• Title/Summary/Keyword: Threat Decision

Search Result 132, Processing Time 0.023 seconds

Determinants of Satisfaction, Revisit Intention, and Recommendation Intention Using Decision Tree Analysis - Foreign Tourists Visiting Korea during the COVID-19 Pandemic - (의사결정나무분석을 활용한 방문 만족도, 재방문 의사, 타인 권유 의사 결정요인 분석 - 코로나19 상황에서의 한국 방문 외래관광객을 대상으로 -)

  • Won-Sik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.129-136
    • /
    • 2023
  • The study aims to examine the determinants that affect satisfaction, revisit intention, and recommendation intention with foreign tourists who visited Korea despite the threat of COVID-19. This study employs the survey data collected by the Korea Tourism Organization from 8,135 foreign tourists who visited Korea in 2020. As the survey data contains a mixture of continuous and categorical variables, decision tree analysis can ensure analytical validity for the research. According to the analytical results, the determinants affecting satisfaction are the purpose of the visit and acceptance of self-quarantine during their stay. The factors influencing revisit intention are the purpose of the visit, frequency of the visit, and acceptance of self-quarantine during their stay. The determinants affecting recommendation intention are the purpose of the visit, length of stay, and gender. Based on the results of this analysis, this study not only explains the relationship between these determinants and tourism satisfaction, revisit intention, and recommendation intention, but also suggests implications for revitalizing tourism activities.

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

An Optimal Missile Allocation Problem for Maximizing Kill Probability (격추확률 최대화를 위한 미사일 최적배치 문제)

  • Jung, Chi-Young;Lee, Jae-Yeong;Lee, Sang-Heon
    • Korean Management Science Review
    • /
    • v.27 no.1
    • /
    • pp.75-90
    • /
    • 2010
  • In this paper, we proposed new solution procedure of the air defense missile allocation problem. In order to find the optimal location of missile, we formulated a simple mathematical model maximizing the kill probability of enemy air threat including aircraft and missile. To find the Kill probability, we developed a new procedure using actual experimental data in the mathematical model. Actual experimental data mean real characteristic factor, which was acquired when the missile had been developed through missile fire experiment. The result of this study can offer practical solution for missile allocation and the methodology in this study can be used to the decision making for the optimal military facility allocation.

Determination of the Shortest Transportation Path in Wartime (전시 최단수송경로 선정)

  • Yun Jong-Ok;Ha Seok-Tae
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.2
    • /
    • pp.72-89
    • /
    • 1991
  • In transportation network problems, it is often desirable to select multiple number of the shortect paths. On problems of finding these paths, algorithms have been developed to choose single shortest path, k-shortest paths and k-shortest paths via p-specified nodes in a network. These problems consider the time as the main factor. In wartime, we must consider availability as well as time to determine the shortest transportation path, since we must take into account enemy's threat. Therefore, this paper addresses the problem of finding the shortest transportation path considering both time and availability. To accomplish the objective of this study, values of k-shortest paths are computed using the algorithm for finding the k-shortest paths. Then availabilties of those paths are computed through simulation considering factors such as rates of suffering attack, damage and repair rates of the paths. An optimal path is selected using any one of the four decision rules that combine the value and availability of a path.

  • PDF

Optimal Operation Algorithm for Wind Farms Based on Nonlinear Interior Point Method (비선형내점법 기반의 풍력발전단지 최적운용 알고리즘)

  • Lee, Seung-Min;Song, Hwa-Chang;Lee, Jang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.694-695
    • /
    • 2011
  • The recent concerns over the threat of global climate change and the requirements of national reduction of $CO_2$ emission have led to the diversification of energy resources and a large scale integration of renewable resources. In these circumstances, the policy decision currently made by the government sector includes several programs to promote the equipment of large scale generating assets to use wind energy. However, the power systems and wind farms need such innovative operation scheme schemes that maintain an adequate level of system security for continuing growth of renewable resources. This paper presents a method for determining optimal operating points for wind farms by making use of a nonlinear interior point method.

  • PDF

IP를 이용한 패트리어트 미사일 최적배치모형

  • Lee, Jae-Yeong;Jeong, Chi-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.38-50
    • /
    • 2005
  • The current Air defense missile, Nike, will be replaced by the Patriot missile in the near future. In this paper, we developed an optimal allocation model for the Patriot missile. In order to formulate the model, we applied a set covering and If model. This model considers not only weapon's characteristics and performances but also the threat of enemy aircrafts and SCUD missiles. When we apply this model, we can find the optimal location of Patriot batteries which maximizes the kill probability of enemy aircrafts and SCUD missiles attacking vital area of our forces. This model can directly be used to the decision making for the optimal military facility allocation.

  • PDF

Android App Reuse Analysis using the Sequential Hypothesis Testing

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.11-18
    • /
    • 2016
  • Due to open source policy, Android systems are exposed to a variety of security problems. In particular, app reuse attacks are detrimental threat to the Android system security. This is because attacker can create core malign components and quickly generate a bunch of malicious apps by reusing these components. Hence, it is very imperative to discern whether Android apps contain reused components. To meet this need, we propose an Android app reuse analysis technique based on the Sequential Hypothesis Testing. This technique quickly makes a decision with a few number of samples whether a set of Android apps is made through app reuse. We performed experimental study with 6 malicious app groups, 1 google and 1 third-party app group such that each group consists of 100 Android apps. Experimental results demonstrate that our proposed analysis technique efficiently judges Android app groups with reused components.

Information Pollution, a Mounting Threat: Internet a Major Causality

  • Pandita, Ramesh
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.4
    • /
    • pp.49-60
    • /
    • 2014
  • The present discourse lasts around, information pollution, causes and concerns of information pollution, internet as a major causality and how it affects the decision making ability of an individual. As, information producers in the process to not to lose the readership of their content, and to cater the information requirements of both the electronic and the print readers, reproduce almost the whole of the printed information in digital form as well. Abundant literature is also equally produced in electronic format only, thereon, sharing this information on hundreds of social networking sites, like, Facebook, Twitter, Blogs, Flicker, Digg, LinkedIn, etc. without attributions to original authors, have created almost a mess of this whole information produced and disseminated. Accordingly, the study discusses about the sources of information pollution, the aspects of unstructured information along with plagiarism. Towards the end of the paper stress has been laid on information literacy, as how it can prove handy in addressing the issue with some measures, which can help in regulating the behaviour of information producers.

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.