• Title/Summary/Keyword: Security Threats Factors

Search Result 109, Processing Time 0.021 seconds

A Study on Job Analysis and Physical Fitness of Special Security Guard in Nuclear Power Plant (원자력발전소 특수경비원의 직무분석과 체력에 관한 연구)

  • Jeong, Howon;Kim, Sora;Chae, Hyeonsoo
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.83-105
    • /
    • 2018
  • Special security guards play the role to safely operate and manage nuclear power plants from unintended internal and external threats. Physical fitness management of special security guards is one of the most important factors for improving and maintaining the level of physical protection. Thus, the purpose of this study is to analyze the physical fitness factor and physical fitness level required for mission accomplishment through job analysis of special security guards. The special security guards of Nuclear Power Plant in Korea were performing 7 jobs, 26 duties, 159 tasks. In order to accomplish theses tasks, the following physical fitness were required: muscle strength and muscle endurance of the hand, upper limb, lower limb and core, quickness, agility and Cardio function. The duties that require a lot of physical fitness were in the order of conducting arrest and self-defense, conducting unarmed defensive tactics, demonstrating proficiency with semiautomatic rifle, using protective equipment, performing emergency plan and defensive strategy, etc. The results of this study are expected to provide basic data necessary for establishing guidelines for fitness qualification and training of special security guards in the future and contribute to enhancement of physical protection of nuclear power plants.

A Road To Retain Cybersecurity Professionals: An Examination of Career Decisions Among Cybersecurity Scholars (사이버 정보보호 인력의 양성과 유지를 위한 방향: 정보보호 전공자들의 직업 선택 의도에 관한 연구)

  • Chai, Sang-Mi;Kim, Min-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.295-316
    • /
    • 2012
  • In the recent field, cybersecuriyt has become one of the critical areas in the information technology field, and demands for cyberseucirty professionals have been increasing tremendously. However, there is In the recent past, cybersecurity has become one of the critical areas in the Information Technology (IT) field, and demands for cybersecurity professionals have been increasing tremendously. However, there is a shortfall in the qualified cybersecurity workforce which is a factor that contributes to the vulnerability of society to various cyber threats. Our study articulates a model to explain career selection behavior in the cybersecurity field. The study explored factors that affect scholars' behavioral intention to pursue a cybersecurity career. Positive outcome expectations from a cybersecurity career as well as high self-efficacy about skills and knowledge about cybersecurity have a strong impact on the scholars' cybersecurity career decisions. Further, perceived usefulness of the cybersecurity curriculum has a positive effect on the scholars' career decisions. The results of this research have implications for retaining a qualified workforce in the computer and information security fields.

A Study on the Effects of IS Organization Justice and Positive Psychological Capital on Mitigation of Role Stress (정보보안 조직 공정성과 긍정심리자본이 업무 스트레스 완화에 미치는 영향 연구)

  • Hwang, Inho;Lee, Yunsock
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.575-590
    • /
    • 2022
  • Recently, organizations are increasing their investment to protect information resources from information security(IS) threats through the adoption of IS policies and technologies. However, IS incidents occur in a variety of ways, such as intrusions from outside the organization and exposure to the inside. Our study presented the negative effects of IS role stress on organizational insiders and suggested factors from the organizational and individual perspectives for mitigating IS role stress. We conducted a survey on employees of companies that introduced and applied IS policies to their work and tested the hypothesis using 329 samples. As a result, IS organization justice reduced IS role stress and strengthened IS positive psychological capital, thereby affecting the IS compliance intention of employees. Also, IS positive psychological capital moderated the relationship between IS stress and IS compliance intention. This study contributes to the achievement of internal IS goals by suggesting the conditions that affect the IS compliance behavior of employees in terms of the organizational environment and individual characteristics

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF

The Propagation Dynamics of Multiple Internet Worms (복수 인터넷 웜의 확산 방식 연구)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2858-2864
    • /
    • 2015
  • Internet worms have been the major Internet threats may disclose important information and can bring about faults of computer systems, which spread with the fastest speed among malicious codes. Simultaneously spreading multiple worms and its variants are revealing the limitation of conventional responses based on single worms. In order to defend them effectively, it is necessary to study how multiple worms propagate and what factors affect worm spreading. In this paper, we improve the existed single worm spreading models and try to describe the correct spreads of multiple worms. Thus we analyze the spreading effects of multiple worms and its variants by various experiments.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Enablers and Inhibitors of Generative AI Usage Intentions in Work Environments (업무 환경에서 생성형 AI 사용 의도에 영향을 미치는 촉진 요인과 저해 요인 분석)

  • Park, JunSung;Park, Heejun
    • Journal of Korean Society for Quality Management
    • /
    • v.52 no.3
    • /
    • pp.509-527
    • /
    • 2024
  • Purpose: This study aims to investigate the factors influencing the adoption of Generative AI in the workplace, focusing on both enablers and inhibitors. By employing the dual factor theory, this research examines how knowledge support, customization, entertainment, perceived risk, realistic threat, and identity threat impact the intention to adopt Generative AI technologies such as ChatGPT. Methods: Data were collected from 192 participants via MTurk, all of whom had experience using Generative AI. The survey was conducted in June 2024, and the data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM) to ensure the validity and reliability of the measurement model. Attention-check questions were used to ensure data quality, and participants provided demographic information at the end of the survey. Results: : The findings reveal that knowledge support and entertainment significantly enhance the intention to adopt Generative AI, whereas realistic threat poses a substantial barrier. Customization, perceived risk, and identity threat did not significantly affect adoption intentions. Conclusion: This study contributes to the literature by addressing the gap in understanding the adoption mechanisms of Generative AI in professional settings. It highlights the importance of promoting AI's knowledge support and entertainment capabilities while addressing employees' concerns about job security. Organizations should emphasize these benefits and proactively mitigate perceived threats to foster a positive reception of Generative AI technologies. The findings offer practical implications for enhancing user acceptance and provide a foundation for future research in this area.

The Impact of Information Security(IS) Organizational Justice on Employee IS Value Congruence and IS Voice Behavior: Exploring the Role of Susceptibility to Interpersonal Influence (조직의 정보보안 공정성이 개인의 정보보안 관련 가치 일치 및 제언 행동에 미치는 영향: 대인 간 영향 민감성의 적용)

  • Hwang, Inho
    • The Journal of Information Systems
    • /
    • v.32 no.4
    • /
    • pp.1-28
    • /
    • 2023
  • Purpose Recently, organizations have been allocating significant financial resources toward the implementation of new technologies and stringent information security (IS) policies in order to enhance IS. However, the potential for IS threats from internal sources within organizations remains high. This study proposes a mechanism whereby the organization's IS environment (organizational justice) enhances employees' perception of IS value congruence and encourages their voice behavior. Furthermore, this study validates that an individual's susceptibility to interpersonal influence can reinforce the relationship between the aforementioned factors and voice behavior. Design/methodology/approach We utilized AMOS 22.0 and Process 3.1 to validate the research model and hypotheses. The data was gathered from 435 employees employed in South Korean firms that implemented IS policies in their work. Structural equation modeling was employed to examine the relationship between organizational justice, value congruence, and voice behavior, and the interaction effect was confirmed by incorporating model 1 of Process 3.1 for the hypothesis pertaining to susceptibility to interpersonal influence. Findings The findings of this study indicate that organizational justice has a positive impact on voice behavior, which is further enhanced by value congruence. Furthermore, the influence of organizational justice and value congruence on voice behavior is moderated by susceptibility to information influence, while susceptibility to normative influence only moderates the effect of organizational justice. These results provide valuable insights for organizations in developing customized information systems strategies that effectively promote employees' voice behaviors.

China's Military Rise and Regional Maritime Security - Its Neighbors' Strategic Calculations and Various Contingencies - (중국의 군사적 부상과 역내 해양안보 - 주변국의 전략적 대비 및 유사를 중심으로 -)

  • Kim, Taeho
    • Strategy21
    • /
    • s.33
    • /
    • pp.113-147
    • /
    • 2014
  • While China's military rise is an issue of growing importance to regional security, it is worthwhile to note that it is not China's military modernization per se, but its capacity to project and sustain power along and beyond its borders--in particular, the possibility to resolve forcefully its outstanding maritime disputes and various contingencies. This essay argues that China's "anti-access capability"--a U.S.-coined term originally developed for a Taiwan contingency--is equally applicable to other major regional cases such as the Spratly disputes and a North Korean contingency. Furthermore, notwithstanding China's continuos efforts to develop and deploy various types and classes of weapons/platforms, it is the Russian systems and technologies that are most capable and thus likely assigned to the highest mission-critical areas. In assessing China's current and likely future military capability as well as their implications for the region, it is necessary to take note of the following: • There exists asymmetry of military capability between China and its weaker neighbors. While the PLAN is weak in several important aspects, for instance, many of its neighbors' navies are weaker still. • Some have argued that China's foreign policy behavior apparently became more "assertive" in 2009-2013, but it is wiser to keep in mind that China has almost always been assertive and aggressive when it comes to what China defines as "sovereignty and territorial issues" as well as its newest "core interests." • On the South China Sea disputes it is the function of U.S. presence in the theater--in the form of overseas bases and the freedom of navigation--and the PLA's own limitations to project and sustain power for an extended period of time that have largely prevented armed. • While Taiwan remains the idee fixe of China's diplomacy and military, it is and will be a tough nut to crack. China's recent creeping attempts for economic integration with Taiwan should be seen in this context. • China and Japan, the two regional heavyweights and traditional rivals, will likely have a bilateral relationship that is replete with difficulties and tension. China's unilateral announcement of its ADIZ in November 2013 as well as the occasional yet persistent disputes with Japan over the Senkaku/Diaoyudao/Diaoyutai islands are only the latest manifestation of this deeper and difficult relationship. • For Korean security it is imperative to take into account the geostrategic and historical factors. On top of the existing military threats from North Korea, the ROK should be able to employ a) hedging strategy, b) "limited defense sufficiency" strategy, and c) rock-solid relations with the United States.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.