• 제목/요약/키워드: threat

검색결과 2,797건 처리시간 0.03초

기계의 정체성 위협에 대항하기: 집단 가치 확인이 인간의 지적 수행 저하에 미치는 효과 (Combating Identity Threat of Machine: The effect of group-affirmation on humans' intellectual performance loss)

  • 차영재;백소정;이형석;배종훈;이종호;이상훈;김건희;장대익
    • 인지과학
    • /
    • 제30권3호
    • /
    • pp.157-174
    • /
    • 2019
  • 인공 지능으로 인한 정체성 위협은 지능 과제에 대한 동기 및 수행을 저해할 수 있다. 본 연구는 실험기법을 활용하여 개인의 지능 과제 수행 저하 현상이 인공 지능으로 인한 위협에 노출됨으로써 나타나는지 조사하였다. 또한 본 연구는 집단 정체성 확인(group identity affirmation)이 과제 수행 저하 현상을 완화해줄 수 있는지 확인하였다. 구체적으로, 인공지능 위협이 높은 조건에서는 낮은 조건에서보다 지적 과제 수행이 낮을 것으로 예측하였다. 또한 이와 같은 수행 저하 효과는 집단 확인 조건에서 나타나지 않을 것으로 예측하였다. 대학생 참가자 210명을 대상으로 실험 연구를 시행하여 예상과 일관된 결과를 발견하였다. 인공지능으로 인한 정체성 위협은 참가자의 지적 과제 수행을 떨어뜨렸으며, 이와 같은 수행 저하 현상은 집단가치 비 확인 조건에서 발견됐지만 집단 가치 확인 조건에서는 발견되지 않았다. 논의에서는 이론적 실용적 함의를 다루었다.

폐경 후 여성의 낙상예방행위 예측모형 (A Predictive Model of Fall Prevention Behaviors in Postmenopausal Women)

  • 장현정;안숙희
    • 대한간호학회지
    • /
    • 제44권5호
    • /
    • pp.525-533
    • /
    • 2014
  • Purpose: This study was done to propose and test a predictive model that would explain and predict fall prevention behaviors in postmenopausal women. The health belief model was the theoretical basis to aid development of a nursing intervention fall prevention program. Methods: Data for 421 postmenopausal women were selected from an original data set using a survey design. The structural equation model was tested for 3 constructs: modifying factors, expectation factors, and threat factors. Expectation factors were measured as relative perceived benefit (perceived benefit minus perceived barrier), self-efficacy, and health motivation; threat factors, as perceived susceptibility (fear of falling) and perceived severity (avoiding activity for fear of falling); and modifying factors: level of education and knowledge about fall prevention. Data were analyzed using SPSS Windows and AMOS program. Results: Mean age was 55.7 years (range 45-64), and 19.7% had experienced a fall within the past year. Fall prevention behaviors were explained by expectation and threat factors indicating significant direct effects. Mediating effect of health beliefs was significant in the relationship between modifying factors and fall prevention behaviors. The proposed model explained 33% of the variance. Conclusion: Results indicate that fall prevention education should include knowledge, expectation, and threat factors based on health belief model.

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.

보안 위험분석을 위한 안정성 평가 시스템 설계 및 구현 (Design and implementation on Safety assesment system for security threat analyzing)

  • 조경식
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권2호
    • /
    • pp.333-339
    • /
    • 2007
  • 대부분의 조직에서 정보시스템의 의존도가 높아짐에 따라 정보시스템 보안 사고에 대한 위험이 증가하고 있다. 본 논문에서는 정보보호관리체계와 위험분석방법을 적용하여 보안 위험분석을 위한 안정성 평가시스템을 설계 및 구현하였다. 또한, 위험평가 시 동일한 가중치를 적용한 평가와 조직의 특성에 따라 보안요소의 가중치를 가변적으로 적용한 평가를 할 수 있도록 하였으며 각 조직이 자체적으로 보안 점검을 할 수 있도록 설계함으로서 관리 측면에서 취약점을 쉽게 찾을 수 있도록 지원하며. 안정성 확보를 위하여 수행해야 할 권고를 제시한다.

  • PDF

인터넷 환경에서의 비정상행위 공격 탐지를 위한 위협관리 시스템 (Threat Management System for Anomaly Intrusion Detection in Internet Environment)

  • 김효남
    • 한국컴퓨터정보학회논문지
    • /
    • 제11권5호
    • /
    • pp.157-164
    • /
    • 2006
  • 최근에는 대부분의 인터넷 공격은 악성코드(Malware)에 의한 잘 알려지지 않은 제로데이 공격 형태가 주류를 이루고 있으며, 이미 알려진 공격유형들에 대해서 탐지하는 오용탐지 기술로는 이러한 공격에 대응하기가 어려운 실정이다. 또한, 다양한 공격 패턴들이 인터넷상에 나타나고 있기 때문에 기존의 정보 보호 기술로는 한계에 다다르게 되었고, 웹기반 서비스가 보편화됨에 따라 인터넷상에 노출된 웹 서비스가 주공격 대상이 되고 있다. 본 논문은 인터넷상의 트래픽 유형을 분류하고, 각 유형에 따른 이상 징후를 탐지하고 분석할 수 있는 비정상행위공격 탐지기술(Anomaly Intrusion Detection Technologies)을 포함하고 있는 위협관리 시스템(Threat Management System)을 제안한다.

  • PDF

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • 산경연구논집
    • /
    • 제12권12호
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

지대공 미사일 배정 문제의 다항시간 탐욕 알고리즘 (Polynomial-time Greedy Algorithm for Anti-Air Missiles Assignment Problem)

  • 이상운
    • 한국인터넷방송통신학회논문지
    • /
    • 제19권3호
    • /
    • pp.185-191
    • /
    • 2019
  • 현대전에서는 다중 적기 편대가 침공할 경우 이를 무력화시키기 위해 지대공미사일 발사포대의 미사일로 효과적이면서도 빠르게 위협을 최소화시키는 전략이 필수적이다. 이 문제에 대해 Pan et al.은 유전자 알고리즘을 적용하여 해를 구하고자 하였으나 최적 해를 구하는데 실패하였다. 본 논문에서는 각 미사일 발사포대 가용 미사일의 75%로 고위협 목표물을 우선하여 파괴시키는 전략으로 초기 실현 가능 해를 구하였다. 다음으로 각 발사포대에 배정된 미사일 1발을 감소시켜 총 위협을 보다 감소시킬 수 있는 다른 목표물로 이동시키는 최적화 기법을 제안하였다. 실험 결과 제안된 알고리즘은 다항시간 수행 복잡도의 탐욕 알고리즘임에도 불구하고 메타휴리스틱 기법인 유전자 알고리즘에 비해 해를 개선하는 결과를 얻었다.

레이저빔을 이용한 펄스변조 적외선탐색기 기만 (Laser-based Jamming of a Pulse Modulated Infrared Seeker)

  • 김성재;정춘식;신용산
    • 한국군사과학기술학회지
    • /
    • 제22권2호
    • /
    • pp.179-188
    • /
    • 2019
  • Laser beam is directional and small in divergence angle so that it is well qualified to deliver high intensity infrared energy into a coming MANPADS threat for aircraft survivability. The threat will be deceived and loose tracking of a target when it is exposed to the laser beam modulated relevant to the track mechanism of the threat. The laser beam goes through scattering inside the seeker of the threat and reach the detector in a stray light form, which is a critical phenomenon enabling jamming of the seeker. The mechanism of the laser beam based jamming against a pulse modulated infrared seeker is shown. Simulations are carried out to support the understanding of how the jam technique works.

The Impacts of Threat Emotions and Price on Indonesians' Smartphone Purchasing Decisions

  • PRADANA, Mahir;WISNU, Aditya
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권2호
    • /
    • pp.1017-1023
    • /
    • 2021
  • This research aims to determine the effect of customers' threat emotion and price on the decision to purchase a certain smartphone product. This study uses a quantitative method with a type of descriptive and causal research. It employs non-probability sampling with purposive sampling, with 385 respondents to answer the questionnaires. Data analysis techniques used descriptive analysis and multiple linear regression analysis. Based on the results of descriptive analysis of emotion, price and purchasing decisions are in sync with each other. The results of multiple linear regression analysis techniques indicate the threat emotion and brand trust are influential against the positive decision to purchase smartphone products. The magnitude of the influence of emotions and price have simultaneous effect on purchasing decisions and other decision variables, which are not included in this study, also play minor role in determining purchase intention, such as product quality, brand image and others. Partially, threat emotion and brand trust have a positive effect toward purchasing decisions. The magnitude of the highest influence was the one of price, then followed by emotional threats. The findings of this study suggest that psychological and behavioral effects also play important roles in determining customers' purchase decision.

다양성보호계통 사이버보안 연계 위협 분석 방안 (An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제17권1호
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.