• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.029 seconds

A Study on the Effects of Service Quality in Machine Security Systems on Customer Satisfaction (기계경비시스템의 서비스품질이 고객만족에 미치는 영향에 관한 연구)

  • Huh, Koung-Mi;Hong, Tae-Kyung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.361-381
    • /
    • 2008
  • Quality rating of machine security systems is difficult because both tangible and intangible services are included. However, still, the research template applied the SERVQUAL model with the intention of confirming machine security systems' service quality formation and experimentally inspecting the relationship between service quality and customer satisfaction. Therefore, the following highlights the experimental research outcomes and their implications for small-scale businesses utilizing machine security systems in the Daegu region. First, after observing whether the determining factors constitute service quality, four components were found to have significant influence on customer satisfaction. Additionally, in observing any differences in their influences, the following in order were observed as having influence on customer satisfaction: empathy, assurance reliability, responsiveness, and tangibility. Moreover, though companies‘ newest facilities and equipment are important, it can be concluded that a company employees’ prudent consideration, individual interest, reliability, and assurance for the customer carry greater importance. Secondly, though we intended to survey machine security systems by employing the SERVQUAL model, determinant factor analysis results found applying SERVQUAL model in its original state a challenge. According to results from determinant factor analysis, the basis for forming service quality is determined by assurance reliability, empathy, tangibility, and responsiveness. Furthermore, in future research, while more accurately distinguishing between assurance and reliability, a more appropriate model must also be considered for modification in domestic machine security system industry‘s service quality evaluation.

  • PDF

Manufacture and Performance Evaluation of Insulating Transformer for surge protection under Electric Railway Environments (전기철도환경하에서의 서지방호용 절연변압기 제작 및 성능평가)

  • Lee, K.W.;Kim, M.Y.;Ohn, J.G.;Park, D.W.;Park, K.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10a
    • /
    • pp.176-177
    • /
    • 2006
  • The main aim of the paper is the study of the surge voltages in electric railway signal security system. Hence these studies will provide means of introducing a suitable protective device insulating transformer. This influences the surge voltage interrupting capacity using surge arresters and bypass capacitors. This circuit can be used for investigating surge phenomenon in electric railway signal security system. In this paper a insulating transformer has been introduced for the reduction of surge voltages in the above circuit model and performance evaluation.

  • PDF

An assurance level and product type based evaluation effort model for CC evaluation (CC기반에서 보증수준 및 제품유형별 평가업무량 모델)

  • Choi, Seung;Choi, Sang-Soo;Lee, Gang-Soo;Ahn, Sung-Soo;Park, Soon-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1811-1814
    • /
    • 2003
  • CC는 정보보호시스템의 국제표준이며 CC평가 및 인증체계에서는 평가기관을 운영하며 평가기관에서는 적정한 평가비 산정을 위한 근거가 필요하다. 본 연구에서는 CC기준과 기존의 PP 및 ST만을 바탕으로 하여 제품유형별 및 보증수준별 평가업무량의 상대적 배수를 평가실무자들의 경험, 보안기능의 사용율 개념, 기능점수방법 등을 이용하여 산정하였다. 본 결과는 CC평가환경에서 정보보호제품의 평가비 및 기간의 산정을 위한 기본자료로 활용될 수 있다.

  • PDF

Sentiment Analysis From Images - Comparative Study of SAI-G and SAI-C Models' Performances Using AutoML Vision Service from Google Cloud and Clarifai Platform

  • Marcu, Daniela;Danubianu, Mirela
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.179-184
    • /
    • 2021
  • In our study we performed a sentiments analysis from the images. For this purpose, we used 153 images that contain: people, animals, buildings, landscapes, cakes and objects that we divided into two categories: images that suggesting a positive or a negative emotion. In order to classify the images using the two categories, we created two models. The SAI-G model was created with Google's AutoML Vision service. The SAI-C model was created on the Clarifai platform. The data were labeled in a preprocessing stage, and for the SAI-C model we created the concepts POSITIVE (POZITIV) AND NEGATIVE (NEGATIV). In order to evaluate the performances of the two models, we used a series of evaluation metrics such as: Precision, Recall, ROC (Receiver Operating Characteristic) curve, Precision-Recall curve, Confusion Matrix, Accuracy Score and Average precision. Precision and Recall for the SAI-G model is 0.875, at a confidence threshold of 0.5, while for the SAI-C model we obtained much lower scores, respectively Precision = 0.727 and Recall = 0.571 for the same confidence threshold. The results indicate a lower classification performance of the SAI-C model compared to the SAI-G model. The exception is the value of Precision for the POSITIVE concept, which is 1,000.

The Analysis of Water Supply Capacity using Reliability Criteria - for the Nakdong River Basin - (신뢰성 기준을 적용한 용수공급능력의 해석 - 낙동강유역을 중심으로 -)

  • 차상화;지홍기;이순탁
    • Journal of Environmental Science International
    • /
    • v.11 no.12
    • /
    • pp.1227-1233
    • /
    • 2002
  • In general, the evaluation of water supply capacity is important factor to establish various establishment of water resource supply plan include water resource security and determination of dam's mass. But former researchs about estimation of water supply capacity were lack in continunity of evaluation basis, and didn't excute analysis on reliability criteria also. In this study, Nakdong river was selected for study basin, and then water supply capacity was analyzed by HEC-5 model using identical reliability criteria.

Development of Unplugged Activity and its Evaluation of Usability for Information Security Education (정보보호 교육을 위한 언플러그드 활동의 개발 및 유용성 평가)

  • Jang, Yun-Jae;Kim, Dong-Hyung;Kim, Han-Sung;Lee, Won-Gyu;Kim, Hyeon-Cheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.55-67
    • /
    • 2011
  • Due to recent various online problems, the necessity of information security education has increased. The information security education was strengthened thanks to the informatics curriculum of middle school in 2007, but the educational fields lacked detailed educational materials that could be utilized. Thus to give appropriate information security education for elementary and middle school students, this research developed an unplugged activity for them. The activity was designed by applying Lickona's integrated ethical model and design patterns of unplugged activities, and developed through expert's review and pilot tests targeted to elementary school students. Developed activity was applied to 21 middle school students and the usability was evaluated. As results, first, the activity showed similar expectations from the previous activities. Second, persistence was also similar or higher compared to the previous activities, so the activity developed from this research secured the minimum usability. The unplugged activity developed from this research would give implications in producing various educational contents for information security education.

  • PDF

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

A Study on the Establishment of Evaluation Criterion for the Housing Information Related Internet Web Sites (주거 관련 정보 사이트의 평가기준 설정에 관한 연구)

  • Park, Hyun-Ok
    • Korean Journal of Human Ecology
    • /
    • v.10 no.1
    • /
    • pp.83-91
    • /
    • 2001
  • Currently, obtaining information about the housing studies through the internet web sites is one of the outstanding mediums. Those are of the housings, architecture, interior design, furniture products, hotels and its journals, etc., and out of all those informations are the highly expected value of use. But. it may causes the public users to experience a negative effect, because many of those informations provided on the internet web sites related to the housing studies/informations are not providing an equal quality of information. And measuring the quality is also not easy. This study focuses on the establishment of evaluation criterion for the housing information-related internet web sites. In such a vein, it proposes a clear model to evaluate the information qualities with the 43 questionnaires / examining items. To test the questionnaires/rating items, the analysis has been implemented which has shown the reciprocal effect between the 2 major factors. One major factor with 4 variables on the information searches are (1) the accuracy/reliability of contents and techniques, (2) the design of a picture and communication, (3) the readability and security, and (4) the security of private information, and the other factor with 3variables on the additional services are (1) the diversities of contents and ease of orderings, (2) the abilities of search and e-mail, and (3) the events and after services. This study/rating model will provide the users with a fundamental material in evaluating the quality of housing information on the internet web sites.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.