• Title/Summary/Keyword: defenders

Search Result 38, Processing Time 0.023 seconds

Looking through Others' Eyes: A Double Perspective in Literary and Film Studies

  • Kim, Seong-Kon
    • Journal of English Language & Literature
    • /
    • v.60 no.2
    • /
    • pp.249-267
    • /
    • 2014
  • An outsider's perspective is often illuminating and enlightening, as he or she perceives the world differently from us, and sees things that insiders tend to miss. While an outsider's views are fresh and penetrating, an insider's vision is often banal and myopic. Although outsiders' perspectives may not be quite right at times, they always shed light and provide insight, allowing us to reevaluate the conventional interpretations of our literature and folktales. In order to prevent our own understanding and knowledge from growing stale and narrow-minded, we should endeavor to consider outsiders' opinions and view all things from multiple angles. When reading literary or cultural texts, therefore, we need to read through others' eyes because it provides alternative perspectives. And we should learn to co-exist with others and see things from others' eyes. In his celebrated novel, My Name Is Red, Orhan Pamuk, the Turkish Nobel Laureate, explores the themes of clashes between the East and the West, the young and the old, and conservatism and radicalism. The confrontation between the stubborn defenders of tradition and the self-righteous innovators ultimately results in bigotry, hatred and murder. As Pamuk aptly perceives in his novel, the inevitable outcome of such uncompromising conflict is degradation of humanity and annihilation of human civilization. That is precisely why we need to embrace others who are different from us and learn to look through others' eyes. Sometimes, we fear other voices and different perspectives. As the movie "The Others" suggests, however, there is no reason for us to be afraid of others.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

The Effect of Corporate Strategy and IT Role on the Intent for IT Outsourcing Decision (조직의 전략 유형과 IT 역할이 아웃소싱 의도결정에 미치는 영향)

  • Jo, Dong-Hwan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.256-263
    • /
    • 2007
  • Corporate managers look at IT outsourcing as long-term strategic choices not as short-term tactical ones, and maximizing the effect that IT outsourcing brings about is the main concern to them. Emerging different types of IT outsourcing and their effects on the corporate business decisions necessitate the research on this subject. According to previous researches, the Intent for IT outsourcing is categorized as IS Improvement, Business Impact, and Commercial Exploitation. The decison factors for these IT outsourcing include corporate strategy types, IT role, and interaction between these two. Firm size and IT maturity are selected as moderating factors to add the credibility to the research of the effect of IT outsourcing decision making. Analyzing IT outsourcing data collected from 61 large-size and mid-size domestic firms revealed that corporate strategy rather than IT role is more significant factor affecting the intent for IT outsourcing decision. That means the decision of outsourcing intent is affected by corporate strategy types. Defenders(as in corporate strategy types) tend to use IT outsourcing more as a means to improve information systems, compared to analyzers and reactors. Prospectors tend to use IT outsourcing more as a commercial exploitation, compared to analyzers and reactors. These outcomes prove that corporate strategy characteristics reflect outsourcing intent. There were previous researches that showed outsourcing decision depends on IT role however the hypothesis was rejected that IT role determines outsourcing intent. It was also rejected that the interaction between corporate strategy types and IT role determines outsourcing intent. Corporate decision makers should first analyze corporate strategy, and reflect it on the outsourcing intent when they make IT outsourcing decisions. Only the precise defining of IT outsourcing intent will lower the risk and increase the possibility of success.

  • PDF

The Effect of Different Types of Bullying Defenders on Bullying Behavior: Verification of the Moderating Effect of Empathy (집단따돌림 동조유형이 집단따돌림 가해행위에 미치는 영향: 공감능력의 조절효과 검증)

  • Park, So-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.125-136
    • /
    • 2017
  • This study was designed to test whether middle school students have moderating effect of empathy ability on group bullying behavior. The subjects were 488 middle school students in Busan area, The mean difference test and regression analysis were performed using the SPSS 20 program and the related variables were standardized to show the characteristics of the control effect. The results of this study are as follows: First, as the experiences of the perpetrator and the experience of the autonomous group, the group bullying behaviors were higher, and it was confirmed that the perpetrators were important variables for predicting the bullying behaviors. As a predictor of bullying behavior, it was identified as an important variable. Second, empathy ability has a moderating effect of alleviating the relationship between perpetrator's harmony and bullying behavior, and the relationship between onlooker and bullying behavior. Third, according to gender analysis, male students were more exposed to bullying behaviors than female students. Through these discussions, practical suggestions for social welfare, academic suggestions, and suggestions for follow-up studies were made.

Analysis of Network for Asian Cup Soccer Final based on Social Network Theory: Based on Centrality Indexes (사회 연결망 이론에 근거한 아시안컵 축구 결승전 네트워크 분석: 중심성 지표를 중심으로)

  • Kim, Sun-Duck;Seong, Tae-Young;Lee, Dong-Min;Lee, Man-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.205-216
    • /
    • 2016
  • This study aimed to discover the most influential player in the network of Soccer game and how individual players contribute within the team with quantitative capabilities they possess. It also examined whether or not the network of relationship between players and the coach's tactics were in harmony. The results showed high level of correlation between the network between offenders and defenders according to tactics of the coach during the first half. It can be said that each players fulfilled their role and formed a network within them to lead the game and form a virtuous network structure. On the other hand, the overall network of the team was focused on a specific player during the second half. But the coach's appropriate use of substitutes and change in tactics stabilized the network balance between the players.

Performances analysis of football matches (축구경기의 경기력분석)

  • Min, Dae Kee;Lee, Young-Soo;Kim, Yong-Rae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2015
  • The team's performances were analyzed by evaluating the scores gained by their offense and the scores allowed by their defense. To evaluate the team's attacking and defending abilities, we also considered the factors that contributed the team's gained points or the opposing team's gained points? In order to analyze the outcome of the games, three prediction models were used such as decision trees, logistic regression, and discriminant analysis. As a result, the factors associated with the defense showed a decisive influence in determining the game results. We analyzed the offense and defense by using the response variable. This showed that the major factors predicting the offense were non-stop pass and attack speed and the major factor predicting the defense were the distance between right and left players and the distance between front line attackers and rearmost defenders during the game.

An Application of Quantum-inspired Genetic Algorithm for Weapon Target Assignment Problem (양자화 유전자알고리즘을 이용한 무기할당)

  • Kim, Jung Hun;Kim, Kyeongtaek;Choi, Bong-Wan;Suh, Jae Joon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.260-267
    • /
    • 2017
  • Quantum-inspired Genetic Algorithm (QGA) is a probabilistic search optimization method combined quantum computation and genetic algorithm. In QGA, the chromosomes are encoded by qubits and are updated by quantum rotation gates, which can achieve a genetic search. Asset-based weapon target assignment (WTA) problem can be described as an optimization problem in which the defenders assign the weapons to hostile targets in order to maximize the value of a group of surviving assets threatened by the targets. It has already been proven that the WTA problem is NP-complete. In this study, we propose a QGA and a hybrid-QGA to solve an asset-based WTA problem. In the proposed QGA, a set of probabilistic superposition of qubits are coded and collapsed into a target number. Q-gate updating strategy is also used for search guidance. The hybrid-QGA is generated by incorporating both the random search capability of QGA and the evolution capability of genetic algorithm (GA). To observe the performance of each algorithm, we construct three synthetic WTA problems and check how each algorithm works on them. Simulation results show that all of the algorithm have good quality of solutions. Since the difference among mean resulting value is within 2%, we run the nonparametric pairwise Wilcoxon rank sum test for testing the equality of the means among the results. The Wilcoxon test reveals that GA has better quality than the others. In contrast, the simulation results indicate that hybrid-QGA and QGA is much faster than GA for the production of the same number of generations.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling (MITRE ATT&CK 기반 사이버 공격 목표 분류 : CIA 라벨링)

  • Shin, Chan Ho;Choi, Chang-hee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.15-26
    • /
    • 2022
  • Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family and the subjects of the attack based on malware signature. Unfortunately, attackers can easily masquerade as other group. Also, as the attack varies with subject, techniques, and purpose, it is more effective for defenders to identify the attacker's purpose and goal to respond appropriately. The essential goal of cyberattacks is to threaten the information security of the target assets. Information security is achieved by preserving the confidentiality, integrity, and availability of the assets. In this paper, we relabel the attacker's goal based on MITRE ATT&CK® in the point of CIA triad as well as classifying cyber security reports to verify the labeling method. Experimental results show that the model classified the proposed CIA label with at most 80% probability.

A Comparative Study on the Relationship between Organizational Culture, Strategic Activities and Export Performance of Manufacturing SMEs based on the Type of Strategies (중소 제조기업의 전략 유형에 따른 조직문화, 전략적 활동, 수출성과의 관계 비교)

  • Cho, Yeon Sung
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.307-327
    • /
    • 2016
  • This study was conducted to investigate the role of the type of strategies on the relationship organizational culture, strategics activities and the export performance of manufacturing SMEs. This study analyzed the moderated effects of type of strategies between the organizational culture, strategic activities and the export performance of SMEs. This study suggested 20 questions latent variables based on existing research. Organizational culture were divided into adhocracy culture and market culture and strategy types were divided into prospectors and defenders. The sample SMEs be analyzed were 200 firms. The 7 hypotheses including moderated effects were analyzed by using LISREL as structural equation modeling. In the result of empirical analysis, the adhocracy culture indicates a positive effect on customer relationship building activities but product quality assurance activities was not significant. Market culture showed a positive impact on both customer relationship building and quality assurance activities. This study conducted multi-group analysis for the purpose of the moderated effects of type of strategies. Multi-group analysis results showed that there are difference effects between the relationship of adhocracy culture, customer relationship building activities and product quality assurance activities. In addition, the group choice adhocracy culture based on the prospectors strategy had a greater impact than the market culture group on the relationship building activities and export performance.

  • PDF