• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.027 seconds

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

Structural Relationships among Health Concern, Health Practice and Health Status of the Disabled (장애인의 건강관심도, 건강실천행위 그리고 건강수준간의 구조분석)

  • Chun, Byung-Yeol;Kam, Sin;Yeh, Min-Hae;Kang, Yun-Sik;Kim, Keon-Yeop;Son, Jae-Hee;Lee, Young-Suk;Park, Ki-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.32 no.3
    • /
    • pp.276-288
    • /
    • 1999
  • Objectives: This study was performed to determine the relationships among health concern, health practice and health status of the disabled. Methods: A self-administered questionnaire survey was carried out for 1,662 disabled persons in Taegu city from April to July, 1997. Results: Health concern had a significant and positive relationship with health practice(p<0.05) and health practice also had a significant and positive relationship with self-rated health status(p<0.05) in men and women. To determine the structural model of the Health concern, health practice, health status and sociodemographic variables, the covariance structural analysis was used. In men, age, economic status, medical security type, educational level and type of disability had significant direct effects on Health concern(T>2.0). Educational level and type of disability had significant direct effects on health practice(T>2.0). And Economic status, medical security type and job status had significant direct effects on health status(T>2.0). In women, economic status and educational level had significant direct effects on Health concern(T>2.0). However there was no variable which had a significant direct effect on health practice. Job status had a significant direct effect or health status(T>2.0). In men and women, health practice was significantly increased with increasing health concern and the more health practice, the higher health status(T>2.0). Conclusions: It is recommended that the institutional approach which improve the economic status of the disabled with understanding their behavior and attitude should be established to increase health status, in addition, the health policy for encouraging the disabled, such as health education, consulting and health promotion program, should be done.

  • PDF

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Customer Information Management of Online Fashion Companies: From CRM Perspectives (CRM 관점에서 본 온라인 의류업체의 고개정보관리)

  • Chung Ihn-Hee;Kim Soon-Chul;Hwang In-Do;Jung Ji-Wook;Choo Ho-Jung
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.2 s.101
    • /
    • pp.83-100
    • /
    • 2006
  • As online fashion businesses achieve rapid growth in the last few years, they gather various kinds of customer information through customer registration procedures and expect to utilize this information for CRM programs. The purpose of this study were to understand the current practices of customer information management of online fashion companies and to discuss how to improve it for the benefit of both customers and fashion businesses. This study included three steps of empirical data collection process: First, online fashion companies were visited and content analyzed at three time periods-2002, 2003, and 2004. Second, a questionnaire was developed and surveyed with 488 customers. And third, interviews with two groups were conducted, one with customers who experienced customer registration with online fashion companies and the other with experts of web developing. Through customer registration procedures, personal and contact information such as name, citizen registration number(social security number), home address, home telephone number, and cellular phone number were most frequently required. Customers were asked to provide more specific information regarding their privacy, online behavior, and taste recently. The variety of information category in 2004 observation was larger than 2002, but the amount of required information from each company got smaller. Customers tended to provide some false infor- mation, and the most frequently cited reason for that was 'too much hassle' and 'no practical benefit from information provision'. Customers were concerned with the exposure of personal information such as citizen registration number. The ideal number of pieces of information required was identified as 3 to 5 including name, phone number, and address. The paper was concluded with the discussion of customer information management from CRM perspective, CRM program, information analysis methods, and security.

The Analysis about Factors That Influence the Motive of Partner Homicide (배우자살인의 동기에 영향을 미치는 요인분석)

  • Shin, Shik;Gong, Jung-Sick
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.201-224
    • /
    • 2006
  • This study explained about the different motive of partner homicide and this homicide's elements which are feature of human sociology, home environment, school life and partner's trouble causes. After analyzed these element which affect to the motive of partner homicide, we couldn't find statistical differences of partner homicide motive by sex, having a job. However, there are small gap in an age group. Almost the homicide by expressive motive was a primary factor in the whole mass but, in the age of 40's, 11.1% is by the homicide of instrumental motive in the partner homicide. We need some more detail analysis and the partner murderer who growed up in very poor home circumstances commit Homicide by 100% expressive motive. This result suggested that murderer who was in the inferior home environment can do murder more easier than normal because of their emotional reason which are urgent, impulsive and contingent. On the other hand, their school life behavior during a growth process was useless for explain the motive of partner homicide. On one side, we could confirm that partner's trouble cause is a very useful element for explain the partner homicide, that is, if the if the level of conflict with partner's were high, the murder by expressive motive will grow up. But we must see the fact that the partner homicide's rate is 13.3% by instrumental motive in the low trouble causes very carefully for understand the partner homicide.

  • PDF

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF

The Relationship between Organizational Culture, Job Characteristics and Job Continuance among Police Officers (경찰공무원의 조직문화와 직무특성 및 직무지속의지의 관계)

  • Kim, Chan sun;Park, Young Man
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.63-72
    • /
    • 2014
  • The purpose of this study is to investigate the relationship between organizational culture, job characteristics and job continuance will among police officers. This study targets the police officers dispatched in the Seoul metropolitan area in 2012, and it uses judgment sampling method to analyze 187 samples. This study conducted the statistical analysis, including frequency analysis, factor analysis, reliability analysis and multiple regression analysis, by using SPSS WIN 18.0. The result is as follows. First, the organizational culture among police officers has effects on job characteristics. That is, the feedback increases as the organizational culture becomes more mutual development- or agreement-oriented, or as it becomes more hierarchical; on the other hand, the job importance increases as more hierarchical and rational a culture becomes. Also, self-determination increases as an organization becomes more mutual development- or agreement-oriented. Second, the organizational culture among police officers has effects on the job continuance will. That is, the expected satisfaction increases but intentional insincerity decreases as the organizational culture becomes more mutual development- or agreement-oriented. Also, risk-perceiving behavior increases as an organizational culture becomes more hierarchical. Third, police officers' job characteristics have effects on the job continuance will. That is, the feedback and job importance increases the expected satisfaction while reducing functional diversity. The feedback also reduces the contraction factor. The job importance increases intentional insincerity while reducing functional diversity. The functional diversity not only increase alternative expectation but also increases risk-perceiving factors.

IPTV and User Scenario-Based Interface in Home Network Service (홈 네트워크 환경에서 사용자 중심 시나리오를 활용한 IPTV 인터페이스 분석)

  • Lee, Jee-Hee;Kim, So-Hyun;Kim, Hyun-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.92-100
    • /
    • 2010
  • Due to the development of digital appliance, role of TV causes both-way by introducing IPTV, and SNS service causes big change of watching environment and residence environment. There are good conditions on the role of integrated control because it is arranged in the living room which secures movement most effectively and because family members can easily use, and the degree of use is high. Therefore, we infer user's needs by analyzing user scenario and current role of TV in home network environment. Primarily, we collect surveys of development scenario and technology which companies suggest TV applied by home network service, and secondly, we comparatively study scenario which the companies mentioned above suggest through observing user scenario, and study the role of IPTV in the future through actual scenario-based experiment by ethnography. After analyzing user scenario through case study and experiment, there are integrated device studies mainly in company study because it can be made up inside home, security and entertainment. On the other hand, there are patterns of user behavior by scenario experiment mainly in auto-tainment, security, and it showed that it is insufficient for interaction between TV and home media peripheral. Through this paper, we analyze context of home user, and based on this, we could suggest effective use of service development. Also after analyzing user form, we could know it also should be considered of ratio between activity inside home and activity outside home.

Use Strategies of CPTED for the Safety of University Campus (대학 캠퍼스의 안전을 위한 CPTED 운용전략)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.340-347
    • /
    • 2010
  • Though there are many crimes on and out university campus in Korea, no one knows anything about the size or the types of campus crime. But, there are many theft crimes and sex assault in the library and one-room village near the university campus. This study suggested the establish ways and means needed to improve the campus security system, with the focus on the CPTED(Crime Prevention Through Environmental Design). Various types of crime prevention methods are being considered instead of conventional crime suppression measures. Among them, CPTED is drawing global attention. Crime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts. A truly safe campus can be achieved only through the cooperation of all students, faculty, staff and visitors. The cooperation and involvement of the entire campus community in campus crime prevention is absolutely necessary. University should adopt a series of policies and procedures designed to ensure that every possible precaution is taken to protect persons and property on campus.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF