• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.03 seconds

Rheological behavior study of Marine Lubricating oil on the amount of MGO (Marine Gas Oil) dilution (해상용 경유의 희석량에 따른 선박용 윤활유의 유변학적 거동연구)

  • Song, In Chul;Lee, Young Ho;Yeo, Young Hwa;Ahn, Su Hyun;Kim, Dae il
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.2
    • /
    • pp.240-245
    • /
    • 2016
  • This paper describes the rheological behavior study such as viscosity and change of shear stress regarding marine lubricating oil according to the amount of Marine Gas Oil (MGO) dilution. The viscosity reduction due to fuel dilution is crucially important characteristic to decreasing engine durability because of the abrasion of piston ring or liner. The lubricating oil used in this paper was blended with magnetic stirrer diluted High Sulfur Diesel (HSD, 0.05 wt%) ratio of 3 %, 6 %, 10 %, 15 % and 20 %. The viscosity and shear stress of diluted lubricating oil were measured with the temperature range from $-10^{\circ}C$ to $80^{\circ}C$ using a rotary viscometer (Brookfield Viscometer). As the amount of MGO dilution increasing in lubricating oil, the viscosity and stress of those decreased, because the lubricating oil diluted MGO with low viscosity show the trends to decreased viscosity and shear stress. Especially, the viscosity and shear stress of lubricating oil radically decreased at low temperature ($0{\sim}-10^{\circ}C$) and doesn't effect in MGO dilution at over $40^{\circ}C$. As temperature risen, the reduction of the viscosity and shear stress in lubricating oil shows the Newtonian behavior. The lubricating oil was required to check up periodically to improve engine durability since the viscosity reduction by MGO dilution accelerating the engine abrasion.

A Study on the Patients' Behavior and Architectural Correspondence for the Multi-patient Room (다인설 환자의 심리행태와 건축적 대응에 관한 연구)

  • Choi, Young-Mi;Yang, Nae-Won
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.6 no.11
    • /
    • pp.71-78
    • /
    • 2000
  • This study indicates bed-transfer as the significant behavior of a ward and points out architecture that cannot meet the patient's need. It is examined that inpatient's behavior depends on visibility, psychological security, privacy & communication, control, support and this study applies them to analyze the selected cases. This study also emphasizes the supportive role of hospital architecture so that the function of a ward as a healing environment may be maintained.

  • PDF

The Impact of Information Security(IS) Organizational Justice on Employee IS Value Congruence and IS Voice Behavior: Exploring the Role of Susceptibility to Interpersonal Influence (조직의 정보보안 공정성이 개인의 정보보안 관련 가치 일치 및 제언 행동에 미치는 영향: 대인 간 영향 민감성의 적용)

  • Hwang, Inho
    • The Journal of Information Systems
    • /
    • v.32 no.4
    • /
    • pp.1-28
    • /
    • 2023
  • Purpose Recently, organizations have been allocating significant financial resources toward the implementation of new technologies and stringent information security (IS) policies in order to enhance IS. However, the potential for IS threats from internal sources within organizations remains high. This study proposes a mechanism whereby the organization's IS environment (organizational justice) enhances employees' perception of IS value congruence and encourages their voice behavior. Furthermore, this study validates that an individual's susceptibility to interpersonal influence can reinforce the relationship between the aforementioned factors and voice behavior. Design/methodology/approach We utilized AMOS 22.0 and Process 3.1 to validate the research model and hypotheses. The data was gathered from 435 employees employed in South Korean firms that implemented IS policies in their work. Structural equation modeling was employed to examine the relationship between organizational justice, value congruence, and voice behavior, and the interaction effect was confirmed by incorporating model 1 of Process 3.1 for the hypothesis pertaining to susceptibility to interpersonal influence. Findings The findings of this study indicate that organizational justice has a positive impact on voice behavior, which is further enhanced by value congruence. Furthermore, the influence of organizational justice and value congruence on voice behavior is moderated by susceptibility to information influence, while susceptibility to normative influence only moderates the effect of organizational justice. These results provide valuable insights for organizations in developing customized information systems strategies that effectively promote employees' voice behaviors.

The Improvement Method of "Question and Research Guides" Training for Private Security (민간경비원의 질문.검색 요령 교육훈련에 관한 개선방안)

  • Kim, Chang-Ho;Oh, Jae-Hwan
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.43-66
    • /
    • 2009
  • For the quality improvement on private security industry, the quality of personnel in private security should be advanced through the systematic training. If the personnel in private security provide an advanced service in applying knowledge and technique to the field when in training, they can obtain the reliability from people. With the point of this side, practical and systematic training is essential to the restoration on the private security industry. The personnel of private security face many people in the field. So they must work with an active concept that can prevent additional crime from behavior suspicions through scientific observation method and systematic inquiry method rather than negative work with providing a friendly service in the field. For conducting this concept, therefore, this study suggested the improvement training program of "Question and Research Guides" from new employee training on existing private security. The scientific observation standard is specifically suggested from the study 'people watching' of Professor Morris, D. and an act contact question from lead technique that US FBI, police, and inspection institute are taking through the feature of human act and 'METT' that is the program for emotion capture training through human minute look is going to be applied on "Question and Research Guides" training. This will provide the educational mood for students with the training content that is available for the practical training program and the real work, and will help to restore the private security industry with obtaining people's reliability through the scientific work and advanced field treatment.

  • PDF

The Role of Psychological Distance and Relative Optimism in Information Security Decision Making (정보보호 의사결정에서 정보보호 침해사고 발생가능성의 심리적 거리감과 상대적 낙관성의 역할)

  • Jongki Kim;Jiyun Kim
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.51-71
    • /
    • 2018
  • Many studies in the field of information security reveal the need to increase awareness. However, although awareness of information security has been raised to a considerable extent, actual security behavior has been shown to fall short of that. Therefore, we wanted to identify the role of psychological factors in making information security decisions by conducting a experimental study. The results show that there are differences in perception of information security risks according to the probabilistic distance and the degree of relative optimism due to social distance. In relation to their relative optimism and intention of information security, they reduced the level of perceived risk compared to those close to them and found that their influence varied according to their probabilistic distance. This study has made valuable attempt in terms of methodology and it is meaningful that the psychological factor is taken into consideration for the information protection behavior, so that the range of relative optimism that actually affects the perception of risk is narrowed. It is expected to contribute to the improvement of information security level of information technology users and protection of information assets by empirically identifying necessity of various approaches to decision making process for information security.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.

Online Game Identity Theft Detection Model based on Hacker's Behavior Analysis (온라인게임 계정도용 탐지모델에 관한 연구)

  • Choi, Hwa-Jae;Woo, Ji-Young;Kim, Huy-Kang
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.81-93
    • /
    • 2011
  • Identity theft happens frequently in popular MMORPG(Massively Multi-player Online Role Playing Games) where profits can be gained easily. In spite of the importance of security about identity theft in MMORPG, few methods to prevent and detect identity theft in online games have been proposed. In this study, we investigate real identity theft cases of an online game and define the representative patterns of identity theft as the speedy type, cautious type, and bold type. We then propose the automatic identity theft detection model based on the multi-class classification. We verify the system with one of the leading online games in Korea. The multi-class detection model outperforms the existing binary-class one(hacked or not).

Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment (클라우드 네이티브 환경을 위한 오픈소스 기반 모니터링 서비스 간편 배포 및 이미지 서명 검사기 구현)

  • Gwak, Songi;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.637-645
    • /
    • 2022
  • Cloud computing has been gaining popularity over decades, and container, a technology that is primarily used in cloud native applications, is also drawing attention. Although container technologies are lighter and more capable than conventional VMs, there are several security threats, such as sharing kernels with host systems or uploading/downloading images from the image registry. one of which can refer to the integrity of container images. In addition, runtime security while the container application is running is very important, and monitoring the behavior of the container application at runtime can help detect abnormal behavior occurring in the container. Therefore, in this paper, first, we implement a signing checker that automatically checks the signature of an image based on the existing Docker Content Trust (DCT) technology to ensure the integrity of the container image. Next, based on falco, an open source project of Cloud Native Computing Foundation(CNCF), we introduce newly created image for the convenience of existing falco image, and propose implementation of docker-compose and package configuration that easily builds a monitoring system.

Factors Affecting the Behavioral Intention and Behavior of Using E-Wallets of Youth in Vietnam

  • PHAN, Trong Nhan;HO, Truc Vi;LE-HOANG, Phuong Viet
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.295-302
    • /
    • 2020
  • The study examines an empirical case that explores the key constructs of the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh, Morris, Davis & Davis, 2003) and the relationship between security and privacy of the Theory of Perceived Risk (TPR) (Bauer, 1960). This study employs survey data of 200 young Internet users aged 18 to 25. The study was conducted through two steps: preliminary research by qualitative research method to form the official research scale then formal research by quantitative research method using CFA and SEM to test the research model. The research results show that performance expectancy and social influence significantly predict behavioral intention to use e-wallets in payment. In contrast, the factors, namely, security and privacy, and effort expectancy, are statistically insignificant on behavioral intention. Nevertheless, the facilitating conditions factor still affects the behavior of using e-wallets. The study proposes a model to generalize the online payment environment through the integration of UTAUT and TPR models that are important for online payment management and researchers in the technology environment. The findings of this study suggest that social influence significantly affects the intention of young people to use e-wallets instead of security and privacy.