• 제목/요약/키워드: Threat Factors

검색결과 351건 처리시간 0.028초

ERP에 대한 사용자 저항의 영향 요인에 관한 실증적 연구 : 베트남 사용자를 중심으로 (An Empirical Study on the Factors Influencing User Resistance to ERP : Focused on the Vietnam Users)

  • 김홍근;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제22권4호
    • /
    • pp.127-158
    • /
    • 2015
  • This study analyzes the factors affecting user resistance to ERP in Vietnam, including the factors related to the cultural values of the users, which is rarely dealt in the previous ERP research. A research model is developed based on Klaus and Blanton [2010] and Hofstede [2011], consisting of the independent variables ('cultural value', 'system', 'organization', and 'process' related variables), a dependent variable ('user resistance to ERP') and a moderating variable ('self efficacy'). Major results of study include (1) users with high degree of uncertainty avoidance and femininity regard ERP as potential threat to their job and are likely to resist to ERP; (2) By training the users with high level of femininity to enhance their self efficacy, the degree of resistance to ERP can be reduced; (3) For ERP to be utilized successfully, systems should be developed in such a way in which working with ERP is not regarded as complex and difficult; and (4) communication and training play an important role in reducing the resistance of users.

안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구 (A Study on the Threat Review to use Secure Smartphone Applications)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제16권1호
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

A Validated Solution for the Threat of Ionosphere Spatial Anomalies to Ground Based Augmentation System Users

  • Pullen, Sam;Lee, Ji-Yun;Datta-Barua, Seebany;Park, Young-Shin;Zhang, Godwin;Enge, Per
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2006년도 International Symposium on GPS/GNSS Vol.1
    • /
    • pp.9-14
    • /
    • 2006
  • This paper develops a complete methodology for the mitigation of ionosphere spatial anomalies by GBAS systems fielded in the Conterminous U.S. (CONUS). It defines an ionosphere anomaly threat model based on validated observations of unusual ionosphere events in CONUS impacting GBAS sites in the form of a linear ‘wave front’ of constant slope and velocity. It then develops a simulation-based methodology for selecting the worst-case ionosphere wave front impact impacting two satellites simultaneously for a given GBAS site and satellite geometry, taking into account the mitigating effects of code-carrier divergence monitoring within the GBAS ground station. The resulting maximum ionosphere error in vertical position (MIEV) is calculated and compared to a unique vertical alert limit, or $VAL_{H2,I}$, that applies to the special situation of worst-case ionosphere gradients. If MIEV exceeds $VAL_{H2,I}$ for one or more otherwise-usable subset geometries (i.e., geometries for which the 'normal' vertical protection level, or $VPL_{H0}$, is less than the 'normal' VAL), the broadcast ${\sigma}_{pr_{-}gnd}$ and/or ${\sigma}_{vig}$ must be increased such that all such potentially-threatening geometries have VPL$_{H0}$ > VAL and thus become unavailable. In addition to surveying all aspects of the methods used to generate the required ${\sigma}_{pr_{-}gnd}$ and ${\sigma}_{vig}$ inflation factors for CONUS GBAS sites, related methods for deriving similar results for GBAS sites outside CONUS are suggested.

  • PDF

DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로 (A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks)

  • 김묵정;이상진
    • 정보보호학회논문지
    • /
    • 제29권1호
    • /
    • pp.215-223
    • /
    • 2019
  • 최근의 사이버 공격 위협 트렌드는 기업 또는 개인의 중요 정보 자산을 탈취하기 위해 기술적으로 광범위하게 해킹을 시도하는 방법과, 인간의 심리학적 요인을 겨냥한 사회공학(social engineering) 해킹 기법이 복합적으로 활용되는 '지능형 지속 위협 공격(APT)' 이 주를 이루고 있다. APT 공격 기법 중 가장 보편적으로 활용되는 스피어 피싱(spear phishing)은 약 90% 이상이 APT공격의 핵심 요소로 활용되며, 쉬우면서도 강력한 효과를 내는 해킹 기법으로 잘 알려져 있다. 사이버 보안 위협 방어를 위한 기존 선행 연구는 주로 기술적, 정책적 측면에 국한하여 접근하고 있다. 그러나 지능화된 해킹 공격에 맞서 선제적으로 대응하기 위해서는 사회공학 측면에서 기존과는 다른 관점의 연구가 필요하다. 본 논문은 스피어피싱 공격 사례를 중심으로 인간의 성격 유형(DISC)과 사이버 보안 위협간의 상호 연관성을 분석하고, 기존의 틀을 깨는 새로운 관점의 보안 위협 대응 방안에 대해 제안하고자 한다.

유류오염사고와 해양오염 방제시스템 (Oil spill accident and prevention system of marine pollution)

  • 강영승
    • 기술사
    • /
    • 제41권2호
    • /
    • pp.64-67
    • /
    • 2008
  • According to grow maritime activities in coastal zone, a threat increase to the marine environment from oil spill. The success or failure of initial effort depends on the adequacy of the plan and the ability of immediate execution. Successful response to oil spills requires critical information in real time topics, including spill data, environmental conditions, ecological factors. Diverse simulation provides tactical decision-makers with the information on the movement of pollutant.

  • PDF

소셜매뉴팩처링플랫폼의 참여의도에 영향을 미치는 요인에 관한 연구 (A Study on Factors Affecting the Participation of Social Manufacturing Platforms)

  • 길이훈;김광용
    • 한국IT서비스학회지
    • /
    • 제14권3호
    • /
    • pp.147-161
    • /
    • 2015
  • The rapid changes in consumption patterns and the manufacturing industry environment are both a threat and an opportunity for small and medium-sized enterprises in Korea because it lacks innovative capacity compared to large conglomerates. In this new manufacturing environment, social manufacturing is an innovative business model that can create new business opportunities for these companies. However, there are not that many proven models of platforms where products are created jointly with consumers. Some conceptual analysis of the success factors and operation strategy of co-creation platforms have started to be released but there are almost no empirical studies conducted on this matter today. In this study, the social manufacturing platform business concept and its components were studied; various factors that affect the willingness to participate in consumer-led co-creation platforms were considered; the factors were surveyed on potential consumers; a study was carried out to analyze the relationship of these factors; a model of these factors were set up and proven.

정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구 (A Study on Relationships Between Information Systems Risk and Password Characteristics)

  • 오창규;김종기;심윤주
    • 한국산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.62-74
    • /
    • 2003
  • 정보시스템의 역할이 증대되고 있는 현시점에서 정보 자원에 대한 효과적인 보호는 매우 중요하다. 인터넷의 영향으로 정보 시스템의 개방화와 접속성의 증대로 인해 보다 많은 위협과 취약성에 노출되어 있으며 이들을 관리하는 것 또한 매우 중요한 이슈가 된다. 특히 정보 시스템의 사용을 위한 수단인 패스워드의 급증은 정보 보호에 더 많은 주의를 요하게 되었다. 본 연구에서는 위험분석에 사용되는 자산, 위협, 취약성 등으로부터 도출된 위험의 발생 가능성이 실제 지각된 위험에 어떠한 영향력을 행사하는가를 살펴보고, 여기서 도출된 위험이 정보보호를 위한 패스워드 특성에 어떠한 영향관계를 가지는가를 분석하였다. 이를 통해 패스워드의 효과적인 사용과 보안 대책을 수립하기 위한 방안을 제시하였다.

  • PDF

Strategic Options for Internationalization in Korean Organizations

  • Yum, Ji-Hwan;Park, Byoung-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2005년도 추계학술대회
    • /
    • pp.323-335
    • /
    • 2005
  • Globalization of economy brings both opportunities and threats especially for companies in developing countries such as Korea. Globalization is an opportunity because it may expand the size of market for the company where globalization brings a threat for developing global competitiveness. If the company has already built competitive advantage in its business domain, the company can easily transfer market growth to profit improvement. However, if the company has not developed competitive advantage, globalization of economy will give a serious threat for the survivor of the company. The company might lose its own domestic market share. For the less famous brand of product or company name, international expansion is a challenging strategy. The study evaluated organizational performance of companies that try international expansion by utilizing Miles and Snow's strategy typology. We clustered organizations based on their strategy typology (prospector, analyzer, defender, and reactor) in view of the level of product diversification, new product development instances, level of localization, and autonomy of foreign subsidiary. With the strategy typology, we evaluated international strategy in view of product competitiveness, marketing strategy, human resource strategy, and organizational strategy. The regression result demonstrates that the performance of the company is significantly higher when the company employs prospector strategy. We also found out that product quality and emphasis for developed countries in international expansion are the most important factors for success.

  • PDF

Current Status of Korean Otter and Their Conservation

  • Han, Seung Woo;Han, Sung Yong
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • 제3권1호
    • /
    • pp.1-6
    • /
    • 2022
  • Among the 13 species of otters in the world, only one Eurasian otter (Lutra lutra) is found in South Korea. In the Korean Peninsula, otter pelts were historically valuable and expensive commodities used for international trade, and otters have long been poached as hunting animals. Recent rapid economic development in South Korea has increased habitat fragmentation and loss, creating a continuing threat to the natural environment. Otters live only in the area of rivers and streams as a family group and are territorial (linear habitat). Due to these limited conditions of otter habitat, the population size of otter is lower than that of onshore mammals. According to recent research, DNA analyses using microsatellite markers have shown that only approximately 7-21 otter individuals inhabit river systems for a length of 50-230 km. Korea's urban streams are associated with many threats that hinder otters from inhabiting them. Many areas around the urban streams are surrounded by high concrete riverbanks, and the risk of roadkill is also high. Nevertheless, ecological restoration projects in the urban rivers will contribute greatly to the stable inhabitation of otters. Detailed otter conservation strategies, such as the elimination of threat factors, improvement of habitat environment, and restoration of food resources and shelter, will provide a positive restoration effect on otter and river ecosystems as well.

SWOT/AHP 분석을 이용한 광양항의 발전 전략에 관한 연구 (A Study on the Development Strategy of Gwangyang Port Using the SWOT/AHP Analysis)

  • 손용정
    • 한국항만경제학회지
    • /
    • 제27권1호
    • /
    • pp.247-262
    • /
    • 2011
  • 본 논문은 광양항의 발전전략을 수립하기 위하여 SWOT/AHP분석을 실시하고자 한다. SWOT분석은 보통 전략수립단계에 있어서 내 외부 환경을 분석하기 위해서 사용된다. SWOT/AHP분석은 Kurttila et al(2000)이 SWOT분석의 유용성을 개선하기 위해 제안한 방법으로 SWOT분석의 결과는 단순히 SWOT그룹 내에 어떤 요인들이 있는가를 확인하는 것에 불과하다. 따라서 AHP분석과 결합함으로써 SWOT분석에서 도출된 요인들에 대한 상대적인 중요도를 평가하여 전략수립에 활용하는데 목적이 있다. 분석결과를 요약하면, SWOT그룹의 상대적 중요도는 기회(0.376), 강점(0.259), 위협(0.206), 약점(0.159) 순으로 나타났다. 다음으로 SWOT요인 별로 살펴보면, 강점요인의 상대적 중요도에서는 저렴한 화물처리비용(0.383), 우수한 항만입지(0.347), 광범위한 배후지(0.270) 순으로 나타났다. 약점요인의 상대적 중요도는 효율적인 통관시스템 미비(0.511), 복합운송 연계성 미비(0.315), 항만전문인력의 부족(0.173) 순으로 나타났다. 기회요인의 상대적 중요도는 각종 인프라 구축으로 수송체계 개선(0.461), 주변지역에 대한 연관산업단지 개발지속(0.326), 동북아지역의 물동량 증가추세(0.214) 순으로 나타났다. 위협요인의 상대적 중요도는 각종 인프라 구축으로 수송체계 개선(0.411), 주변항만과의 경쟁(0.400), 복합운송업체의 영세성(0.189) 순으로 나타났다. 평가대상이 되는 각 그룹별 세부요인들의 종합순위를 얻기 위하여 의사결정 항목들의 상대적 중요도를 종합화하였다. SWOT그룹별 세부속성요인들의 최종 중요도(가중치) 결과를 살펴보면, 기회요인 속하는 각종 인프라구축으로 인한 수송체계 개선(0.173), 주변지역에 대한 연관산업단지 개발지속(0.123)이 가장 높은 중요도를 보였고, 저렴한 화물처리비용, 우수한 항만입지, 항만운영의 융통성 결여, 주변항만과의 경쟁, 효율적 통관시스템 미비의 순으로 나타났다.