• Title/Summary/Keyword: Threat Factors

Search Result 351, Processing Time 0.021 seconds

A Study on the Analysis of Internal and External Factors of Software Threat Elements (소프트웨어 위협 요소의 내부적·외부적 요인 분석에 관한 연구)

  • Lee Eun Ser
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.278-283
    • /
    • 2024
  • When implementing software, there can be side effects that pose a threat to human life. Therefore, it is necessary to measure the impact of software on safety and create alternatives to mitigate and prevent threats. To conduct a software safety assessment to measure the impact of threat factors, the following components are necessary. This paper aims to classify the threat factors of software into internal and external factors and quantitatively demonstrate the impact of these threat factors.

A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference (퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구)

  • Lee, Kwang-ho;Kim, Jong-Hwa;Kim, Jee-won;Yun, Seok Jun;Kim, Wanju;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.19-24
    • /
    • 2018
  • In this study, for evaluating the cyber threat, we presented a quantitative assessment measures of the threat-level with multiple factors. The model presented in the study is a compound model with the 4 factors; the attack method, the actor, the strength according to the type of the threat, and the proximity to the target. And the threat-level can be quantitatively evaluated with the Fuzzy Inference. The model will take the information in natural language and present the threat-level with quantified data. Therefore an organization can accurately evaluate the cyber threat-level and take it into account for judging threat.

  • PDF

A Predictive Model of Fall Prevention Behaviors in Postmenopausal Women (폐경 후 여성의 낙상예방행위 예측모형)

  • Jang, Hyun-Jung;Ahn, Sukhee
    • Journal of Korean Academy of Nursing
    • /
    • v.44 no.5
    • /
    • pp.525-533
    • /
    • 2014
  • Purpose: This study was done to propose and test a predictive model that would explain and predict fall prevention behaviors in postmenopausal women. The health belief model was the theoretical basis to aid development of a nursing intervention fall prevention program. Methods: Data for 421 postmenopausal women were selected from an original data set using a survey design. The structural equation model was tested for 3 constructs: modifying factors, expectation factors, and threat factors. Expectation factors were measured as relative perceived benefit (perceived benefit minus perceived barrier), self-efficacy, and health motivation; threat factors, as perceived susceptibility (fear of falling) and perceived severity (avoiding activity for fear of falling); and modifying factors: level of education and knowledge about fall prevention. Data were analyzed using SPSS Windows and AMOS program. Results: Mean age was 55.7 years (range 45-64), and 19.7% had experienced a fall within the past year. Fall prevention behaviors were explained by expectation and threat factors indicating significant direct effects. Mediating effect of health beliefs was significant in the relationship between modifying factors and fall prevention behaviors. The proposed model explained 33% of the variance. Conclusion: Results indicate that fall prevention education should include knowledge, expectation, and threat factors based on health belief model.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

An Empirical Study on Factors that determine on Success Factors of Total Quality Management Implementation (지속적인 종합적 품질경영(TQM) 실행의 결정요인에 관한 연구)

  • 서창적;김재환
    • Journal of Korean Society for Quality Management
    • /
    • v.27 no.3
    • /
    • pp.1-16
    • /
    • 1999
  • According to the study of TQM implementations, the odds that an organization will successfully implement total quality management are two to one-against it. Based on the Brown's study, two thirds of all TQM implementations are dropped or fail altogether. However, organizations armed with knowledge of the factors that have the biggest impact on their success can take steps to influence or change those factors. In this paper, we studied on the degree of influence between those factors and successful start up and alignment factors. Based on extensive literature reviews those factors, threat, commitment, plan, progress and strategy are determined. Also we determine the successful start up and alignment factors. A framework of research including above factors is developed and tested statistically The Perceived data are collected from managers of quality departments of 141 Korean firms through survey. The results show that the rating of those factors which determine success of implementing TQM is progress, commitment, strategy and progress. But the factor of threat shows negative influence for the success of implementing TQM.

  • PDF

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

The Analysis of the security requirements for a circulation of the classified documents (비밀문서유통을 위한 보안 요구사항 분석)

  • Lee, Ji-Yeong;Park, Jin-Seop;Kang, Seong-Ki
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.361-390
    • /
    • 2003
  • In this paper, we analyze the security requirement for a circulation of the classified documents. During the whole document process phases, including phases of drafting, sending/receiving messages, document approval, storing and saving, reading, examining, out-sending and canceling a document, we catch hold of accompanied threat factors and export every threat factors of security. We also propose an appropriate and correspondent approach for security in a well-prepared way. Last, we present the security guidelines for security architecture of the classified documents circulation.

  • PDF

A Study on the Threat-Level Assessment Model Developmnet using Fuzzy Theory (퍼지이론 이용한 적 위협수준평가 모델개발 연구)

  • Jang, Dong-Hak;Hong, Yoon-Gee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3245-3250
    • /
    • 2011
  • This study introduces a threat level assessment model adapting Fuzzy theories in order to help make decisions for better covering quantitative factors and qualitative ones together. The threat is classified into three major categories - one resulting from navigational condition, another from target vessel specification and the other from external decision environment. The threat levels by each category are examined by a fuzzy inference, and its corresponding weights are assigned via fuzzy measures. Finally the high level threat measures become integrated via a Choquet Fuzzy Integral method into ultimate threat level indicators.

Priority Assessment of Cyber Threat Indicators (사이버 위협 지표 간 중요도 비교 분석 연구)

  • Lee, Ro-woon;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.951-958
    • /
    • 2021
  • With the growing cyber threat to information assets, it has become important to share threat information quickly. This paper examines the sharing of cyber threat information and presents a method to determine the importance of threat indicators in the information sharing market by calculating weights. The analysis was conducted using AHP techniques, with a pairwise comparison of the four factors(attacker & infected system indicators, role indicators, malicious file indicators, technique & spread indicators) and the details of each factor. Analysis shows that malicious file indicators are the most important among the higher evaluation factors and infected system IP, C&C and Smishing are the most important factors in comparison between detailed items. These findings could be used to measure the preference of consumers and the contribution of information provider for facilitating information sharing.