• 제목/요약/키워드: Security Behavior

검색결과 906건 처리시간 0.026초

클라우드 기반 공통협업플랫폼의 사용행동에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Affecting Use Behavior of Cloud-based Common Collaboration Platform)

  • 김산회;이홍재;한경석;권태현
    • 디지털콘텐츠학회 논문지
    • /
    • 제19권6호
    • /
    • pp.1151-1160
    • /
    • 2018
  • 본 연구는 클라우드 기반 공통협업플랫폼의 사용행동을 알아보고자 실증 분석하여 결과를 도출하였다. 클라우드 기반 플랫폼의 독립변수들로 유연성, 신뢰성, 범용성, 보안성, 상호작용을 선정하였으며, UTAUT이론을 활용하여 사용의도를 매개변수로 최종적으로 사용행동을 종속변수로 선정 하였다. 조절변수로는 회사유형을 활용하였다. 가설검증은 AMOS 23.0과 SPSS 23.0 통계 프로그램을 사용하였으며, 클라우드 기반 공통협업플랫폼을 사용하는 사용자들을 대상으로 설문지를 배포하여 총 180부를 분석에 사용하였다. 분석결과, 신뢰성, 보안성, 상호작용은 사용의도에 긍정적인 영향을 미치는 것으로 나타났으며, 유연성, 범용성은 사용의도에 긍정적인 영향을 미치지 못하는 것으로 나타났다. 최종적으로 사용의도는 사용행동에 긍정적인 영향을 미치는 것으로 검증이 되었다. 마지막으로 회사유형에 따른 조절효과가 있는 것으로 나타났다.

대학 태권도 선수의 사회성요인과 코치의 다차원적 리더십의 관계에 관한 연구 (A Study on the Relationship between University Taekwondo Player's Sociality Factors and Coaches' Multidimensional Leadership)

  • 김영인;김용수
    • 시큐리티연구
    • /
    • 제13호
    • /
    • pp.71-90
    • /
    • 2007
  • 이 연구의 목적은 사회적 행동이 개인차에 의해서 나타난다는 가정 하에 대학생의 사회성 요인과 다차원적 리더십 요인과의 관계규명을 통하여 사회성 요인이 선행변인임을 밝혀보고자 한다. 이러한 연구의 목적을 달성하기 위하여 연구대상은 2005년 현재 태권도 선수활동을 하고 있는 대학 태권도 선수를 모집단으로 선정하였으며, 조사대상에 대한 표집은 편의표본추출방법을 사용하여 228명의 자료를 최종적으로 활용하였다. 이와 같은 절차와 방법으로 다음과 같은 결론을 얻었다. 첫째, 사회성요인 중 책임감은 p<.001수준에서 훈련과 지시형, 긍정적 피드백형, 사회적 지지형, p<.01수준에서 권위적 행동형, p<.05수준에서 민주적 행동형에 유의한 영향을 미치는 것으로 나타났다. 둘째, 사회성요인 중 사교성은 p<.05수준에서 훈련과 지시형에 유의한 영향을 미치는 것으로 나타났다. 셋째, 사회성요인 중 계획성은 p<.001수준에서 사회적 지지형 p<.01수준에서 민주적 행동형, 권위적 행동형에 유의한 영향을 미치는 것으로 나타났다.

  • PDF

Human Gender and Motion Analysis with Ellipsoid and Logistic Regression Method

  • Ansari, Md Israfil;Shim, Jaechang
    • Journal of Multimedia Information System
    • /
    • 제3권2호
    • /
    • pp.9-12
    • /
    • 2016
  • This paper is concerned with the effective and efficient identification of the gender and motion of humans. Tracking this nonverbal behavior is useful for providing clues about the interaction of different types of people and their exact motion. This system can also be useful for security in different places or for monitoring patients in hospital and many more applications. Here we describe a novel method of determining identity using machine learning with Microsoft Kinect. This method minimizes the fitting or overlapping error between an ellipsoid based skeleton.

수치해석에 의한 노후저수지의 침투 및 동적거동 (Behavior of Seepage and Seismic for the Deterioration Reservoir Using Numerical Analysis)

  • 박성용;장석현;임현택;김정면;김용성
    • 한국농공학회논문집
    • /
    • 제58권3호
    • /
    • pp.81-90
    • /
    • 2016
  • It is significant to redevelop the deterioration reservoir through raising for countermeasure to climate change and Earthquake improvement of reservoir. This study aims to investigate the behavior of deterioration reservoir with poor-fabricated core subjected to raising water level and earthquake using numerical analysis. From the analysis results, water level raising and earthquakes induce crack and subsidences at the crown and the front side of deterioration reservoir. For the reinforcement of the deterioration reservoir is required appropriate measures method and raised method suitable, drainage and slope protection method judged to be necessary.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제18권2호
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

첨성대의 축조현황을 고려한 구조적 특성평가 (Structural Characteristics Evaluation Considering Construction Circumstances of Cheomseongdae)

  • 김호수;김정환
    • 한국공간구조학회논문집
    • /
    • 제15권3호
    • /
    • pp.69-76
    • /
    • 2015
  • Cheomseongdae is the masonry stone structure with the cultural and historical values. But, this structure has the various damages such as cracks, gaps, slope variations and ground subsidence. So, the interests for the safety security in the structural parts have been increased. Therefore, this study performs the structural modelling which considers the several damage cases, and then evaluates the structural behavior characteristics through the discrete element analysis. Especially, this study checks the swelling and displacement gap of the whole structure and the separation between the neighboring members.

여고생의 가치지향성과 금전사용양식이 금전관리행동에 미치는 영향 (The Effect of Value Orientations and the Money Spending Styles on Monet Management of High School Girls)

  • 양남희;홍은실
    • 한국가정과교육학회지
    • /
    • 제13권2호
    • /
    • pp.37-46
    • /
    • 2001
  • The purpose of this study was to examine the influences of 4-value orientations. the 5 money spending styles. and the background variables to the desired money management behavior of high school girls. The samples were selected from 498 high school girls. Cronbach'a and Multiple regression were used as statistical analysis. The results were summarized as follows : Resulting from multiple regression analysis, the desired money management behavior of high school girls had the positive linear relationships with the variables such as financial satisfaction. goal-oriented value. and 4 money spending styles - security. conspicuous. non-monetary. and unconcerned - in five money spending styles. The most influential variable was money spending styles.

  • PDF

여고생의 가치지향성과 금전사용양식이 금전관리행동에 미치는 영향 (The Effect of Value Orientations and the Money Spending Style on Money Management of High School Girls)

  • 양남희;홍은실
    • 한국가정과교육학회지
    • /
    • 제13권2호
    • /
    • pp.27-27
    • /
    • 2001
  • The purpose of this study was to examine the influences of 4-value orientations the 5 money spending styles. and the background variables to the desired money management behavior of high school girls The samples were selected from 498 high school girls. Cronbach'α and Multiple regression were used as statistical analysis.The results were summarized as follows : Resulting from multiple regression analysis, the desired money management behavior of high school girls had the positive linear relationships with the variables such as financial satisfaction. goal-oriented value, and 4 money spending styles - security, conspicuous, non-monetary, and unconcerned - in five money spending ,styles. The most influential variable was money spending styles.