• Title/Summary/Keyword: Life Threat

Search Result 256, Processing Time 0.04 seconds

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

The Terrain Transformation of the Fishing Industry in East Sea Rim: Impact of Entering Chinese Fishing Fleets into East Sea on the Fishery Production, Employment and Life Threat (환동해 어업의 지형 변화: 중국어선의 동해 진출이 어업생산과 고용 및 생존 위협에 미치는 영향)

  • Choi, Young-Jin
    • The Journal of Fisheries Business Administration
    • /
    • v.52 no.1
    • /
    • pp.1-22
    • /
    • 2021
  • This study aims to face common threats from the depletion of fish resources, the decline of production and employment as well as the increase of life risk in East Sea Rim countries, North Korea, South Korea, Japan and Russia due to the Chinese fishing fleets entering East Sea. The recent competition in fishing among fishing vessels and fleets of national origin operating in the East Sea has induced a significant change in the ecological landscape of the fishing fleets cluster while having influenced production and employment in the fishing industries of South Korea and Japan as well as life threat on the fishermen in North Korea. It seems that the population organizational ecological theory can be applied to this change. It can be seen as the isomorphism of the selection process over the exclusive economic zone (EEZ) to avoid the environment in which these North Korean fishing vessels are pushed against the Chinese fleet in the North Korean part of the East Sea. To resolve the fishery disputes or conflict in the common waters in East Sea, first of all, Chinese fishing fleets will be required to put international pressure so as to solve the unfairness of the illegal fishing and overfishing by the International Fishery Organization or the UN violations of the sanctions against North Korea selling fishing rights to China. Although it is not easy for South Korea to cooperate with North Korea in the short term, South Korea will be able to support the fishery infrastructure in North Korea in the mid- to the long-term to prevent the loss of innocent lives for their fishermen and to raise their incomes.

Utilizing the Health Belief Model to predicting female middle school students' behavioral intention of weight reduction by weight status

  • Park, Dong-Yean
    • Nutrition Research and Practice
    • /
    • v.5 no.4
    • /
    • pp.337-348
    • /
    • 2011
  • Weight reduction behavior is common among adolescent girls. The present study examined the status of weight reduction behavior and factors affecting the behavioral intention of weight reduction using the Health Belief Model (HBM) for female middle school students by weight category. Survey data was collected from three girl's middle schools in Gyeongju, Korea. A total of 299 female middle school students participated in this study. The questionnaire had questions about general characteristics, weight reduction behavior, and variables of HBM (perceived threat, perceived benefits, perceived barriers, cues to action, self-efficacy in dietary life and exercise, and behavioral intention of weight reduction). Descriptive statistics, Chi-square tests, ANOVA, and multiple regression analysis were applied to analyze the variables. A higher percentage of students in the overweight group attempted weight reduction than those in the underweight and the normal weight groups (P < 0.001). Among students who had attempted weight reduction, 73% tried diet therapy, while 78% tried exercise. Students in the normal and overweight groups showed significantly higher threat (P < 0.01) and cues to action (P < 0.001) than those in the underweight group. As for perceived benefits, barriers, and self-efficacy in dietary life and exercise, there were no significant differences among weight groups. Students in the overweight group showed the strongest intention of weight reduction and there were significant differences among the three weight groups (P < 0.001). Perceive threat (P < 0.01), cues to action (P < 0.001), and perceived self-efficacy (P < 0.01) were significantly associated to behavioral intention of weight reduction for all respondents. For the underweight group, perceived threat (P < 0.05) and perceived self-efficacy (P < 0.01) were the significant variables. For the overweight group, cue to action was the significant variable (P < 0.05).

Data Quality Analysis of Korean GPS Reference Stations Using Comprehensive Quality Check Algorithm (종합적 품질평가 기법을 이용한 국내 GPS 상시관측소의 데이터 품질 분석)

  • Kim, Minchan;Lee, Jiyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.9
    • /
    • pp.689-699
    • /
    • 2013
  • During extreme ionospheric storms, anomalous ionospheric delays and gradients could cause potential integrity threats to users of GNSS (Global Navigation Satellite System) augmentation systems. GNSS augmentation ground facilities must monitor these ionospheric anomalies defined by a threat model and alarm the users of safely-of-life applications within time-to-alerts. Because the ionospheric anomaly threat model is developed using data collected from GNSS reference stations, the use of poor-quality data can degrade the performance of the threat model. As the total number of stations increases, the number of station with poor GNSS data quality also increases. This paper analyzes the quality of data collected from Korean GPS reference stations using comprehensive GNSS data quality check algorithms. The results show that the range of good and poor qualities varies noticeably for each quality parameter. Especially erroneous ionospheric delay and gradients estimates are produced due to poor quality data. The results obtained in this study should be a basis for determining GPS data quality criteria in the development of ionospheric threat models.

The Relationships of Pain cognition, Performance Status, and Hope with Health-related Quality of Life in Cancer Patients (암환자의 통증인지, 기능상태 및 희망과 건강관련 삶의 질의 관계)

  • Ryu, Eun Jung;Lee, Ju Mi;Choi, So Young
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.1
    • /
    • pp.155-165
    • /
    • 2007
  • Purpose: The purpose of this study was to determine the relationships of pain cognition, performance status, and hope with health-related quality of life. Methods: Patients(n=149) with various cancer diagnoses completed the SF-36 standard Korean Version and the Herth Hope Index. The Perceived Meanings of Cancer Pain Inventory was used to measure the cognition dimension of pain, whereas the Brief Pain Inventory Korean version was used to represent the sensory dimension of pain. Results: The patients in the pain group had significant differences in the three dimensions(loss, threat, spiritual awareness) of pain cognition. There were statistically significant negative correlations between the three dimensions(loss, threat, and spiritual awareness) of pain cognitions and SF-36 dimension, and the positive correlations between challenge dimension and SF-36 dimension. Hope had the positive correlation with SF-36 dimensions. Conclusion: Pain has a negative impact on health-related quality of life, especially on physical health. However, patients who ascribed more positive meaning to their pain, tended to have a higher quality of life. Therefore, nursing intervention to reinforce the positive aspects of pain cognition is to empower patients to create a sense of control and assume an active role in pain management and quality of life.

  • PDF

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

The Changes of Consumption Behavior in Bengkulu, Indonesia: Case of Purchasing Corona Prevention Products Through Indirect Ditribution Channel

  • Hayu, Rina Suthia;Sulistiyawan, Edy;Salim, Muhartini
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.27-36
    • /
    • 2021
  • Purpose: COVID-19, government regulation and social media have changed many aspects of life including consumption behavior. The influence of social media by spreading massive news about COVID-19 also have the impact toward emotions threat, perceived risk, and perceived value of consumption behavior in Bengkulu Province, Indonesia. This research aims to analyze the extent to which changes in the consumption behavior, mainly for purchasing of corona prevention products through indirect distribution channels. Research design, data and methodology: This research was descriptive quantitative using the IPA method with sample of people in Bengkulu Province. This study obtained 208 respondent data from questionnaires and tested the validity and reliability with corrected-item total correlation method. Results: The study found that COVID-19 pandemic and government regulation variable were in quadrant II, in quadrant III there were social media variable, emotions threat and perceived risk. Meanwhile, in quadrant IV there were perceived value variable. Conclusions: The findings indicated that COVID-19 and government regulation are the most variable that influence people to buy corona prevention product, meanwhile perceived value is the less influence variable. Therefore, government and marketers have to prepare strategic plan in order to raise people awareness to avoid corona by buying corona prevention product.

Social Environment Research of Capitalism for the Private Security Development (민간경호경비의 발전에 대한 자본주의의 사회환경적 해석)

  • Kim, Chang-Ho;Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.125-154
    • /
    • 2004
  • Capitalism is based on a material desire of the human being. the social control of capital value and the management of capital ability reflects the actual condition of the capitalism well. The unconstrained growing and the expansion of capitalism, it finally lost social meaning and an importance of human being element and the safety of the civilian life, began to threat the security of citizen by forming over the material center structure of society. Improving human life quality and material richness on their life leads positive factor of capitalism whereas is causing several crimes through the society which is being threatened around a human being life for a negative factor of the capitalism. Therefore capitalistic social system has offered both a positive factor 'growing' and 'richness' and that of a negative 'structural poverty' and 'lack of security' and they have been remaining the assignment of capitalism 'poverty' and 'security' by settlement in the society for a extremely phenomenon of both sides. The objective of this research is to build its study theory and establish its causal relation by illuminating for the social environment of capitalism for a private guard or a development background of the civil security contributing for citizen security, as well as gets the clue of the development possibility of the civil guard and escort field and the development of capitalism. In Korea because their recognition of the study approach and the social safety for social security control function is still staying first step and our daily life is annoying from various threat of the society, many studies and the realistic necessity of experience related with social security is being studied. In addition, The development possibility of the civil guard and defense at the civil field which will be keep the social security has a wide position but its study approach and realistic comprehension is still in insufficient condition. Consequently, this research is started to grasp the security of civil fiend and to grope a development possibility through the research of capitalism.

  • PDF