• Title/Summary/Keyword: Social Threat

Search Result 246, Processing Time 0.025 seconds

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2 (경험 및 습관이 신규서비스의 정보보호 행동에 미치는 요인에 대한 연구 - 보호 동기이론과 UTAUT2을 중심으로)

  • Lee, Hong-Je;Kho, Hyeong-Seog;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.

The Crisis of Climate Change and the Direction of Christian Ecological Education (기후변화의 위기와 기독교 생태교육의 방향 모색)

  • Cho, Miyoung
    • Journal of Christian Education in Korea
    • /
    • v.67
    • /
    • pp.415-447
    • /
    • 2021
  • The purpose of this study is to explore the direction that Christian education should take as an ecological education in the crisis of climate change. What climate change shows is that it is impossible to survive even if the Earth's temperature rises by only 2-3 degrees. However, our current appearance is concerned about the crisis of climate change as long as we do not change our lives. First, the meaning of climate change and its causes were examined. The anthropocentric worldview, modern industrial, scientific and technological growth, and consumption-oriented social structure can be cited as the causes. An anthropocentric worldview justifies everything from the human point of view, and nature is the subject of human domination, but one regarded as a tool. In addition, as the scale of human economic activity increases, energy consumption increases, and the threat of ecosystem destruction increases with the increase in energy consumption. Individual affluence and increased consumption are exacerbating ecosystem tensions. In order to solve the problem of climate change, ecological education clues were found in the Bible. Through creation, the relationship between humans and nature was identified as coexistence and coexistence. Through the principle of sabbath, it is possible to bring about the restoration of humans and nature, and from the point of view of the incarnation, the world was understood as the 'body' of God. Based on these clues, the direction of Christian ecological education was explored by suggesting a transition to an ecological paradigm, restoration of creative spirituality, and cultivation of ecological imagination. In the crisis of climate change, it is hoped that the recovery of the earth will take place and that we will be able to stand again as a responsible being through the Christian ecological educational approach.

Relationship between stress and subjective oral dryness in the elderly in a rural region: a pilot study (농촌 노인의 스트레스와 주관적 구강건조감의 관련성: 예비조사)

  • Cho, Min-Jeong;Lee, Eun;Youm, Yoosik;Kim, Hyeon Chang;Jung, Eun-Kyung;Kim, Jin-Kyung;Song, Keun-Bae;Choi, Youn-Hee
    • Journal of Korean Academy of Oral Health
    • /
    • v.41 no.4
    • /
    • pp.243-249
    • /
    • 2017
  • Objectives: Stress is a psychological reaction to stimuli such as anxiety or threat felt by a person either physically or mentally when placed in a difficult situation. Although a relationship between stress and dry mouth has been reported, it remains understudied. The purpose of this study was to investigate the association between stress and subjective dry mouth among the elderly living in a rural region. Methods: A total of 214 people aged ${\geq}60years$ living in a rural area were recruited with an informed consent for a cross-sectional analysis. Information about stress and subjective dry mouth was obtained by an interview survey with a constructed questionnaire. Data on other potential confounding factors (including oral factors) such as socio-demographic data, health-related behaviors, the number of remaining teeth, and subjective chewing ability were also gathered at the same time. Logistic regression models were used to analyze the relationship of stress and dry mouth using SPSS. Results: The Crude odds ratio (OR) of stress awareness affecting subjective dry mouth was 2.59 (95% confidence interval: 1.43-4.68). After adjusting for sex, education, income, smoking, and alcohol intake, the adjusted OR was 2.52 (95% confidence interval: 1.30-4.87) which was statistically significant. Conclusions: Elderly people who were stressed had an approximately 2-fold increase in experiencing subjective dry mouth when compared to their stress-free counterparts.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

The Definition of Frail Elderly and the Frailty Screening Assessment Tool: A Systematic Review (허약노인의 정의 및 허약 선별 평가도구에 관한 체계적 고찰)

  • Lee, Gyeong A;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.3
    • /
    • pp.43-56
    • /
    • 2021
  • Objective : The objective of this study was to present the components of frailty by organizing the definitions of frail elderly and analyzing the tools used to screen them. Methods : This study searched for articles at involved frailty screening assessments in the elderly. Databases including CINAHL, Embase, Medline Complete, and PubMed were searched. The search terms were "assess" AND "frailty" AND "screening" AND ("frail elderly" OR "elderly"). Results : A total of 539 articles were identified by the search and 11 articles were selected. Frailty occurs due to the depressed function of multidimensional factors, and a frail elderly person is defined as one at high risk of health degeneration, functional impairment, and occurrence of disability, and having a high level of threat to life. Seven tools were selected from 11 articles. The most frequently used tool was the frailty phenotype, which was used in five articles (45.4%). The identified components of frailty were physical, activity participation, nutrition, psychological, social, overall health, and age. Conclusion : The results confirmed the definition and components of frailty. This study is expected to contribute to the future development of standardized evaluation tools for screening frail elderly individuals and intervention programs for the management of the frail elderly.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

Assessment of Stand-alone Utilization of Sentinel-1 SAR for High Resolution Soil Moisture Retrieval Using Machine Learning (기계학습 기반 고해상도 토양수분 복원을 위한 Sentinel-1 SAR의 자립형 활용성 평가)

  • Jeong, Jaehwan;Cho, Seongkeun;Jeon, Hyunho;Lee, Seulchan;Choi, Minha
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_1
    • /
    • pp.571-585
    • /
    • 2022
  • As the threat of natural disasters such as droughts, floods, forest fires, and landslides increases due to climate change, social demand for high-resolution soil moisture retrieval, such as Synthetic Aperture Radar (SAR), is also increasing. However, the domestic environment has a high proportion of mountainous topography, making it challenging to retrieve soil moisture from SAR data. This study evaluated the usability of Sentinel-1 SAR, which is applied with the Artificial Neural Network (ANN) technique, to retrieve soil moisture. It was confirmed that the backscattering coefficient obtained from Sentinel-1 significantly correlated with soil moisture behavior, and the possibility of stand-alone use to correct vegetation effects without using auxiliary data observed from other satellites or observatories. However, there was a large difference in the characteristics of each site and topographic group. In particular, when the model learned on the mountain and at flat land cross-applied, the soil moisture could not be properly simulated. In addition, when the number of learning points was increased to solve this problem, the soil moisture retrieval model was smoothed. As a result, the overall correlation coefficient of all sites improved, but errors at individual sites gradually increased. Therefore, systematic research must be conducted in order to widely apply high-resolution SAR soil moisture data. It is expected that it can be effectively used in various fields if the scope of learning sites and application targets are specifically limited.

The Impact of COVID-19 on the Labor Market in India: Focusing on the Expansion of the Labor Gap and Digitization (COVID-19가 인도 노동시장에 미친 영향: 노동격차 확대와 디지털화를 중심으로)

  • Kang, Sung Yong;Lee, Myung Moo;Kim, Yun Ho;Nam, Eun Young;Lee, Sang Keon
    • Journal of Appropriate Technology
    • /
    • v.7 no.1
    • /
    • pp.102-114
    • /
    • 2021
  • India has recently experienced an acute crisis confronting the COVID-19 pandemic as confirmed cases exceeded 11.73 million in March 2021, which was the second worst scale only after the United States. The strict lockdown measures as well as the pandemic itself posed a serious threat of survival, in particular, to immigrant workers engaged in informal sectors, which triggered their reverse immigration. In case the COVID-19 pandemic continues in 2021, it is estimated that in the sector of tourism and service alone, more than 20 million jobs will disappear. The damage on industry is already being realized with the significant decrease of workforce. It is important to note, however, that jobless growth and labor polarization were observed even before the outbreak of COVID-19, and that the pandemic only served as one of the trigger catalysts that made those submerged problems burst out. In this study, we examine the structural problems in industry and labor market in India and consider the social context and efficacy of the "Make in India" or "Atmanirbhar Bhrat" policy. The latter initiative was presented in the trenches of the pandemic in 2020. While considering the complexity of problems, we would like to pursue a future-oriented approach and propose a direction in restructuring the labor market, attempted at reversing the critical conditions following the fourth industrial revolution and digitization into the shortcut to labor market restructuring.

Political Participation of Conservative Protestant Churches and Democracy in Argentine (아르헨티나 보수 개신교의 정치 참여와 민주주의)

  • Kim, Hang-Seob
    • Iberoamérica
    • /
    • v.23 no.2
    • /
    • pp.55-91
    • /
    • 2021
  • This article dealing with the political participation of Argentine Conservative Protestants tried to examine the effect of such political participation on democratic values and order. To this end, it focused on the subject of religious equality and freedom, and issues of same-sex marriage and sex education. First, the demands of the Protestants, who insisted on the equal treatment of all religions by correcting the religious discrimination policies, a legacy of the colonial era and the military regime, are very natural and self-evident, when we presuppose the value of a democratic society based on political equality and human rights. It can be said that it has contributed to the democratization of society by aiming to solve the old problems of society. But when it comes to same-sex marriage and sex education, things are quite different. Without considering the social situations of the socially disadvantaged or minorities, or the legislative purpose of defending their rights, they insist on only their teachings of scriptures or ethics, even within Protestantism, there is a disagreement on interpretation. These theocratic views and exclusivist attitudes can seriously infringe on the human rights or freedoms of people of different religions, or different choices about marriage or sexuality, among other things. It can be a serious threat to democratic order and values.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.