• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.024 seconds

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Anomaly Detection for IEC 61850 Substation Network (IEC 61850 변전소 네트워크에서의 이상 징후 탐지 연구)

  • Lim, Yong-Hun;Yoo, Hyunguk;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.939-946
    • /
    • 2013
  • This paper proposes normal behavior profiling methods for anomaly detection in IEC 61850 based substation network. Signature based security solutions, currently used primarily, are inadequate for APT attack using zero-day vulnerabilities. Recently, some researches about anomaly detection in control network are ongoing. However, there are no published result for IEC 61850 substation network. Our proposed methods includes 3-phase preprocessing for MMS/GOOSE packets and normal behavior profiling using one-class SVM algorithm. These approaches are beneficial to detect APT attacks on IEC 61850 substation network.

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism (게이미피케이션 메커니즘을 이용한 초등 네트워크 정보보안 학습교재 및 교구 개발)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.787-797
    • /
    • 2016
  • This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

The Material Values, Attitudes toward Money, and Money Use Behavior of Female Collegians (여자대학생의 물질주의 가치성향과 화폐에 대한 태도 및 금전사용행동)

  • 홍은실;황덕순;한경미
    • Journal of Families and Better Life
    • /
    • v.19 no.1
    • /
    • pp.143-158
    • /
    • 2001
  • The purpose of this study was to examine the influences of the material values, attitudes toward money, and the background variables to the money use behavior of female collegians. The samples were selected from 541 female collegians. Cronbach$\alpha$, One-way ANOVA, Duncan test, Multiple regression, Path analysis were used as statistical analysis. The results were summarized as follows : Resulting from multiple regression analysis, the money use behavior of female collegians had the positive linear relationships with the variables such as mothers level of education, material values, and 3 money attitude - the means of security, the symbol of anxiety, the means of pleasure - in five money attitude dimensions. The most influential variable was money attitude of the means of security.

  • PDF

Fault Diagnosis with Adaptive Control for Discrete Event Systems

  • El Touati, Yamen;Ayari, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.165-170
    • /
    • 2021
  • Discrete event systems interact with the external environment to decide which action plan is adequate. Some of these interactions are not predictable in the modelling phase and require consequently an adaptation of the system to the metamorphosed behavior of the environment. One of the challenging issues is to guarantee safety behavior when failures tend to derive the system from normal status. In this paper we propose a framework to combine diagnose technique with adaptive control to avoid unsafe sate an maintain the normal behavior as long as possible.

User Behavior Based Web Attack Detection in the Face of Camouflage (정상 사용자로 위장한 웹 공격 탐지 목적의 사용자 행위 분석 기법)

  • Shin, MinSik;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.365-371
    • /
    • 2021
  • With the rapid growth in Internet users, web applications are becoming the main target of hackers. Most previous WAFs (Web Application Firewalls) target every single HTTP request packet rather than the overall behavior of the attacker, and are known to be difficult to detect new types of attacks. In this paper, we propose a web attack detection system based on user behavior using machine learning to detect attacks of unknown patterns. In order to define user behavior, we focus on features excluding areas where an attacker can camouflage as a normal user. The experimental results shows that by using the path and query information to define users' behaviors, best results for an accuracy of 99% with Decision forest.

Experiences of Special Education Teachers in Dealing with Behavioral Problems Presented by Students with Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.129-134
    • /
    • 2022
  • The primary goal of any classroom is effective teaching and student learning, with an emphasis on changing negative students' behaviors into positive ones. This change can occur when students' behavior is always at the forefront of teachers' educational goals. The current study aimed to reveal the experiences of special education teachers in dealing with the behavioral problems that students with disabilities show by identifying behavioral problems among students with disabilities and investigating the efficacy of the application of behavior modification plans and strategies designed to address the behavioral problems presented by students with disabilities. The researcher used a qualitative phenomenological approach, and the study tool consisted of semi-structured interviews that consisted of (13) questions directed to (10) special education male and female teachers who work in special education centres and institutes. The data were analyzed using the thematic analysis method. The findings of the study showed that the most undesirable behaviors prevalent among students with disabilities in the classroom were aggression, bullying and ADHD. The actions taken by teachers in confronting these behaviors were not systematic and were carried out randomly, as no behavior modification plans were applied. The most important strategies used by teachers in facing behavioral problems were applied behavioral analysis (ABA) strategies such as reinforcement, punishment and ignoring. The results have many important implications for future practice, including the need to conduct practical training courses for special education teachers to implement behavior modification plans and develop methods of measuring inappropriate behavior.

Determinations of Impulsive Buying Behavior: An Empirical Analysis of Consumers' Purchase Intentions for Offline Beauty Products

  • Tayyaba Tanveer;Mustaghis ur Rahman;Syeda Qurat ul Ain Kazmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.45-54
    • /
    • 2024
  • Ingrained in multiple consumption theories, this research covers the seven determinants (Hedonic Consumption, Consumers' mood, Store layout, product promotion, Persons' situation, Materialism, and Product Attributes) of purchase intentions of a consumer. For this study, 384 offline shoppers were surveyed and found that out of seven, six determinants significantly trigger impulse buying behavior of customers of beauty products in a modern market setting while one determinant 'Materialism' did not have any influence on the impulse buying behavior. The relationships of the variables were statistically checked by multiple linear regression. Results of this study show that a consumer's mood has a significant impact on impulse buying as it can trigger the impulse behavior of consumers. Person situations also have a positive impact on impulse buying it means time, money, fear of missing out can active impulse buying. Store layout can also trigger that unplanned purchase which means store lighting, the music of the store, ambiance may affect the purchasing. Product promotion has an impact on spontaneous purchase which indicates that free coupons, discounts, free delivery, offers to attract the customer to sudden purchase. Product design, packaging, color, labeling indicate a positive and significant impact on impulse buying. However, materialism indicates an insignificant impact on impulse buying.