• Title/Summary/Keyword: cyber risk

Search Result 247, Processing Time 0.024 seconds

Research on Consumer's Food Purchasing Intentions through Internet Shopping Mall (인터넷 쇼핑몰 이용 소비자의 식품 구매 의도 분석)

  • Kim, Sung-Hee;Joo, Na-Mi
    • Journal of the Korean Society of Food Culture
    • /
    • v.22 no.6
    • /
    • pp.705-712
    • /
    • 2007
  • In spite of the fact that the food group(Food, Drinks and Health foods & Agricultural and Marine products) occupies little position in total sales of Internet shopping mall, the food group's sales in cyber shopping mall in 2006 have increased 678.1% over 5 years. In addition to the fact that the food consumption pattern has changed from quality-oriented to convenience, health and safety-oriented, the need to decrease the opportunity cost created by housework is rising in the context of increase of women's work participation rate. The wind of change like these will become the foundation on which cyber food industry will be developed. The factors having an effect on consumer purchasing intentions when one buy foods through internet shopping malls are researched in this thesis. For the investigation, women of 697 were surveyed by a questionnaire, and the data were analyzed by the SPSS for WINDOW(Version 12.0). The result is as follows: Factors having an effect on food purchasing intentions are Convenience(Timesaving, Troublesomeness), Customer service(Responsiveness, Reliability, Empathy, Tangibility), Perceived Customer Risk(Economic, Social, Performance risk) and Shopping experience(Easy to find out, Easy process for payment) in order.

Influence of Cyber Language on Continue Using Intention of Mobile (사이버 언어가 모바일 지속적 사용의도에 미치는 영향)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.178-181
    • /
    • 2015
  • The purpose of this study was aimed to analyze factors affecting on continuous intention to use of mobile based on the caused motivation of cyber language. Predictor factors were selected economic motivation, represent motivation, entertainment motivation, relationship strength motivation and psychological free motivation suggested on the previous study. Participants of this study were 76 mobile users in Gyeongnam and Jeonbuk province in accordance with convenience sampling. IBM SPSS Statistics 19 were employed for descriptive statistics, Smart PLS(partial least squares) was employed for confirmatory factor analysis and path analysis of casual relationship among variables and effect. Analytical results show that paths from economic motivation to the percieved value and relationship strength motivation are significant. And analytical results show that path from economic motivation to the percieved risk are significant. This study suggests practical and theoretical implications based on the results.

  • PDF

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

Real-time security Monitroing assessment model for cybersecurity vulnera bilities in network separation situations (망분리 네트워크 상황에서 사이버보안 취약점 실시간 보안관제 평가모델)

  • Lee, DongHwi;Kim, Hong-Ki
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.45-53
    • /
    • 2021
  • When the security monitoring system is performed in a separation network, there is little normal anomaly detection in internal networks or high-risk sections. Therefore, after the establishment of the security network, a model is needed to evaluate state-of-the-art cyber threat anomalies for internal network in separation network to complete the optimized security structure. In this study, We evaluate it by generating datasets of cyber vulnerabilities and malicious code arising from general and separation networks, It prepare for the latest cyber vulnerabilities in internal network cyber attacks to analyze threats, and established a cyber security test evaluation system that fits the characteristics. The study designed an evaluation model that can be applied to actual separation network institutions, and constructed a test data set for each situation and applied a real-time security assessment model.

A study on the psychosocial variables of the youth's addiction to internet and cyber sex and their problematic behavior (청소년의 인터넷 중독 및 사이버 성중독의 심리사회적 변인과 문제행동 연구)

  • Nam, Young-Ok
    • Korean Journal of Social Welfare
    • /
    • v.50
    • /
    • pp.173-207
    • /
    • 2002
  • The purpose of the study is to examine the impact of the youth's addiction to Internet and what behavior do they show depending on the extent of addiction, and further to analyze the reason of cyber sex addiction and the addiction level. The results are as following; First, 2% of the target students of the study was in severe internet addiction and 47% in the 'early addiction' which is in the risk of addiction. Second, the larger the youth's depression and impulsiveness was, the lower their self-esteem was, the poorer their parents' bringing-up attitude was, and the lower their satisfaction to school life was, the more deep they are addicted to internet. Third, the problem behavior due to Internet addiction were categorized into seven area of trouble; family, social, physical, psychological, public relation, cyber sex, and school life. It showed that 'heavily addicted group' had the most severe problems. Forth, as to the extent of cyber sex addiction, 0.7% of the youth was in severe 'heavy addiction' and about 7% was in the 'early addiction' which is in the range of addiction risk. Fifth, the higher the youth's personal depression and impulsiveness was, the lower their self-esteem was, the poorer their parents' couple relation and bringing-up attitude were, and the worse their relation with peers and teachers was, they got indulged into cyber addiction.

  • PDF

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

development plan of nuclear cyber security system (원전 사이버보안 체계 개발 방안에 대한 연구)

  • Han, Kyung-Soo;Lee, Gang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.471-478
    • /
    • 2013
  • Industrial control system was designed mainly in the form of analog in early days. However, necessity of digital system engineering is increasing recently because systems become complicated. Consequently, stability of digital systems is improved so most industrial control systems are designed with digital. Because Using digital design of Industrial control system is expanded, various threatening possibilities such as penetration or destruction of systems are increasing enormously. Domestic and overseas researchers accordingly make a multilateral effort into risk analysis and preparing countermeasures. In this paper, this report chooses common security requirement in industrial control system and nuclear control system through relevant guidelines analysis. In addition, this report suggests the development plan of nuclear cyber security system which will be an essential ingredient of planning approvals.

Relationships between Consumers' Perceived Risk, Quality, and Value and Purchase Intention - Focused on the Moderating Role of Price Levels - (외식 메뉴의 위험 지각, 품질 지각, 가치 지각 및 구매 의도간의 영향 관계 - 가격 수준의 조절 효과를 중심으로 -)

  • Kim, Young-Gab;Hong, Jong-Sook
    • Culinary science and hospitality research
    • /
    • v.15 no.4
    • /
    • pp.299-312
    • /
    • 2009
  • The purpose of this study is to investigate how the price levels influence the relationships between consumers' perceived quality, risk, and value and purchase intention of restaurant menu. It analyzed questionnaire data from 406 consumers who had purchase experience of boned rib restaurant menu during the last 6 month period. The results showed that perceived risk had a negative impact on perceived quality and perceived risk had a negative impact on purchase intention. In addition, perceived quality had a positive impact on perceived value. However, perceived quality didn't have an impact on purchase intention and perceived risk didn't have an impact on perceived value.

  • PDF

Predictive Validity of the STRATIFY for Fall Screening Assessment in Acute Hospital Setting: A meta-analysis (입원 환자에서 STRATIFY의 예측 타당도 메타분석)

  • Park, Seong-Hi;Choi, Yun-Kyoung;Hwang, Jeong-Hae
    • Korean Journal of Adult Nursing
    • /
    • v.27 no.5
    • /
    • pp.559-571
    • /
    • 2015
  • Purpose: This study is to determine the predictive validity of the St. Thomas Risk Assessment Tool in Falling Elderly Inpatients (STRATIFY) for inpatients' fall risk. Methods: A literature search was performed to identify all studies published between 1946 and 2014 from periodicals indexed in Ovid Medline, Embase, CINAHL, KoreaMed, NDSL and other databases, using the following key words; 'fall', 'fall risk assessment', 'fall screening', 'mobility scale', and 'risk assessment tool'. The QUADAS-II was applied to assess the internal validity of the diagnostic studies. Fourteen studies were analyzed using meta-analysis with MetaDisc 1.4. Results: The predictive validity of STRATIFY was as follows; pooled sensitivity .75 (95% CI: 0.72~0.78), pooled specificity .69 (95% CI: 0.69~0.70) respectively. In addition, the pooled sensitivity in the study that targets only the over 65 years of age was .89 (95% CI: 0.85~0.93). Conclusion: The STRATIFY's predictive validity for fall risk is at a moderate level. Although there is a limit to interpret the results for heterogeneity between the literature, STRATIFY is an appropriate tool to apply to hospitalized patients of the elderly at a potential risk of accidental fall in a hospital.