• Title/Summary/Keyword: defensive measures

Search Result 19, Processing Time 0.028 seconds

The Relationship between Personality Trait of Venture CEO and Corporate Strategy (벤처기업 최고경영자의 성격특성과 경영전략간의 관계)

  • 임창희;김영천
    • The Journal of Information Technology
    • /
    • v.4 no.2
    • /
    • pp.51-68
    • /
    • 2001
  • This study integrates personality trait theory to empirically Investigate the corporate strategy in Korean venture firms. This study predicts that type A/B, locus of control(internal/external), and risk-taking/avoiding will be positively associated with corporate strategy selection. Corporate strategy selection consists of aggressive entry strategy and defensive niche market strategy. Data obtained from a survey of 87 venture business firms is used to construct final variable measures and test the hypothesized relationships. The statistical result shows that type A, internal, and risk-taking CEOs positively associated with aggressive entry strategy, and type B, external, and risk-avoiding CEOs positively associated with defensive niche market strategy. Additional analysis(multiple regression model) to test relatively importance of independents is used.

  • PDF

A Study on Sexual Desire Outburst of the Male Elderly Residents Experienced by the Workers in Living Facilities (생활시설 종사자가 경험한 남성노인의 성적욕구 표출에 관한 연구)

  • Lee, In-Soo
    • Journal of Families and Better Life
    • /
    • v.26 no.1
    • /
    • pp.31-49
    • /
    • 2008
  • This study has been performed to explore verbal and behavioral expression of sexual desires among male elderly residents who have been living in long tenn care facilities. There are three topics covered in this study; first, in what situations and how seriously do care workers encounter expression of sexual desires of the elderly residents? Second, what kind of negative consequences do they believe those sexual behaviors will lead to? Third, how can we implement defensive measures against the sexual behaviors? In this study, twenty three care workers working full time in five retirement and care facilities were asked about their experience and perception of the above study agendas, and answers of the qualitative interview were drawn as follow; first, the elderly residents apparently show a variety of sexual harassment and provoking behaviors such as sticking to specific women, physically touching and attacking, and induce obscenely activities against female residents, care workers, and volunteer visitors. Second, their sexual behaviors are often influenced by their isolated and abandoned emotionality as well as living situation in rural areas. Third, their sexual behaviors often critically affect care work plan and facility managements by severely discouraging female care givers and community supporters. Therefore in this study, suggestions and defensive measures were made as follows: first, education and counselling programs toward female workers and volunteers need to be developed, and the programs should cover psychological and behavioral mechanism of sexuality in later life. Second, self control plans need to be empowered toward the elderly residents; in the plans, the elderly residents shall be encouraged to evaluate primary cause and proper solutions of sexual behaviors of their peering residents. Third, combination of healthy housing and care facilities for frail elderly need to be integrated in a neighboring location, so that when residents and workers encounter extreme episodes of sexuality of healthy residents in a housing facility, the problematic sexual residents are partially transferred into a neighboring care facility and thereafter other residents and cafe givers are relieved from stressful contacts with the extremely sexual residents.

The Monitoring Effects of Institutions, Outside Directors, and Outside Blockholders on Manager's Decision: The Case of Antitakeover Measures Adoption (경영자의 의사결정에 있어서 기관투자가, 비상임이사, 외부 대주주의 감시효과: 반인수조치 채택사례분석)

  • Choo, Hyun-Tai
    • The Korean Journal of Financial Management
    • /
    • v.11 no.1
    • /
    • pp.263-284
    • /
    • 1994
  • This study examines the monitoring effects of institutions, outside directors, and outside blockholders by seeing managers' selection of antitakeover measures. In this paper, we hypothesize that managers use antitakeover techniques to entrench themselves when they are not monitored closely. Consequently, we hypothesize that institutional ownership, outside membership on board of directors, outside directors ownership, and outside blockholder ownership are less in firms which adopt harmful antitakeover measures. This paper analyzes whether the degree of monitoring by institutions, outside directors, and outside blockholders influences managers' adoption of different types of takeover defenses. We find interesting empirical results. First, aggregate institutional ownership is positively correlated with the likelihood of antitakeover techniques adoption. This result implies that institutional investors are passive. Second, total and active blockholder owner-ship is higher at firms that do not propose any defensive tactics. passive blockholder owner-ship is highest at fair price firms but low at poison pills firms. Ownership concentration by outside investors increases monitoring and reduces agency problems. Thirid, outside board monitoring is ineffective.

  • PDF

제조업 유통경로관리 특성과 개선방향

  • 박윤재
    • Journal of Distribution Research
    • /
    • v.1 no.1
    • /
    • pp.65-81
    • /
    • 1996
  • Despite the impressive economic growth over the past several decades, Korea's distribution sector has remained quite underdeveloped. Until recently, management of the marketing channels also has been staying at an unsophisticated level. The Korean marketing channel system is largely characterized by 1) undifferentiated channel types among the competing manufacturers, 2) dominance by the manufacturers over the other channel members, 3) high level of conflicts among the channel members, 4) inefficient marketing information system, and 5) lack of managers properly trained in channel operation and management. Currently, major change factors emerged and has begun to directly affect the Korean marketing channel system. The most salient changes surrounding the Korean marketing channel system are 1) complete opening of the marketing channels for the foreigners, 2) emergence and spread of new types of channels 3) adoption of advanced information technology by the various channel members, 4) increase in flexibility in production and supply systems, 5) shift of power toward the retailers away from the manufacturers, 6) growing trend for cooperation and alliance among the traditional marketing institutions. To these changes the manufacturers have been reacting, rather than proacting, mostly using defensive measures. The proactive measures that are recommended on behalf of the manufacturers include 1) installation of the strategic channel management system, 2) development of the skills for efficient interorganization management, 3) investing in efficient system for marketing information and logistics management, 4) more efficient management of brands, and 5) maintenance of price-competitiveness.

  • PDF

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.

Korean Firms' Intellectual Property Rights Protection Strategies to Deter Counterfeiting and Brand Piracy in Global Markets (한국기업의 해외시장에서의 위조상품 대응전략에 관한 연구)

  • Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.351-374
    • /
    • 2007
  • Recently, there has been rapid and spectacular increase in world wide counterfeiting and other forms of piracy. According to the World Customs Organization(WCO), counterfeiting accounts for 5 to 7 percent of global merchandise trade, equivalent to lost sales of as much as US$512 billion last year. Also Korean firms' damages arising from the infringement of intellectual property rights in global markets, especially in China market, are increasing. However, the existing studies on the intellectual property rights(IRP) protection have mainly focused on legal protection. Because the law is often not the best defense against theft of intellectual property rights, we must develop more effective defensive weapons for protection of IRP. Given this troublesome trend, the intention of this paper is to discuss strategic and tactical efforts, including legal protection, that can serve as proactive measures to deter counterfeiting and thus to assure the protection of Korean firms' intellectual property rights.

  • PDF

A Survey on Defensive Measures Against Spectre Attacks (스펙터 공격에 대한 방어 연구 동향)

  • Ji-Yeon Yang;Jin-Soo Jang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.347-349
    • /
    • 2024
  • 스펙터(Spectre) 공격은 CPU 최적화 기법인 예측 실행의 취약점을 악용한다. 이를 통해 프로그램의 정상적인 실행 흐름상 접근할 수 없는 데이터를 부채널을 통해 유출할 수 있다. 예측 실행 기법이 적용된 CPU 는 해당 취약점에 노출되어 있으며, 계속해서 새로운 변종 공격이 발견되고 있다. 지금까지 다양한 방어 기법들이 연구되어 왔고 새로 발견되는 변종 공격에 대응하기 위한 연구도 지속적으로 이루어지고 있다. 본 논문에서는 다양한 스펙터 방어 기법에 대한 연구 동향을 기술하고 향후 연구 방향을 제시한다.

North Korean WMD Threats and the future of Korea-China Relations (북한 핵문제와 한·중 관계의 미래)

  • Shin, Jung-seung
    • Strategy21
    • /
    • s.39
    • /
    • pp.114-139
    • /
    • 2016
  • Korea and China are neighboring countries with close contacts in many areas from long time ago, and have shared interests in maintaining peace and stability on the Korean Peninsula, and in deepening economic relationship which has been mutually complementary in their nature. Therefore their bilateral relations has been developed at a remarkable pace to the extent that it can't be better than now. However, the differences in their responses to North Korean nuclear test and ensuing long-range ballistic missile test-fire and the Chinese strong concern on the possible deployment of THAAD (Terminal High Altitude Air Defence) anti-missile system in Korea show that there are some weaknesses in their relations. For example, Korea is not still confident that China would fully implement the sanction measures contained in the UNSC resolution and I argue that Chinese proposal of parallel negotiation of the denuclearization and the replacement of Korean armistice with the Peace Agreement is not much persuasive. In THAAD issue, if Korea comes to conclusion in the future that THAAD is the most effective way to counter North Korean threats, Korea should make every efforts to assure China that Korea-US alliance is not targeting China, and the THAAD is a defensive system, not damaging Chinese security. In the longer-term, deepening strategic distrust and competition between the US and China in this part of East Asia, changing nature of economic cooperation between Korea and China, and the revival of 'great country mentality' by Chinese people together with the rising nationalism in both Korea and China would cast shadow on Korea-China relation in the years ahead, unless properly handled. In this regard, I suggest that the security communications between the two countries be further strengthened, and the tri-lateral dialogue channel be established among the three countries of Korea, the US and China, particularly on North Korean issues. I also suggest the new pattern of economic cooperation be sought, considering the changing economic environment in China, while strengthening the efforts to understand each other through more interactions between the two peoples.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF