• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.022 seconds

One room Residential Dweller's Housing Behavior and Housing Need (원룸주택거주자의 주거행태와 요구도)

  • 황기아;백미나
    • Korean Journal of Human Ecology
    • /
    • v.7 no.1
    • /
    • pp.81-99
    • /
    • 2004
  • This study examined one room(studio apartment) residential deweller's housing behavior and housing need, and the relationship between the sense of housing values and housing satisfaction of one-room residence, The study surveyed 302 one-room residents in Busan city. The researcher modified, complimented, and used the previous researches on housing values and housing satisfaction. The analysis of the data used SPSS Win 10.0 program. The results of the research can be summarized as follows: 1. The motive of choosing one-room residence was mainly the closeness to the school or work, Jeonse(Rent with a one-room deposit) was more common than ownership, and the size is one-room residence was 10 to 15 Pyeong. 2. Among the five housing values of one-room residence dwellers, that is, amenity, indoor and outdoor environment, economy/convenience, convenience in transportation, and the interior functionality, the convenience in transportation was ranked highest, and the indoor and out door environment and economy/convenience followed. 3. The housing satisfaction of one-room residents was highest in location, and also high in the safety and the security or privacy, and the convenience of inside facility.

  • PDF

The uniaxial strain test - a simple method for the characterization of porous materials

  • Fiedler, T.;Ochsner, A.;Gracio, J.
    • Structural Engineering and Mechanics
    • /
    • v.22 no.1
    • /
    • pp.17-32
    • /
    • 2006
  • The application of cellular materials in load-carrying and security-relevant structures requires the exact prediction of their mechanical behavior, which necessitates the development of robust simulation models and techniques based on appropriate experimental procedures. The determination of the yield surface requires experiments under multi-axial stress states because the yield behavior is sensitive to the hydrostatic stress and simple uniaxial tests aim only to determine one single point of the yield surface. Therefore, an experimental technique based on a uniaxial strain test for the description of the influence of the hydrostatic stress on the yield condition in the elastic-plastic transition zone at small strains is proposed and numerically investigated. Furthermore, this experimental technique enables the determination of a second elastic constant, e.g., Poisson's ratio.

A Review on the Legal rights and obligation from the legal status of registered security guard (청원경찰의 법적 지위에 따른 권한과 의무)

  • Han, seung;Kim, yong geun
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.251-278
    • /
    • 2015
  • Registered security guards carry out police duties as civilian police who are in charge of security service, and so they have a two-fold status: a civilian in terms of a social standing and a policeman in the way that they execute the authority of security. The problem caused by this legal position is that their legal rights and obligation can be unclear in the task-action and working relationship. This paper attempts to study their functions, rights, and legal duties through the interpretation of the related positive law so as to reveal the problems that may spring from this ambiguous status of registered security guards. This endeavor illuminates their legal status specified in the positive law in and around the Act on the police assigned for special guard, observing their functions and the legal duties in the pursuit of their tasks, and ending up pointing out the problems of the positive law. As a result of research work, the most significant problems, even if multifarious, are the avoidance of the state reparation in the responsibility for the illegal behavior in connection with their operation; the unconstitutionality of the disciplinary punishment regulation originated from the entrust with full powers; the imperfection of the rules about the cooperative ties with the police; the possibility of human rights abuse caused by the ban on the labor dispute; the equality problems from the dual pay system; and the inadequacy of the codes about the recruitment qualification and method. This research is intended to help achieve the purpose of the security of national critical facilities through the smooth execute of duties as well as the protection of the guards' rights. Besides, the key focuses posed in this paper are worthy of being developed more accurately through the following researches.

  • PDF

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Reinforcement of IS Voice Behavior within the Organization: A Perspective on Mitigating Role Stress Through Organization Justice and Individual Social-identity (조직 내부의 정보보안 제언 행동 강화: 조직 공정성과 개인의 사회적 정체성을 통한 업무 스트레스 감소 관점)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.649-662
    • /
    • 2022
  • As information security(IS) is recognized as an organization's core value, organizations are making efforts to adopt strict IS policies and technologies. However, strict IS policies can cause negative behavior for employees of organizations who need to apply IS to their work. This study confirms that IS can express the role stress of employees, and suggests a way to mitigate the IS role stress. Specifically, we confirm that organization justice and individual social identity can reduce IS role stress, which reduces IS voice behavior. In the study, we surveyed workers of organizations that applied IS policies to their work and obtained 318 samples. Also, we tested the hypothesis by applying the structural equation model. As a result, IS organization justice increased IS voice behavior through social identity and partially reduced IS voice behavior by mitigating IS role stress. In addition, social identity moderated the relationship between IS role stress and IS voice behavior. This study suggests strategies for achieving internal IS goals by suggesting conditions for mitigating IS role stress from an organizational and individual perspective.

Comparison of dietary behavior and consumption of processed beverage depend on food insecurity status of adolescents in vientiane, Lao PDR (라오스 비엔티안 지역 청소년의 식품 불안정 상태에 따른 식행동 및 가공 음료 섭취 비교 연구)

  • Lee, Yena;Kim, Ji-Myung;Yi, Kyungock;Hansana, Visanou;Kim, Yuri
    • Journal of Nutrition and Health
    • /
    • v.51 no.6
    • /
    • pp.580-589
    • /
    • 2018
  • Purpose: The purpose of this study was to evaluate the food insecurity status and dietary behavior and examine the association between the food insecurity status and consumption of processed beverage for secondary school students in Vientiane, capital city of Lao PDR. Methods: The study subjects are 714 students (boys = 307 and girls = 407) in four secondary schools (Chao_Anouvong, Phiavat, Saysetha, and Chansavang) of Vientiane, Lao PDR. Data on study subject's demographic characteristics, dietary behavior, food insecurity, and Mini Dietary Assessment (MDA) index were collected. A "Self-Administered Food Security Survey Module for Children Aged 12 Years and Older" developed by the United States Department of Agriculture (USDA) was used for the food insecurity assessment. Results: As a result, 72.7% of the subjects were in a state of food insecurity, and food security was associated with higher socioeconomic status (higher life satisfaction, higher parent's education attainment, higher item ownership, fewer number of siblings, and having more lunches at the school restaurant than at home). Compared to the food insecurity group, the frequency of breakfast, self-rated diet, and the total score of MDA index were higher in the food security group. On the other hand, multiple logistic regression analysis showed that 'food security' was also associated with a higher consumption of processed beverages (OR 1.544; 95% CI 1.078-2.213; p = 0.018). Conclusion: Improving the quality of the diet is essential for adolescents in both the food insecurity and food security groups in Lao PDR. Therefore, it is necessary to provide well organized nutrition education and establish adequate nutrition policy for adolescents in Lao PDR.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth (OAuth를 이용한 로그아웃 문제로 인한 취약점 방지 기법에 대한 연구)

  • Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2017
  • Many web services which use OAuth Protocol offer users to log in using their personal profile information given by resource servers. This method reduces the inconvenience of the users to register for new membership. However, at the time a user finishes using OAuth client web service, even if he logs out of the client web service, the resource server remained in the login state may cause the problem of leaking personal information. In this paper, we propose a solution to mitigate the threat by providing an additional security behavior check: when a user requests to log out of the Web Client service, he or she can make decision whether or not to log out of the resource server via confirmation notification regarding the state of the resource server. By utilizing the proposed method, users who log in through the OAuth Protocol in the public PC environment like department stores, libraries, printing companies, etc. can prevent the leakage of personal information issues that may arise from forgetting to check the other OAuth related services. To verify our study, we implement a Client Web Service that uses OAuth 2.0 protocol and integrate it with our security behavior check. The result shows that with this additional function, users will have a better security when dealing with resource authorization in OAuth 2.0 implementation.

The Relationship between Financial Mydata Service Characteristics and Intention to Use: The Moderating Effects of Innovativeness and Technology Security (금융 마이데이터 서비스 특성과 수용의도의 관계: 개인혁신성과 기술적 보안성의 조절효과)

  • Changyong Sohn;Hyunsun Park;Sanghyun Kim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.133-157
    • /
    • 2022
  • As data becomes a new core resource with high attention, MyData service is spreading to various fields such as finance, medical care, and the public sector. However, research on the behavior of MyData service users is insufficient. Therefore, this study aims to empirically examine the effect of MyData service traits on value perception and acceptable behavior particularly in the financial sector where MyData service is most active. To this end, this study proposed a research model based on the literature. 295 survey responses were collected from individuals and analyzed using AMOS 26.0 for hypothesis testing. As a result of the analysis, it was found that self-information control, financial convenience, and personalized service had a significant effect on perceived value, and that perceived value had a significant effect on the intention to accept MyData service. Furthermore, this study examined the role of personal innovation and technological security in the relationship between variables by suggesting them as moderators. Results show that individual innovation was found to strengthen the relationship between two variables(self-information control and personalized service) and perceived value. Also, technological security was shown to strengthen the relationship between perceived value and intention to accept financial MyData services. The findings are expected to provide useful information to understand the factors affecting the acceptance of financial MyData service users and to understand the importance of individual innovation levels and technological security.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.