• Title/Summary/Keyword: Threat Factors

Search Result 351, Processing Time 0.026 seconds

An Empirical Study on the Factors Influencing User Resistance to ERP : Focused on the Vietnam Users (ERP에 대한 사용자 저항의 영향 요인에 관한 실증적 연구 : 베트남 사용자를 중심으로)

  • Kim, Hongkeun;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.127-158
    • /
    • 2015
  • This study analyzes the factors affecting user resistance to ERP in Vietnam, including the factors related to the cultural values of the users, which is rarely dealt in the previous ERP research. A research model is developed based on Klaus and Blanton [2010] and Hofstede [2011], consisting of the independent variables ('cultural value', 'system', 'organization', and 'process' related variables), a dependent variable ('user resistance to ERP') and a moderating variable ('self efficacy'). Major results of study include (1) users with high degree of uncertainty avoidance and femininity regard ERP as potential threat to their job and are likely to resist to ERP; (2) By training the users with high level of femininity to enhance their self efficacy, the degree of resistance to ERP can be reduced; (3) For ERP to be utilized successfully, systems should be developed in such a way in which working with ERP is not regarded as complex and difficult; and (4) communication and training play an important role in reducing the resistance of users.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

A Validated Solution for the Threat of Ionosphere Spatial Anomalies to Ground Based Augmentation System Users

  • Pullen, Sam;Lee, Ji-Yun;Datta-Barua, Seebany;Park, Young-Shin;Zhang, Godwin;Enge, Per
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.9-14
    • /
    • 2006
  • This paper develops a complete methodology for the mitigation of ionosphere spatial anomalies by GBAS systems fielded in the Conterminous U.S. (CONUS). It defines an ionosphere anomaly threat model based on validated observations of unusual ionosphere events in CONUS impacting GBAS sites in the form of a linear ‘wave front’ of constant slope and velocity. It then develops a simulation-based methodology for selecting the worst-case ionosphere wave front impact impacting two satellites simultaneously for a given GBAS site and satellite geometry, taking into account the mitigating effects of code-carrier divergence monitoring within the GBAS ground station. The resulting maximum ionosphere error in vertical position (MIEV) is calculated and compared to a unique vertical alert limit, or $VAL_{H2,I}$, that applies to the special situation of worst-case ionosphere gradients. If MIEV exceeds $VAL_{H2,I}$ for one or more otherwise-usable subset geometries (i.e., geometries for which the 'normal' vertical protection level, or $VPL_{H0}$, is less than the 'normal' VAL), the broadcast ${\sigma}_{pr_{-}gnd}$ and/or ${\sigma}_{vig}$ must be increased such that all such potentially-threatening geometries have VPL$_{H0}$ > VAL and thus become unavailable. In addition to surveying all aspects of the methods used to generate the required ${\sigma}_{pr_{-}gnd}$ and ${\sigma}_{vig}$ inflation factors for CONUS GBAS sites, related methods for deriving similar results for GBAS sites outside CONUS are suggested.

  • PDF

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

Oil spill accident and prevention system of marine pollution (유류오염사고와 해양오염 방제시스템)

  • Gang, Yeong-Seung
    • Journal of the Korean Professional Engineers Association
    • /
    • v.41 no.2
    • /
    • pp.64-67
    • /
    • 2008
  • According to grow maritime activities in coastal zone, a threat increase to the marine environment from oil spill. The success or failure of initial effort depends on the adequacy of the plan and the ability of immediate execution. Successful response to oil spills requires critical information in real time topics, including spill data, environmental conditions, ecological factors. Diverse simulation provides tactical decision-makers with the information on the movement of pollutant.

  • PDF

A Study on Factors Affecting the Participation of Social Manufacturing Platforms (소셜매뉴팩처링플랫폼의 참여의도에 영향을 미치는 요인에 관한 연구)

  • Ghil, Ihun;Gim, Gwangyong
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.147-161
    • /
    • 2015
  • The rapid changes in consumption patterns and the manufacturing industry environment are both a threat and an opportunity for small and medium-sized enterprises in Korea because it lacks innovative capacity compared to large conglomerates. In this new manufacturing environment, social manufacturing is an innovative business model that can create new business opportunities for these companies. However, there are not that many proven models of platforms where products are created jointly with consumers. Some conceptual analysis of the success factors and operation strategy of co-creation platforms have started to be released but there are almost no empirical studies conducted on this matter today. In this study, the social manufacturing platform business concept and its components were studied; various factors that affect the willingness to participate in consumer-led co-creation platforms were considered; the factors were surveyed on potential consumers; a study was carried out to analyze the relationship of these factors; a model of these factors were set up and proven.

A Study on Relationships Between Information Systems Risk and Password Characteristics (정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구)

  • 오창규;김종기;심윤주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.62-74
    • /
    • 2003
  • Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).

  • PDF

Strategic Options for Internationalization in Korean Organizations

  • Yum, Ji-Hwan;Park, Byoung-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.323-335
    • /
    • 2005
  • Globalization of economy brings both opportunities and threats especially for companies in developing countries such as Korea. Globalization is an opportunity because it may expand the size of market for the company where globalization brings a threat for developing global competitiveness. If the company has already built competitive advantage in its business domain, the company can easily transfer market growth to profit improvement. However, if the company has not developed competitive advantage, globalization of economy will give a serious threat for the survivor of the company. The company might lose its own domestic market share. For the less famous brand of product or company name, international expansion is a challenging strategy. The study evaluated organizational performance of companies that try international expansion by utilizing Miles and Snow's strategy typology. We clustered organizations based on their strategy typology (prospector, analyzer, defender, and reactor) in view of the level of product diversification, new product development instances, level of localization, and autonomy of foreign subsidiary. With the strategy typology, we evaluated international strategy in view of product competitiveness, marketing strategy, human resource strategy, and organizational strategy. The regression result demonstrates that the performance of the company is significantly higher when the company employs prospector strategy. We also found out that product quality and emphasis for developed countries in international expansion are the most important factors for success.

  • PDF

Current Status of Korean Otter and Their Conservation

  • Han, Seung Woo;Han, Sung Yong
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.3 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Among the 13 species of otters in the world, only one Eurasian otter (Lutra lutra) is found in South Korea. In the Korean Peninsula, otter pelts were historically valuable and expensive commodities used for international trade, and otters have long been poached as hunting animals. Recent rapid economic development in South Korea has increased habitat fragmentation and loss, creating a continuing threat to the natural environment. Otters live only in the area of rivers and streams as a family group and are territorial (linear habitat). Due to these limited conditions of otter habitat, the population size of otter is lower than that of onshore mammals. According to recent research, DNA analyses using microsatellite markers have shown that only approximately 7-21 otter individuals inhabit river systems for a length of 50-230 km. Korea's urban streams are associated with many threats that hinder otters from inhabiting them. Many areas around the urban streams are surrounded by high concrete riverbanks, and the risk of roadkill is also high. Nevertheless, ecological restoration projects in the urban rivers will contribute greatly to the stable inhabitation of otters. Detailed otter conservation strategies, such as the elimination of threat factors, improvement of habitat environment, and restoration of food resources and shelter, will provide a positive restoration effect on otter and river ecosystems as well.

A Study on the Development Strategy of Gwangyang Port Using the SWOT/AHP Analysis (SWOT/AHP 분석을 이용한 광양항의 발전 전략에 관한 연구)

  • Son, Yong-Jung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.1
    • /
    • pp.247-262
    • /
    • 2011
  • This study conducted a SWOT/AHP analysis to prepare a developmental strategy for Gwangyang Port. The SWOT analysis is used to analyze internal and external environment in the strategy stage. The SWOT/AHP analysis was proposed by Kurttila et. al. (2000) to improve usefulness of the SWOT analysis. The results of the SWOT analysis confirm what factors are present in the SWOT group. Therefore, when it is combined with the AHP analysis, it evaluated the relative importance of factors gained from the SWOT analysis and used them to develop strategies. To sum up the results, in the SWOT group, opportunity, strong points, threat and weak points were relatively important in a good order. In respect to factors of the SWOT, for a factor of strength, reasonable freight cost, good port site, and broad hinterland were relatively important. As to factors of weakness, absence of an efficient customs system, a complex transport system and port personnel were relatively important. As to factors of opportunity, an improved transport system through building various infrastructures, consistent development of a connected industrial complex, and increased cargos in northeast area were relatively important. As to threat factors, an improved transport system through building various infrastructure, competition with neighboring ports and small complex transport companies were relatively important.