• Title/Summary/Keyword: Threat Factors

Search Result 354, Processing Time 0.02 seconds

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory (언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로)

  • Lee, Seohyun;Lee, Saerom;Kwak, Dong-heon
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.45-64
    • /
    • 2022
  • With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

Railway World Market and Marketing Strategies (국내외 철도시장 현황 및 마케팅 전략기반 연구)

  • Lee, Soon-Cheul;Na, Hee-Seung
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.942-946
    • /
    • 2005
  • This study investigate both the structure and characteristics of world railway market and major railway manufacturers' major business fields and their strategies to go abroad. Based on this market analysis, we study the SWOP analysis by dividing the important factors that affect railway system into strength, weakness, opportunity, threat factors, and suggest marketing strategies for advancing railway system into foreign countries.

  • PDF

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW (스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인)

  • Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.

A Empirical Validation of Risk Analysis Model in Electronic Commerce (전자상거래환경에서 위험분석방법론의 타당성에 대한 연구)

  • 김종기;이동호;서창갑
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.61-74
    • /
    • 2004
  • Risk analysis model is systematic and structural process that considers internal security problems and threat factors of the information systems to find optimal level of security control. But, the risk analysis model is just only defined conceptually and there are not so many empirical studies. This research used structural equation modeling(SEM) research methodology with rigorously validated research instrument. Based on results of this study, risk analysis methodology was proved to be practically useful in e-commerce environment. Factors like threat and control were significantly related to risk. In conclusion, the results of this study can be applied to general situation or environment of information security for analyzing and managing the risk and providing new approach to comprehend concept of risk in e-commerce environment.

Utilizing the Health Belief Model to predicting female middle school students' behavioral intention of weight reduction by weight status

  • Park, Dong-Yean
    • Nutrition Research and Practice
    • /
    • v.5 no.4
    • /
    • pp.337-348
    • /
    • 2011
  • Weight reduction behavior is common among adolescent girls. The present study examined the status of weight reduction behavior and factors affecting the behavioral intention of weight reduction using the Health Belief Model (HBM) for female middle school students by weight category. Survey data was collected from three girl's middle schools in Gyeongju, Korea. A total of 299 female middle school students participated in this study. The questionnaire had questions about general characteristics, weight reduction behavior, and variables of HBM (perceived threat, perceived benefits, perceived barriers, cues to action, self-efficacy in dietary life and exercise, and behavioral intention of weight reduction). Descriptive statistics, Chi-square tests, ANOVA, and multiple regression analysis were applied to analyze the variables. A higher percentage of students in the overweight group attempted weight reduction than those in the underweight and the normal weight groups (P < 0.001). Among students who had attempted weight reduction, 73% tried diet therapy, while 78% tried exercise. Students in the normal and overweight groups showed significantly higher threat (P < 0.01) and cues to action (P < 0.001) than those in the underweight group. As for perceived benefits, barriers, and self-efficacy in dietary life and exercise, there were no significant differences among weight groups. Students in the overweight group showed the strongest intention of weight reduction and there were significant differences among the three weight groups (P < 0.001). Perceive threat (P < 0.01), cues to action (P < 0.001), and perceived self-efficacy (P < 0.01) were significantly associated to behavioral intention of weight reduction for all respondents. For the underweight group, perceived threat (P < 0.05) and perceived self-efficacy (P < 0.01) were the significant variables. For the overweight group, cue to action was the significant variable (P < 0.05).

A Study on the Formation and Development of Collective Security System and the Possibility of Security System Shift in East Asia (집단안보체제의 형성 및 발전요인과 동아시아 안보체제의 변화 가능성 연구)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 2023
  • For the last 70 years, the U.S.-led bilateral security system, or "Hub-and-Spokes" system, has been applied to Northeast Asia, and the system has been successfully settled in terms of stability and economic achievements of the region. Given the increasing complexity of the security environment of East Asia, it is plausible to consider the possibility of a security system shift from bilateral alliances to collective security. In order to analyze the driver of collective security system, this study developed three factors of formation and development of collective security system - main threat, intensity of the threat, and confidence among countries in the system - by reviewing international political theories related to security cooperation. Comparing the formation, development, and achievements of NATO and SEATO, the study figures out that the existence of the main threat, the high intensity of the threat, and the strong confidence among countries in the security system are the primary drivers for a successful collective security system. Based on the result, the study also analyzed the possibility of a security system shift in East Asia. Considering contemporary international conflicts such as U.S.-China strategic competition, Russia-Ukraine War, and growing threats posed by North Korean nuclear and missiles, the study anticipates that the necessity of a collective security system that will replace the current security system of the region would arise. Still, although some issues between countries should be overcome, the growing intensity of the threats will promote cooperation among countries by improving their confidence.

  • PDF

A study of the threats towards the flight crew (민간항공사의 운항승무원에 영향을 주는 위협관리에 관한 연구)

  • Choi, Jin-Kook;Kim, Chil-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.2
    • /
    • pp.54-59
    • /
    • 2010
  • The flight deck crew must manage complexity during daily flight operations. The Airline may obtain data regarding threats and errors through LOSA(Line Operations Safety Audits) on normal flights as predictive safety tool in Safety Management System of the Airline to actively improve the systems such as SOP(Standard Operation Procedure), training, evaluation and the TEM(Threat and Error Management) for the flight deck crew. The flight deck crew make errors when they fail managing threats. The crew mismanage around ten percent of threats and commit errors. The major mismanaged threats are aircraft malfunction, ATC(Air Traffic Communication), and wether threats. The effective countermeasures of TEM for manageing threats are leadership, workload management, monitor & cross check, Vigilance, communication environment and cooperation of the crew. It is important that organizations must monitor for the hazards of threats and improve system for the safer TEM environments.

A Study on Weight of the Factors for Improvement of Air Passenger Security Screening Performance and Service (승객보안업무 성과 개선과 서비스 수준 향상을 위한 업무 책임 주체에 관한 연구)

  • Shin, H.S.;Yoo, K.E.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.4
    • /
    • pp.29-42
    • /
    • 2005
  • The passenger security screening is a mandatory procedure for boarding the aircraft according to ICAO standard as well as national law of each country. The enhanced threat of terrorism have had the security procedure strengthened since 9/11 events. However the effectiveness of passenger screening is not satisfactory and the service level for passenger is getting worse because of tightened security measurements. This research studied the responsibility issue for the enhancement of the effectiveness and service quality in passenger security screening. The study concluded that a desirable responsibility assignment for passenger screening is to the airport authority at normal time and to the government authority at the time of high threat.

  • PDF

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF