• Title/Summary/Keyword: EITM

Search Result 2, Processing Time 0.02 seconds

The Effects of Information and Predisposition on Individual Responses to Hypothetical Survey Questions

  • Wang, Ching-Hsing
    • Asian Journal for Public Opinion Research
    • /
    • v.2 no.2
    • /
    • pp.71-102
    • /
    • 2015
  • This study investigates the effects of information and predisposition on individual responses to hypothetical questions. By employing the empirical implications of theoretical models (EITM) framework, I confirm that information and predisposition have positive effects on individual substantive responses to the hypothetical questions about the independence-unification issue in Taiwan. Respondents with higher levels of information and predisposition are more likely to provide substantive responses. More importantly, information and predisposition exert a negative interaction effect on individual responses to hypothetical questions, which implies that when an individual counts more on information to respond to hypothetical questions, her predisposition plays a less important role in her responses and vice versa. Finally, this study suggests that hypothetical questions are effective to probe individual opinion on specific issues under hypothetical conditions.

Designing of The Enterprise Insider-Threats Management System Based on Tasks and Activity Patterns (사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계)

  • Hong, Byoung Jin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.3-10
    • /
    • 2015
  • Recent massive data breaches or major security incidents show that threats posed by insiders have greatly increased over time. Especially, authorized insiders can cause more serious problems than external hackers can. Therefore there is a growing need to introduce a system that can monitor the insider threats in real time and prevent data breaches or security incidents in early-stage. In this paper, we propose a EITMS(Enterprise Insider-Threats Management System). EITMS detects the abnormal behaviors of authorized insiders based on the normal patterns made from their roles, duties and private activities. And, in order to prevent breaches and incidents in early-stage, a scoring system that can visualize the insider threats is also included.