• Title/Summary/Keyword: threat degree

Search Result 90, Processing Time 0.02 seconds

An Empirical Study on Factors that determine on Success Factors of Total Quality Management Implementation (지속적인 종합적 품질경영(TQM) 실행의 결정요인에 관한 연구)

  • 서창적;김재환
    • Journal of Korean Society for Quality Management
    • /
    • v.27 no.3
    • /
    • pp.1-16
    • /
    • 1999
  • According to the study of TQM implementations, the odds that an organization will successfully implement total quality management are two to one-against it. Based on the Brown's study, two thirds of all TQM implementations are dropped or fail altogether. However, organizations armed with knowledge of the factors that have the biggest impact on their success can take steps to influence or change those factors. In this paper, we studied on the degree of influence between those factors and successful start up and alignment factors. Based on extensive literature reviews those factors, threat, commitment, plan, progress and strategy are determined. Also we determine the successful start up and alignment factors. A framework of research including above factors is developed and tested statistically The Perceived data are collected from managers of quality departments of 141 Korean firms through survey. The results show that the rating of those factors which determine success of implementing TQM is progress, commitment, strategy and progress. But the factor of threat shows negative influence for the success of implementing TQM.

  • PDF

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

The EU-Korea FTA in the Viewpoints of the New Member States (신 회원국의 관점에서의 한-EU 자유무역협정)

  • Utai, Uprasen
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.3-30
    • /
    • 2011
  • When the European Union countries (EU27) are viewed as the composition between the old member countries (EU15) and the new member states (NMS12), the statistics exhibit that the EU15 is the largest trade partner of the NMS12. According to the Korea-EU FTA agreement, the existing patterns of trade among the EU15, the NMS12, and Korea may create not only the increase in trade opportunity between the NMS12 and Korea, but also the higher rivalry threat on export from the NMS12 to the EU15 destination due to the potential increase in export from Korea to the EU15 market. This research examines in both potential impacts at the 3-digit level of SITC Rev.3 industry, in the point of view of the NMS12. Various conventional trade indices are employed in the study. However, the existing trade index exhibits the limitation for measuring the different degree of rivalry threat on exports of two different exporters in the same export destination. Hence, this study develops a new trade index, the so-called Rivalry Threat Index (RTI), to measure the export competition between the NMS12 and Korea in the EU15 destination. The results indicate that from the point of view of the NMS12, the EU-Korea FTA agreement may cause Korea acts as a trade partner and as an export competitor simultaneously.

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

Contribution of Ecological Surveys to Coastal Conservation: A Case in Soft Shore Study

  • Tai, K. K;Cheung, S.-G;Shin, P.-K.-S.
    • The Korean Journal of Ecology
    • /
    • v.27 no.3
    • /
    • pp.127-131
    • /
    • 2004
  • Soft shores are particularly vulnerable to human exploitation; however, they exhibit a variety of habitats which provide refuge for a diversity of flora and fauna. This study describes a survey of 13 soft shores in Hong Kong with information on species diversity, sediment characteristics, shore extent, pollution threat, degree of naturalness, linkage with other ecological habitats, and degree of social/economic importance. Data collected were subjected to multivariate statistical analyses, so as to identify shores that have significant ecological status and conservation value for management purposes.

An Empirical Study on the Factors Influencing User Resistance to ERP : Focused on the Vietnam Users (ERP에 대한 사용자 저항의 영향 요인에 관한 실증적 연구 : 베트남 사용자를 중심으로)

  • Kim, Hongkeun;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.127-158
    • /
    • 2015
  • This study analyzes the factors affecting user resistance to ERP in Vietnam, including the factors related to the cultural values of the users, which is rarely dealt in the previous ERP research. A research model is developed based on Klaus and Blanton [2010] and Hofstede [2011], consisting of the independent variables ('cultural value', 'system', 'organization', and 'process' related variables), a dependent variable ('user resistance to ERP') and a moderating variable ('self efficacy'). Major results of study include (1) users with high degree of uncertainty avoidance and femininity regard ERP as potential threat to their job and are likely to resist to ERP; (2) By training the users with high level of femininity to enhance their self efficacy, the degree of resistance to ERP can be reduced; (3) For ERP to be utilized successfully, systems should be developed in such a way in which working with ERP is not regarded as complex and difficult; and (4) communication and training play an important role in reducing the resistance of users.

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory (언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로)

  • Lee, Seohyun;Lee, Saerom;Kwak, Dong-heon
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.45-64
    • /
    • 2022
  • With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

Factors influencing weight control behavior and intention of obese children and adolescents (비만아동 및 청소년의 체중조절 경험과 비만관리 의도에 영향을 미치는 요인)

  • Kang, Yun-Ju;Sohn, Myong-Sei;Jin, Ki-Nam;Kim, Han-Joong;Oh, Hee-Choul;Suh, Sung-Jae
    • Journal of Preventive Medicine and Public Health
    • /
    • v.31 no.2 s.61
    • /
    • pp.199-214
    • /
    • 1998
  • This study was undertaken to explain weight control behavior and intention of obese children and adolescents as measured by the elements of the health belief model. A total of 732 obese students from 28 schools in Seoul metropolitan area and their mothers were assessed with a self-administered questionnaire. The analyzed results are as follows; 1. Among obese students, 45.3% of male students and 57.2% of female students, a significantly higher portion than male students, reported that they had tried to lose weight within the recent year. Exercise was the most frequently used method to lose weight followed by diet control, drug use, and specialized clinic visits, in descending order. 2. Male students were more likely to try to lose weight if they perceived a low threat level and their mother had a job, and female students were more likely to try to lose weight if they were younger in age, perceived a low threat level and had strong external motivating factors. 3. Female students showed a significantly higher level of intention to obesity control than male students, and the intention level of their mothers also showed the same trend. 4. In male students, the degree of weight dissatisfaction, weight control experience, the level of obesity related beliefs of students, the educational level of the mother and economic status of the family were significant predictors of intention to obesity control, and in females, age, the level of obesity related beliefs of students and intention of their mothers were significant. In the mothers of male students, obesity index of students, age of the mother and the level of obesity related beliefs of the mother were significant predictors of intention of the mother, and in the mothers of female students, obesity index of students, occupational status of the mother and obesity related beliefs of the mother were significant. 5. According to the path model of intention to obesity control, the degree of weight dissatisfaction had the most powerful effect in male students, and perceived net benefit level was the most important variable in female students. Since the weight control behavior and intention of obese students were more predictable by the degree of weight dissatisfaction than the obesity index, we can conclude that only the students dissatisfied with their weight are well motivated for obesity control. There can be a discrepancy between the mother and her child's beliefs and intention status(especially in male students), so the therapists should also assess the student's opinion as well as the mother's. In female students, the perceived net benefit level wag the most important predictor of intention to obesity control, therefore the intervention program should pay particular attention to the positive benefits of weight control rather than negative aspects(threats) of obesity.

  • PDF

Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons (북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.325-354
    • /
    • 2013
  • The concept of national security and the fundamental system for crisis management have departed from traditional methods and the importance of a national critical infrastructure crisis management has been emphasized. A national critical infrastructure crisis means a situation where human resource, material and functional system that may have a material effect on the critical functions of the government, the vitality and integrity of society, national economy and the safety of the public becomes disabled due to causes such as terrorism or major disasters. Although North Korea had been subject to numerous rounds of negotiations and sanctions as it continually developed nuclear weapons since the 1960s, it has also showed off its nuclear armaments through successful nuclear testings and missile launches. As the development and threat of North Korea's weapons of mass destruction becomes more noticeable and the range of its risk expands, this study focuses on the potential for an absence of leadership for national crisis management where the country's leadership, which should serve the critical role and function of handling national crises, becomes completely destroyed by the unexpected initial attacks by North Korea. As a result, the purpose of this study is to propose safety measures for the country's leadership in preparation for North Korea's threat of nuclear weapons by examining the concept and degree of risk of weapons of mass destruction with a focus on nuclear weapons, analyzing the substance of the threat of North Korean nuclear weapons and evaluating such threat. In conclusion, first, to ensure the normal functioning of a national crisis management system in the event of a national crisis, we must seek safety measures that conform to the scope and succession order of the leadership of the national crisis management for an Enduring Constitutional Government (ECG) and the Continuity Of Operations (COOP). Second, in the event of a national ceremony, the gathering of the country's leadership all together in an open place should be avoided. In unavoidable circumstances, the next in rank that will act on behalf of the current leader should be designated and relevant safety measures should be taken. Third, during time of peace, in preparation for national crises, the scope of protection for the country's leadership should be prescribed and specific security and safety measures should be implemented. Fourth, the succession order for acting president in the case of the death of the president pursuant to Articles 71 and 26(1) of the National Government Organization Act should reconsidered to see whether it is a reasonable provision that takes into consideration a national crisis management that corresponds to the threat of North Korean nuclear weapons and weapons of mass destruction. Pursuant to the Basic Guidelines for National Crisis Management set out under Presidential Directive No. 229, the Korean government is currently operating a case-by-case "crisis management standard manual" and its sub-manuals and has also prepared the Presidential Security Service's security and safety measure regulations regarding the acting president. Therefore, the Korean government should actualize the above points in the case-by-case crisis management standard manual and security and safety measure regulations regarding the acting president to implement and legislate them.

  • PDF