• Title/Summary/Keyword: Threat Model

Search Result 532, Processing Time 0.031 seconds

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2 (경험 및 습관이 신규서비스의 정보보호 행동에 미치는 요인에 대한 연구 - 보호 동기이론과 UTAUT2을 중심으로)

  • Lee, Hong-Je;Kho, Hyeong-Seog;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.

A Study on Development Strategy of Korean Hidden Champion Firm Utilizing the SWOT/AHP Technique (SWOT/AHP 기법을 이용한 한국형 히든챔피언 기업의 발전전략에 관한 연구)

  • Chung, Youn-Kyaei;Lee, Sang-Suk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.97-111
    • /
    • 2013
  • This study reviews preceding research for detailed factors to establish development strategies for Korean Hidden Champion firms and classifies strategy factors into internal ones and external ones through specialists' opinions to draw strengths, weaknesses, opportunities and threats of each factor. It also sets hierarchical model to draw up a survey, distributes the survey to groups of specialists and enterprises respectively and then examines consistency ratio. Fifty-four copies of survey whose reliability on responses is secured through examining the consistency ratio are evaluated with their relative importance in factors by using SWOT/AHP technique and their order of priority is determined. Based on their results, development strategies for Korean Hidden Champion firms are established. SWOT/AHP analyses results show that external factors are with the opportunity of industry growth and the threat of intensified competition and market uncertainty and internal factors are with the strength in order of technological competence, construction competence in customer relation and marketing competence. The weakness in the lack of funds, lack of brand awareness in order. This result suggests that external environments of enterprises that more emphasis should be put on the industry growth and aggressive strategies cannot help but be adopted even in a global competition getting fiercer every day are seen more important. Then, it also seems to be thought that the technological competence including R&D and specialization, construction competence in customer relation and marketing competence should internally chosen for strategies to support strategies. The order of priority in development strategies for Korean Hidden Champion firms is drawn as; (i) aggressive S/O strategy which utilizes opportunities by taking advantage of strengths, (ii) W/O strategy which utilizes opportunities by supplementing weaknesses, (iii) diversified S/T strategy which utilizes strengths to make up for threats and (iv) defensive W/T strategy which supplements weaknesses to overcome threats.

  • PDF

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.

Fall detection based on acceleration sensor attached to wrist using feature data in frequency space (주파수 공간상의 특징 데이터를 활용한 손목에 부착된 가속도 센서 기반의 낙상 감지)

  • Roh, Jeong Hyun;Kim, Jin Heon
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • It is hard to predict when and where a fall accident will happen. Also, if rapid follow-up measures on it are not performed, a fall accident leads to a threat of life, so studies that can automatically detect a fall accident have become necessary. Among automatic fall-accident detection techniques, a fall detection scheme using an IMU (inertial measurement unit) sensor attached to a wrist is difficult to detect a fall accident due to its movement, but it is recognized as a technique that is easy to wear and has excellent accessibility. To overcome the difficulty in obtaining fall data, this study proposes an algorithm that efficiently learns less data through machine learning such as KNN (k-nearest neighbors) and SVM (support vector machine). In addition, to improve the performance of these mathematical classifiers, this study utilized feature data aquired in the frequency space. The proposed algorithm analyzed the effect by diversifying the parameters of the model and the parameters of the frequency feature extractor through experiments using standard datasets. The proposed algorithm could adequately cope with a realistic problem that fall data are difficult to obtain. Because it is lighter than other classifiers, this algorithm was also easy to implement in small embedded systems where SIMD (single instruction multiple data) processing devices were difficult to mount.

Agent-based Modeling and Analysis of Tactical Reconnaissance Behavior with Manned and Unmanned Vehicles (에이전트 기반 유·무인 수색정찰 전술행위 모델링 및 분석)

  • Kim, Ju Youn;Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.47-60
    • /
    • 2018
  • Today's unmanned technology, which is being used in various industries, is expected to be able to make autonomous judgements as autonomous technology matures, in the long run aspects. In order to improve the usability of unmanned system in the military field, it is necessary to develop a technique for systematically and quantitatively analyzing the efficiency and effectiveness of the unmanned system by means of a substitute for the tasks performed by humans. In this paper, we propose the method of representing rule-based tactical behavior and modeling manned and unmanned reconnaissance agents that can effectively analyze the path alternatives which is required for the future armored cavalry to establish a reconnaissance mission plan. First, we model the unmanned ground vehicle, small tactical vehicle, and combatant as an agent concept. Next, we implement the proposed agent behavior rules, e.g., maneuver, detection, route determination, and combatant's dismount point selection, by NetLogo. Considering the conditions of maneuver, enemy threat elements, reconnaissance assets, appropriate routes are automatically selected on the operation area. It is expected that it will be useful in analyzing unmanned ground system effects by calculating reconnaissance conducted area, time, and combat contribution ratio on the route.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

A Study on the Factors Influencing Burnout of Psychiatric Ward Nurses -Violence Experience, Violence Coping, Social Support- (정신과병동 간호사의 소진 영향 요인에 관한 연구 -폭력경험, 폭력대처, 사회적지지)

  • Seo, Jeong-Won;Kang, Mi-Ran;Je, Nam-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.393-405
    • /
    • 2019
  • This study is descriptive survey research to find out factors which violence experience, violence coping and social support affect. This study aims at reducing burnout of psychiatry nurses and founding problem-oriented violence handling standardized intervention. The subjects were 204 nurses who have worked for more than a year in a hospital. The data collection period was conducted with structured survey from July 1, 2018 to August 31, 2018. Collected data was analysed with average, standard deviation, t-test, ANOVA, Pearson's Correlation confident, Multiple Regression and this data will go to by SPSS. The results of the study were as follows. 92.2% of psychiatry nurses are experiencing verbal violence, 92.2% are experiencing physical threat and 75.5% are experiencing physical violence. Relations between violence experience and violence coping(r=0.15. p<.027), violence experience and burnout(r=0.16, p<.017) were positive correlation. Relation between violence coping and social support(r=0.30, p<.001) was positive correlation, and social support and burnout(r=-0.28, p<.001) was negative correlated. Also we found out that nursing job satisfaction, social support and physical violence experience affect burnout. Which shows model's explanatory power was 33.3%. Therefore preventive discipline which can reduce violence experience of psychiatry nurses, founding systems to reinforce social support and creating circumstance where nursing job satisfaction can increase will help reduce burnout and serve better nursing.

The Effects of Perceived Quality and Relationship Quality on Store Performance(Revisit Intention) in the Context of Coffee Specialty Shops

  • LEE, Sang Suk;LEE, Jee Eun
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.1
    • /
    • pp.21-34
    • /
    • 2021
  • Purpose: This study examines the structural relationship between perceived quality, relationship quality, and revisit intention in the context of coffee shop. In this model, perceived quality consists of product, service, and experience quality, and relationship quality consists of satisfaction, trust, and commitment, and performance consists of revisit intention. More specially, this study identifies whether perceived quality plays a mediating role in the relationship between perceived quality and relationship quality and the direct/indirect effects of perceive quality on intention to revisit. Research design, data and methodology: The survey was conducted from September 1 to 30, 2019. The data were collected from 320 respondents and analyzed using structural equation modeling (SEM) with AMOS program. Results: The findings are as follows. First, quality perception of coffee specialty stores had a statistically positive effect on relationship quality, indicating supports H1. Therefore, customers can know that they are aware of the quality of coffee specialty stores, including quality of service and experience as well as products, and that they form relationship quality with coffee specialty stores. Second, relationship quality between coffee shops and customers had a significant positive effect on performance. Thus, H2 was supported. The results show that if the coffee shop does not consider relationship quality as important, customer loyalty decreases, the number of customers decreases, and the number of customers who switch to another coffee shop increases, which can lead to a threat to the coffee shop. Third, in the case of hypothesis H3, it was found that there was a partial mediating effect of satisfaction and trust between quality perception and reuse intention of coffee specialty stores, so hypothesis H3 was partially supported. As commitment appears to have no mediating effect, it can be said that customers who use coffee shops are not only difficult to maintain as regular customers of a particular coffee shop, but also have ample room to move to other coffee shops. Conclusions: Although many scholars point out the importance of service quality, few studies were conducted in the context of the Korean food service industry (including coffee shops). From this perspective, this study tested several hypotheses that the quality (product, service, experience) perceived by customers can have a positive effect on relationship quality and performance (re-visit intention), either directly or indirectly. The findings of this study demonstrate that if the manager of a coffee shop understands the characteristics of quality perceived by customers and the role of relationship quality, the effect of quality perceptions on customers can be maximized in order to maintain the relationship with customers.