• Title/Summary/Keyword: Threat Model

Search Result 520, Processing Time 0.025 seconds

Factors related to Continuous Participation in the Pap Smear Screening among Korean Women: using a Structural Model (한국여성의 Pap 도말검사 지속적 참여행위에 관한 설명모델)

  • 박소미
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.1
    • /
    • pp.160-170
    • /
    • 2000
  • The purpose of this study was to develop an explanatory model to predict factors related to continuous participation in the Pap smear screening among Korean women. A hypothetical model was constructed on the basis of Health Belief Model and extensive review of literature on the Pap smear screening. Exogeneous variables included in this model were knowledge, perceived sensitivity, perceived severity, negative and positive emotional responses and professional support from physicians and nurses. Endogeneous variables were threat to cervical cancer, perceived benefit of the Pap smear screening, perceived barrier, and the final outcome variable was continuous participation in the Pap smear screening. The hypothetical model was tested with an empirical study. The data was collected from 623 married women whose age range was 24 - 83 using a self-reported survey questionnaire which was developed by the researcher. It's Cronbach's alpha score ranged from .6478 to .9118. Data was collected at different locations in Seoul; a university hospital, a local health center, and apartment complexes. Data analysis was done using SPSS 7.5 WIN Program for descriptive statistics and LISREL 8.12a WIN Program for covariance structural analysis. In conclusion, threat, perceived benefit, perceived barrier, positive emotion and professional support had a significant direct effect on continuous participation in the Pap smear screening among Korean women. The results of this study also showed that perceived barrier had the most significant direct effect on continuous participation in the Pap smear screening while negative emotional response had the most significant direct effect on perceived barrier. It can be suggested that decreasing perceived barrier by reducing negative emotional responses may be the most effective strategies for increasing continuous participation in the Pap smear screening among married Korean women.

  • PDF

A Study on the Mission Effect of a Sea-based BMD system (해상기반 탄도미사일 방어체계의 임무효과에 관한 연구)

  • Lee, Kyoung Haing;Choi, Jeong Hwan
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.1
    • /
    • pp.118-126
    • /
    • 2016
  • North Korea has continued developing ballistic missiles with various ranges. Even through the recent launch long-range missiles, it can be inferred that North Korea's Missile technology has reached a level where it can even threaten the US. moreover, through the three times nuclear tests, North Korea is known to have succeeded at gaining 10~20KT of explosive power as well as the minimization and lightening of nuclear warhead. Considering the short length of war zone in Korean peninsula and the possibility of nuclear equipment, if be the most severe threat across the whole peninsula. Since the midcourse phase flight takes the longest time, ROK should establish the ability to intercept at this middle phase. From this perspective, this paper describes mission effect of a sea-based BMD system through empirical threat and flight characteristic analysis using MIT model that was not suggested in original research.

A Study on the Optimal Allcation of Aircrafts to Defensive Counter Air by Goal Programming (목표계획법을 이용한 방어제공 임부의 항공기 최적할당에 관한 연구)

  • 김선하;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.20-33
    • /
    • 2002
  • This paper deals with assigning defensive counter air aircraft to the moving target in the air. Recently various kinds of allocation problems have been researched for fixed targets using offensive aircrafts. However, the counter air allocation problems for attacking aircrafts with considering the time and the threat have not been studied much. The main objective of this study is to mininize the time to intercept and the threat values simultaneously by using goal programming. The optimal solution by using an integer goal programming and a branch and bound algorithm is found and analyzed. By applying this model to real situation, we expect to reduce the time and number of sorties for destroying enemy aircraft, respectively.

An APT Malicious Traffic Detection Method with Considering of Trust Model (신뢰모형을 고려한 APT 악성 트래픽 탐지 기법)

  • Yun, Kyung-mi;Cho, Gi-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.937-939
    • /
    • 2014
  • Recently, an intelligent APT(Advanced Persistent Threat) attack which aims to a special target is getting to be greatly increased. It is very hard to protect with existing intrusion detection methods because of the difficulties to protect the initial intrusion of malicious code. In this paper, we analyze out-bound traffics to prevent call-back step after malicious code intrusion, and propose an APT malicious traffic detection method with considering of trust. The proposed method is expected to provide a basement to improve the detection rate in comparing with that of existing detection methods.

  • PDF

Analysis of Self-driving Environment Using Threat Modeling (위협 모델링을 이용한 자율 주행 환경 분석)

  • Min-Ju Park;Ji-Eun Lee;Hyo-Jeong Park;Yeon-sup Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.77-90
    • /
    • 2022
  • Domestic and foreign automakers compete to lead the autonomous vehicle industry through continuously developing self-driving technologies. These self-driving technologies are evolving with dependencies on the connection between vehicles and other objects such as the environment of cars and roads. Therefore, cyber security vulnerabilities become more likely to occur in the self-driving environment, so it is necessary to prepare for them carefully. In this paper, we model the threats in autonomous vehicles and make the checklist to securely countermeasure them.

Naval ship's susceptibility assessment by the probabilistic density function

  • Kim, Kwang Sik;Hwang, Se Yun;Lee, Jang Hyun
    • Journal of Computational Design and Engineering
    • /
    • v.1 no.4
    • /
    • pp.266-271
    • /
    • 2014
  • The survivability of the naval ship is the capability of a warship to avoid or withstand a hostile environment. The survivability of the naval ship assessed by three categories (susceptibility, vulnerability and recoverability). The magnitude of susceptibility of a warship encountering with threat is dependent upon the attributes of detection equipment and weapon system. In this paper, as a part of a naval ship's survivability analysis, an assessment process model for the ship's susceptibility analysis technique is developed. Naval ship's survivability emphasizing the susceptibility is assessed by the probability of detection, and the probability of hit. Considering the radar cross section (RCS), the assessment procedure for the susceptibility is described. It's emphasizing the simplified calculation model based on the probability density function for probability of hit. Assuming the probability of hit given a both single-hit and multiple-hit, the susceptibility is accessed for a RCS and the hit probability for a rectangular target is applied for a given threat.

A Study on Protection Model of Propagation through Smartphone Malware Analysis (스마트폰 악성코드 분석을 통한 확산 방지 모델에 관한 연구)

  • Lim, Su-Jin;Lee, Jung-Hyun;Kang, Hyung;Park, Won-Hyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • Recently, the number of internet users using smartphone is increasing worldwide, and the interest in the smartphone malware is increasing. Especially, since mobile malware are occurring to the smartphones using Symbian or Windows Mobiles in the abroad, it is necessary to have an action plan against these mal wares. This paper describes the possible security threat through the analysis of the mal wares occurred after 2004. Also we present a model for the future propagation prevention system which can cope with domestic smartphone mal wares.

A Mathematical Model Development for the Nitrification-Denitrification Coupled Process

  • ;;T. Prabhakar Clement
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2003.04a
    • /
    • pp.430-433
    • /
    • 2003
  • Nitrogen pollution in urban and rural groundwater is a common problem and poses a major threat to drinking water supplies based on groundwater. In this work, the kinetics of nitrification-denitrification coupled reactions are modeled and new reaction modules for the RT3D code describing the fate and transport of nitrogen species, dissolved oxygen, dissolved organic carbon, and biomass are developed and tested. The proposed nitrogen transformations and transport model showed very good match with the results of other public codes.

  • PDF

An Optimal Investment Planning Model for Improving the Reliability of Layered Air Defense System based on a Network Model (다층 대공방어 체계의 신뢰도 향상을 위한 네트워크 모델 기반의 최적 투자 계획 모델)

  • Lee, Jinho;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This study considers an optimal investment planning for improving survivability from an air threat in the layered air defense system. To establish an optimization model, we first represent the layered air defense system as a network model, and then, present two optimization models minimizing the failure probability of counteracting an air threat subject to budget limitation, in which one deals with whether to invest and the other enables continuous investment on the subset of nodes. Nonlinear objective functions are linearized using log function, and we suggest dynamic programming algorithm and linear programing for solving the proposed models. After designing a layered air defense system based on a virtual scenario, we solve the two optimization problems and analyze the corresponding optimal solutions. This provides necessity and an approach for an effective investment planning of the layered air defense system.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.