• Title/Summary/Keyword: 산업보안이론

Search Result 39, Processing Time 0.025 seconds

Detecting malicious behaviors in MMORPG by applying motivation theory (모티베이션 이론을 이용한 온라인 게임 내 부정행위 탐지)

  • Lee, Jae-hyuk;Kang, Sung Wook;Kim, Huy Kang
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.69-78
    • /
    • 2015
  • As the online game industry has been growing rapidly, more and more malicious activities to gain economic benefits have been reported as well. Game bot is one of the biggest problems in the online game industry. So we proposed a bot detection method based on the ERG theory of motivation for the first time. Most of the previous studies focused on behavior-based detection by monitoring patterns of the specific actions. In this paper, we applied the motivation theory to analyze user behaviors on a real game dataset. The result shows that normal users in the game followed the ERG theory of motivation in the same way as it works in real world. But in the case of game bots, the theory could not be applied because the game bot has specific reasons, unlike normal game users. We applied the ERG theory to users to distinguish game bot users from normal users. We detected the game bot with high accuracy of 99.78% by applying the theory.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

Analysis of Research Trends of the Information Security Audit Area Through Literature Review (문헌 분석을 통한 정보보안 감사 분야의 국내 및 국제 연구동향 분석)

  • So, Youngjae;Hwang, Kyung Tae
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.3-39
    • /
    • 2023
  • With the growing importance of information/information system, information security is emphasized, and the significance of information security audit as a tool for maintaining the proper security level is increasing as well. The objectives of the study are to identify the overall research trends and to propose future research areas by analyzing domestic and overseas research in the area. To achieve the objectives, 103 research papers were analyzed based on both general and subject-related criteria. The following are the major research results : In terms of research approach, more empirical studies are needed; For subject "Auditor," studies to develop a framework for related variables (e.g., capability) are needed; For subject "Audit Activities/Procedures," future research should focus on the process/results of detailed audit activities; Future domestic research for "Audit Areas" should look for the new technology/industry/security areas covered by foreign studies; For "Audit Objective/Impact," studies to define the variables (e.g., performance and quality) systematically and comprehensively are needed; For "Audit Standard/Guidelines," research on model/guideline needs to be continued.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

Development of informatics subject education system using cloud-based social platform for maker education (메이커 교육을 위한 클라우드 기반 교육용 소셜 플랫폼을 활용한 정보교과 교육시스템 개발)

  • Yang, Hwan-Geun;Lee, Tae-Wuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.409-412
    • /
    • 2019
  • 본 논문에서는 인공지능과 빅데이터 클라우드 등 다양한 4차 산업혁명시대의 기술과 교육을 융합한 에듀테크를 기초로 하여 에듀테크에 대한 교사의 학습 방향을 제시하며 전체적인 클라우드의 개념 및 분류체계, 교육의 활용을 제시하였고 클라우드 기반 교육용 소셜 플랫폼과 R. M. Gagne(1985)의 9가지 이론을 토대로 정보교과 추상화 단원의 학습 지도안을 설계 후 성취도 평가를 제시하였다. 연구 내용 분석 결과 기술의 발전성과 교육현장에서의 개인정보 교육 및 정보보안 교육의 필요성이 강조되며 확고한 플랫폼 구축과 빅데이터 확보 및 분석하여 개인에게 맞춤형 서비스 제공이 필요하다. 또한 사용자 편의성 극대화 서비스 및 UX 간결이 요구된다. 본 논문을 토대로 에듀테크의 일부분인 클라우드 기반 소셜러닝의 다양하고 체계적인 선행연구 활성화에 시발점이 되었으면 한다.

  • PDF

Impact of Fourth Industrial Revolution on Airport Management System: Moderator Effect of Convergence and Leadership (4차 산업혁명이 공항경영시스템에 미치는 영향 : 융합 및 리더십의 조절효과)

  • Lee, Yung-Kil;Baek, Jeong-Sun;Park, Sung-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.289-303
    • /
    • 2022
  • The purpose of this study verify to influence the effect of the 4th industrial revolution recognized by airport operators on the airport management system and the moderator effects of convergence and leadership between these influence relationships. Data collected through a survey of airport operators using simple random sampling at six international airports in Korea. Data analysis performed using Structural Equation Modeling. The research results found that the 4th industrial revolution had a positive effect on the airport management system. Also, moderator effects of convergence and leadership found significant statistically. In this paper, we asserts that it should be reconstructed the airport management system as a system suitable for the era of the 4th industrial revolution. This paper provide theoretical data and directions for empirical research to airport researchers, and implications for airport enterprise managers and airport policy planners. The findings of this study are particularly helpful for international airports that have adopted the technologies of the Fourth Industrial Revolution.

A Lean Logistics Model for Improving the Port Logistics in the Steel Industry (철강산업 린 기반 항만물류프로세스 개선 모델 구현)

  • Kim, Jung-Hoon;Nam, Ho-Ki
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.101-108
    • /
    • 2008
  • This research focuses on the process improvement of port logistics by using Lean methodology. On the one hand, we firstly analyze the current situation and weakness of the processes in port logistics, and then re-design the current processes by the principles of Lean discipline. Based on the appropriately changed processes, the improvement scheme of port logistics will be figured out. On the other hand, we construct the port logistics system by implementing the improved processes. The port logistics' processes accomplished in steel company will be further assorted and identified. The relationship of wharves process, operational process, shipping process, construction process, quality process, and purchasing process are also defined. Every process has been improved by Lean Tools in order to analyze the value added or non-value added processes, to improve the service level, and to reduce the cycle time, inventory, changing time, re-working and waste. Based on above, the appropriate environment that is suitable to Lean process of port logistics will be established and the modeling that can help to implement the improvement scheme will be figured out.

  • PDF

A Study on the Effective Military Use of Drones (드론의 효과적인 군사분야 활용에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.61-70
    • /
    • 2020
  • The unmanned aerial vehicle that emerged with the 4th Industrial Revolution attracts attention not only from Korea but also from around the world, and its utilization and market size are gradually expanding. For the first time, it was used for military purposes, but it is currently used for transportation, investigation, surveillance, and agriculture. China, along with the US and Europe, is emerging as a leader in the commercial unmanned aerial vehicle market, and Korea, which has the world's seventh-largest technology in related fields, is striving to promote various technology development policies and system improvement related to unmanned aerial vehicles. Military drones will revolutionize the means of war by using a means of war called an unmanned system based on theories such as network-oriented warfare and effect-oriented warfare. Mobile equipment, including drones, is greatly affected by environmental factors such as terrain and weather, as well as technological developments and interests in the field. Now, drones are being used actively in many fields, and especially in the military field, the use of advanced drones is expected to create a new defense environment and provide a new paradigm for war.

Systematic Literature Review of Smart Trade Contract Research (스마트 무역계약 연구의 체계적 문헌고찰)

  • Ho-Hyung Lee
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.243-262
    • /
    • 2023
  • This study provides a systematic review of smart trade contracts, examining the research trends and theoretical background of utilizing smart contracts and blockchain technology for the digitalization and automation of trade contracts. Smart trade contracts are a concept that applies the automated contract system based on blockchain to trade-related transactions. The study analyzes the technical and legal challenges and proposes solutions. The technical aspect covers the development of smart contract platforms, scalability and performance improvements of blockchain networks, and security and privacy concerns. The legal aspect addresses the legal enforceability of smart contracts, automatic execution of contract conditions, and the responsibilities and obligations of contract parties. Smart trade contracts have been found to have applications in various industries such as international trade, supply chain management, finance, insurance, and energy, contributing to the ease of trade finance, efficiency of supply chains, and business model innovation. However, challenges remain in terms of legal regulations, interaction with existing legal frameworks, and technological aspects. Further research is needed, including empirical studies, business model innovation, resolution of legal issues, security and privacy considerations, standardization and collaboration, and user experience studies to address these challenges and explore additional aspects of smart trade contracts.

An Integrated Approach for Korea's e-Navigation Development Project to Playing the Global Lead in Maritime Safety Logistics of IMO's Next Generation (한국의 이네비게이션개발사업이 IMO차세대 해사안전보안물류상 세계 주역을 맡기 위한 통합적 접근)

  • Gim, Jin-Goo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.58-58
    • /
    • 2016
  • This study aims to enhance Korea's competitiveness by taking the lead in the international standardization and relevant global market. This is to be achieved by performing the role of First Mover through the resolute investment from Fast Follower that is servile to the decision of the organization in the e-Navigation strategy that has been promoted by the IMO. The study methodology is an integrated approach. It is established by modelling LSCM G2B2C2 Platform in maritime safety/security logistics and applied to the enhancement of maritime safety/security in global LSCM. This paper externally contributes to the reduction of world maritime accidents and exalt the national prestige; internally, the enhancement of the national competitiveness through the improvement of shipping port logistics and others. These eventually contribute to Korea's economic development that is combined by both theory and practice and of practical use of the integrated approach.

  • PDF