• Title/Summary/Keyword: security independent behavior

Search Result 25, Processing Time 0.029 seconds

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

Conceptual Data Modeling: Entity-Relationship Models as Thinging Machines

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.247-260
    • /
    • 2021
  • Data modeling is a process of developing a model to design and develop a data system that supports an organization's various business processes. A conceptual data model represents a technology-independent specification of structure of data to be stored within a database. The model aims to provide richer expressiveness and incorporate a set of semantics to (a) support the design, control, and integrity parts of the data stored in data management structures and (b) coordinate the viewing of connections and ideas on a database. The described structure of the data is often represented in an entity–relationship (ER) model, which was one of the first data-modeling techniques and is likely to continue to be a popular way of characterizing entity classes, attributes, and relationships. This paper attempts to examine the basic ER modeling notions in order to analyze the concepts to which they refer as well as ways to represent them. In such a mission, we apply a new modeling methodology (thinging machine; TM) to ER in terms of its fundamental building constructs, representation entities, relationships, and attributes. The goal of this venture is to further the understanding of data models and enrich their semantics. Three specific contributions to modeling in this context are incorporated: (a) using the TM model's five generic actions to inject processing in the ER structure; (b) relating the single ontological element of TM modeling (i.e., a thing/machine or thimac) to ER entities and relationships; and (c) proposing a high-level integrated, extended ER model that includes structural and time-oriented notions (e.g., events or behavior).

Does Gender Influence Investment Choice? A Psychosomatic Study of GCC Entrepreneurs

  • KHAN, Mohammed Abdul Imran;JAMIL, Syed Ahsan;KHAN, Shahebaz Sarfaraz;ALI, Meer Mazhar
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.4
    • /
    • pp.299-306
    • /
    • 2022
  • Entrepreneurs with behavioral finance biases are more likely to make irrational or financially detrimental decisions. Understanding financial behavior biases can assist in making sound financial decisions. Behavioral finance is a new topic that can assist researchers in better understanding investor behavior and preferences while purchasing and selling stocks. Using measures such as independent t-tests and average Likert five-point scale scores, this study seeks to determine how entrepreneurs make investment decisions and whether gender makes a difference. The study is empirical, and data from 1000 entrepreneurs were collected through convenience sampling. The study's main findings show that there are numerous factors to consider while investing in stocks, including family planning, children's education, investment security, and recurring income. Both men and women attempt to invest in many asset classes, but certain investments are extremely risky, while others are low risk. As a result, investors should assess risk based on their age and experience rather than their gender; this indicates that an investment in venture capital has nothing to do with gender but everything to do with the investor's age.

A Study on the Factors Affecting Use Behavior of Cloud-based Common Collaboration Platform (클라우드 기반 공통협업플랫폼의 사용행동에 영향을 미치는 요인에 관한 연구)

  • Kim, San-Hae;Lee, Hong-Jae;Han, Kyeong-Seok;Kwon, Tae-Hyun
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1151-1160
    • /
    • 2018
  • The study has been derived through the empirical analysis so as to find the usage behavior of cloud-based common collaboration platform. Independent variables of the cloud-based platform have been selected as flexibility, reliability, versatility, security and interaction, which have been selected by utilizing UTAUT theory. After selecting the use intent as a parameter, usage behavior was been finally selected as a dependent variable. The firm type was used as a control variable. We used AMOS 23.0 and SPSS 23.0 statistical programs for the hypothesis test and distributed the questionnaires to users using the cloud-based common collaboration platform. Then, a total of 180 copies from distributed questionnaires were used for the analysis. The results showed that reliability, security and interaction had a positive effect on intention to use. On the other hand, flexibility and versatility did not affect intention to use positively. Finally, it was verified that the intention to use had a positive effect on the use behavior. At last, it showed that there is a moderation effect according to the type of company.

An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism (국내 자생테러 대응을 위한 원-스톱 감시 및 추적 시스템 설계)

  • Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.89-96
    • /
    • 2021
  • In recent years, the fear of terrorism due to 'Lone Wolf' terrorism is spreading in the United States and Europe. The lone wolf terrorism, which carries out terrorism independently, without an organization behind it, threatens social security around the world. In Korea, those who have explosive national/social dissatisfaction due to damage caused by national policies, and delusional mental disorders can be classified as potential 'Lone Wolf' terrorists. In 'Lone Wolf' terrorism, unlike organized terrorism, it is difficult to identify signs of terrorism in advance, and it is not easy to identify terrorist tools and targets. Therefore, in order to minimize the damage caused by 'Lone Wolf' terrorism, it is necessary to architect an independent monitoring and tracking system for the police's quick response. In this paper, we propose to architect response system that can collect information from organizations that can identify the signs of potential 'Lone Wolf' terrorism, monitor the continuity of abnormal behavior, and determine the types of 'Lone Wolf' terrorism that can happen as continuous abnormal behaviors.

Towards Integrating the Knowledge Management Mechanisms to Employ Innovation Factors within Universities: Critical Appraisal Study

  • Alsereihy, Hassan Awad M.;Harasani, Meshal Hesham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.327-341
    • /
    • 2021
  • The knowledge management was considered as the inevitable result of the rule of knowledge in this era, and its importance became clear in being the main source for achieving success, the need to consider and manage knowledge as an independent field that must be addressed with a clear scientific methodology has become intangible - they are very valuable and a strategic asset. On the other hand, the innovation process relates to all parts of the organization, and helps to improve the behavioral patterns of individuals and their attitudes towards adopting modern and innovative ideas, it is a purposeful process adopted by the senior management and works to provide the capabilities and requirements for embodying the innovative behavior in it. In the field of dealing with the market, it is a product of the organization's innovative approach, which aims at advancement, change, and intended and organized renewal. The main objective of this article is to determine the most appropriate ways to integrate knowledge management mechanisms to employ innovation factors within universities based on the role of universities in supporting innovation. This was achieved through reviewing many relevant research and listing the most prominent concepts of knowledge management, its importance, objectives, and processes determining the stages of knowledge management application, the requirements for applying knowledge management, and the obstacles that impede its application; Then the statement "Innovation in universities, through which it addressed the concept of innovation, its importance, stages, and requirements for its application, as well as identifying the most prominent models of innovation, and obstacles to innovation, in addition to that the role of universities in supporting innovation will be identified. From the surveyed study done in this article, we concluded that the relationship among organizational culture, knowledge management and innovation capability can provide useful insights for managers regarding developing a strong culture, promote knowledge management practices effectively and eventually enhance the whole organization's innovation capability. Also, we found that different components of Knowledge Management as Knowledge activities, Knowledge types, transformation of knowledge and technology have a significant positive effect in bringing innovation through transformation of knowledge into knowledge assets in universities.

A Study on Affordance Dimensions of Digital Services for the Elderly through the Analysis of Senior Adults' Daily Activities

  • Park, Soobeen
    • Architectural research
    • /
    • v.10 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • Designing environments for the elderly includes studying changes in the elderly themselves, changes in their environment, and changes in the intercommunication between the elderly and their environment. The purpose of this study is to provide guidelines for a ubiquitous environment in which seniors can "age in place," using an environment-behavioral approach. 305 subjects aged 45 to 78 take part in the survey research. Temporal sequence (age groups) and behavior (daily activities) are considered as the significant variables to design digital services for the elderly in the perspective of an environment-behavioral approach. Several conclusions can be made. (1) The characteristics of subjects in the over-65 age group shows that they manage an independent lifestyle even if they realize some body functions deteriorate as they age. (2) Over-65 age group is more engaged in healthcare and pastime activities. The male subjects of it are most inactive. (3) The IDA (importance of daily activities) and FDA (frequency of daily activities) are classified by five to six factors in each group. The IDA and FDA of the group aged over 65 differ from other age groups. (4) Five affordance dimensions of digital services for the elderly are proposed: Healthcare, Domesticity, Mobility & Security, Network, and Recreation & Pastime. These affordance dimensions will help research groups or companies design ubiquitous environments to enhance the quality of life of seniors.

Behavioral Intention and Behavior for Hepatitis B Vaccination in Rural Residents (농촌지역 주민들의 B형 간염 예방접종 의도 및 행동)

  • Oh, Suk-Jeong;Kam, Sin;Han, Chang-Hyun
    • Journal of agricultural medicine and community health
    • /
    • v.27 no.1
    • /
    • pp.125-142
    • /
    • 2002
  • This study was carried out to purpose drawing up the efficient method of rural residents' health management, analyzing factors having influences on the behavioral intention and the behavior of hepatitis B vaccination of rural residents, using the theory of planned behavior(TPB). Surveying the first questionnaire about TPB to 439 people of rural adults over 40-year old who participated to hepatitis B examination program was made from March 14 to April 23 in 2001 at two primary health care posts in a city in Gyeongsangbuk-do and the second survey for hepatitis B vaccination was made to the last subjects of 332 people(75.6%) that had been proved as subjects of inoculation against the hepatitis B as the result of examination after two months of notification. In the behavioral intention rate of hepatitis B vaccination of the subjects within a month, 100%(the top) was 45.2%, 80-90%(the middle) was 21.1% and under 70%(the low) was 33.7%. In simple analysis, vaccination intention was related with significantly health security type and economic status(p<0.05). And vaccination intention was related with significantly all variables of attitude toward behavior and subjective norm, and economic power of utilizing medical facilities and perceived power variable of perceived behavioral control(p<0.01). The vaccination rate of the subjects within a month was 31.3%. In simple analysis, the vaccination rate was higher significantly in the lower the age was, the higher the educational level was(p<0.01), the larger the family was, and subjects having transport(p<0.05). And the vaccination rate was higher in the higher the economic power was and the higher the perceived ability was. As the results of making generalized logit analysis for behavioral intention, the more positive the subjective norm was, the higher was the score of the perceived behavioral control, the intention was higher significantly in the top class on a basis of the low class of behavioral intention. In multiple logistic regression analysis for vaccination(behavior) using intention and perceived behavioral control as dependent variables, it showed that perceived behavioral control variable only influenced significantly. The higher was the score of perceived behavioral control, it showed that they got the more vaccination(p<0.01). And even in the result having analyzed, adding the significant general characteristics variables in the simple analysis to the independent variable, the higher was the score of perceived behavioral control, it showed that they got vaccination more.

  • PDF