those systems that contain tightly coupled physical and cyber components, massively interconnected subsystems, and collaborate to achieve a common goal. The safety of a single Cyber-Physical System (CPS) can be achieved by following the safety standards such as ISO 26262 and IEC 61508 or by applying hazard analysis techniques. However, due to the complex, highly interconnected, heterogeneous, and collaborative nature of CCPS, a fault in one CPS's components can trigger many other faults in other collaborating CPSs. Therefore, a safety assurance technique based on fault criticality analysis would require to ensure safety in CCPS. This paper presents a Fault Criticality Matrix (FCM) implemented in our tool called CPSTracer, which contains several data such as identified fault, fault criticality, safety guard, etc. The proposed FCM is based on composite hazard analysis and content-based relationships among the hazard analysis artifacts, and ensures that the safety guard controls the identified faults at design time; thus, we can effectively manage and control the fault at the design phase to ensure the safe development of CPSs. To justify our approach, we introduce a case study on the Platooning system (a collaborative CPS). We perform the criticality analysis of the Platooning system using FCM in our developed tool. After the detailed fault criticality analysis, we investigate the results to check the appropriateness and effectiveness with two research questions. Also, by performing simulation for the Platooning, we showed that the rate of collision of the Platooning system without using FCM was quite high as compared to the rate of collisions of the system after analyzing the fault criticality using FCM.

Analysis of difference between QSS + participation groups using AHP And Study of improvement plan - Focus on POSCO case -

  • Yoon, Tae Ung;Lee, Min Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.7
    • /
    • pp.121-129
    • /
    • 2018
  • Since 2005, POSCO has been conducting continuous innovation activities using its own innovation methodology, QSS + (Quick Six Sigma Plus). Recently, the effectiveness of QSS + has been decreased owing to the different needs and purposes for each group. The purpose of this study is to compare the weights of the QSS + factors using AHP analysis. QSS + factors consist of two levels. The high level consists of 7 items : 'Master Plan, Waste Zero Activity, Daily Improvement Activity, Talent Development, Project Activity, Initiative/Encouragement activity'. The low level consists of 3 items '5S, My Machine, My M&S' for Daily Improvement Activity. As a result, we found that there was a difference between the weights of the four groups. We suggest the effective QSS + directions to improve the quality of POSCO.

A Study on the Factors affecting Cyber-Career-Counseling-Activation based on Structural Equation Model(SEM) (구조방정식 모형을 이용한 사이버진로상담 활성화 영향요인에 관한 연구)

  • Lee, Young-Ja;Baek, Hyeon-Gi
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.379-388
    • /
    • 2008
  • This paper is to redefine the concept of Cyber Career Counseling Activation(=C-C-C-A) and verify the effects of the factors affecting the C-C-C-A at Korean academic high school level in Kyunggi Province. In this research, we hypothesize that the three independent variables increase the effects of Cyber Career Counseling Activation.. To discuss the hypothesis, we analyzed survey data of 322 students who had taken Cyber Career Counseling in December 2007 based on Structural Equation Model. The results are as follows: First, the three crucial factors(Expanding C-C-C Opportunities, Improving C-C-C Service, Establishing C-C-C Service System) increase the C-C-C-A effectiveness. Second, as a result of Confirmatory Factor Analysis(CFA), the goodness of fit indices(GFI, AGFI, CFI, RMSEA) demonstrate statistical significance and fitness of the C-C-C-A Model. Therefore, the outcomes show that the three factors are the significant ones of Cyber Career Counseling Activation Model.

  • PDF

A Study on the Economic Effectiveness of the Artificial Fish Reef Project in the Tae-an Marine Ranching (태안시범바다목장해역내 인공어초사업의 경제적 효과에 대한 연구)

  • Choi, Jong-Du
    • The Journal of Fisheries Business Administration
    • /
    • v.44 no.3
    • /
    • pp.103-109
    • /
    • 2013
  • This paper analyzed that the economic effectiveness of the artificial fish reef project in the Tae-an Marine Ranching. Benefit-cost(B/C) model used to indicate the effects of economic valuation. B/C model is based on the sub-models which are Benefit Cost Ratio(BCR), Net Present Value(NPV) and Internal Ration of Return(IRR). First, the Sum of Incremental Benefit and Cost for total vessel by year in Artificial Fish Reef Area(AFRA) estimated 2,381 million won. And then, using 5.5% discounting rates and the survey data, the sub-models showed economically feasible in the all of analysis and analyzed the results as follows. BCR is 2.66, NPV is 28,014million won, and IRR is 22.78%. In conclusion, these results indicated that the artificial fish reef project in Tae-an Marine Ranching would be increase the income of fishermen as well as fish biomass.

Effectiveness and Problems of Distance Learning

  • Nam, Sang-Zo
    • International Journal of Contents
    • /
    • v.6 no.1
    • /
    • pp.12-19
    • /
    • 2010
  • In this paper, attendance in distance learning courses of a cyber university has been surveyed in an effort to verify the effectiveness of distance learning. Based on survey data from 4,749 distance learning participants, major attending place, major reasons for attending online class, fidelity to online classes, attending time per week, perceived educational effectiveness, perceived and relative seriousness of problems, and other variables have been evaluated. The results indicate that perceptional seriousness of the investigated problems is not statistically important. The findings indicate that, among operational problems, self willingness and cheating are the most remarkable. In contrast, the relative seriousness of traditionally recognized problems such as H/W availability and network speed among environmental problems is least remarkable. An analysis of demographic differences such as sex, employment, and school year in terms of seriousness of problems is also performed. The results reveal the existence of statistically significant differences according to sex, employment, and school year with regard to almost all elements of environment, actual current conditions, and seriousness of problems, with the exception of some elements such as attending place and perceived fidelity.

Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities (보안책임과 규제가 기업의 보안활동에 미치는 영향 분석)

  • Shim, Woo-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.53-73
    • /
    • 2011
  • Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms' information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

A Study on the Scope of Protection for Freedom of Expression on Internet: Focused on the Analysis of Judicial Precedents on Cyber Conflicts (인터넷에서 표현의 자유 보호 법리에 관한 연구: 사이버 분쟁에 대한 법원 판례 분석을 중심으로)

  • Yun, Sung-Oak
    • Korean journal of communication and information
    • /
    • v.50
    • /
    • pp.29-49
    • /
    • 2010
  • Various opinions are expressed about the Internet Regulation. Some people argue that it is impossible to control because of the technical characteristics of Internet, while other people argue that it is easy to control. Recently in Korea, a move to reinforce the Internet Regulation through the extension of cyber real-name system is emerging, whereas the concern for its excessive infringement of the Freedom of Expression is increasing. This paper was intended to draw a reasonable direction for Internet Regulation in our society. And accordingly this paper tried to suggest a desirable direction of Internet Control in the future and to draw a criterion for domestic court judgement by analyzing cases of cyber defamation so far. The result of this study proposed that the Freedom for Expression be widely secured in the case of cyber defamation of criticism and political comments upon public officials and that the legitimacy and effectiveness of Internet Regulation be ensured. This result of study is expected to help establish the direction and principle of Internet Regulation in the future around Korea Communications Commission and Korea Communications Standards Commission.

  • PDF

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

Analysis on Pre-service and In-service Teachers' Participation in Cyber Education (예비교사와 현직교사의 사이버교육 참여 경험 분석)

  • Jo, Mi-Heon;Lee, Ok-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.2
    • /
    • pp.197-208
    • /
    • 2005
  • For the wide spread of cyber education, it is important to understand the instructional characteristics of cyber education and its applications in the educational sites which help to cope with the practical needs and problems. This study was conducted to analyze the experience of cyber classes(working hours, tasks and evaluation, satisfaction level and instructional effectiveness, suggestions for cyber education) and use of instructional methodology (instructional activities, interaction frequencies, cooperative learning activities, instructional activities toward knowledge building). The data was collected from pre-service teachers(403) and in-service teachers(318) in June 2004. The results were that pre-service and in-service teachers all consider the satisfaction level and academic achievement level of cyber classes lower than that of FTF classes. Particularly the boring presentation of instructional materials and the inadequate instructional strategies for cyber classes were the biggest complains, and lack of interaction among peer groups and with instructors, lack of learning opportunity for cyber instructional strategies, limited group activities, lack of interaction with experts were followed. Limited types of evaluation also showed that cyber classes focus on results more than the process of students' academic achievement.

  • PDF