• Title/Summary/Keyword: 인지취약모델

Search Result 38, Processing Time 0.023 seconds

STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments (STM-GOMS 모델: 모바일 스마트 기기 환경의 인증 기법을 위한 안전성 분석 모델)

  • Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1243-1252
    • /
    • 2012
  • Due to the widespread use of smart devices, threats of direct observation attacks such as shoulder surfing and recording attacks, by which user secrets can be stolen at user interfaces, are increasing greatly. Although formal security models are necessary to evaluate the possibility of and security against those attacks, such a model does not exist. In this paper, based on the previous work in which a HCI cognitive model was firstly utilized for analyzing security, we propose STM-GOMS model as an improvement of GOMS-based model with regard to memory limitations. We then apply STM-GOMS model for analyzing usability and security of a password entry scheme commonly used in smart devices and show the scheme is vulnerable to the shoulder-surfing attack. We finally conduct user experiments to show the results that support the validity of STM-GOMS modeling and analysis.

Dimensionality of emotion suppression and psychosocial adaptation: Based on the cognitive process model of emotion processing (정서 처리의 인지 평가모델을 기반으로 한 정서 억제의 차원성과 심리 사회적 적응)

  • Woo, Sungbum
    • Korean Journal of Culture and Social Issue
    • /
    • v.27 no.4
    • /
    • pp.475-503
    • /
    • 2021
  • The purpose of this study is to clarify the constructs of emotion suppression and help understanding on the multidimensional nature of emotion suppression by classifying constructs for suppression according to the KMW model. Also, this study examined the gender differences of emotion suppression. For this purpose, 657 adult male and female subjects were evaluated for attitude toward emotions, and difficulty in emotional regulation, as well as depression, state anger and daily stress scale. As a result of the exploratory factor analysis on the scales related to the emotion suppression factors, the emotion suppression factors corresponding to each stage of the KMW model were found to be 'distraction against emotional information, 'difficulty in understanding and interpretation of emotions', 'emotion control beliefs', 'vulnerability on emotional expression beliefs'. Next, the study participants were classified by performing a cluster analysis based on each emotion suppression factor. As a result, four clusters were extracted and named 'emotional control belief cluster', 'emotional expression cluster', 'emotional attention failure cluster', and 'general emotional suppression cluster'. As a result of examining the average difference of male depression, depression, state anger, and daily stress for each group, significant differences were found in all dependent variables. As a result of examining whether there is a difference in the frequency of emotional suppression clusters according to gender, the frequency of emotional suppression clusters was high in men, and the ratio of emotional expression clusters was high in women. Finally, it was analyzed whether there was a gender difference in the effect of the emotional suppression cluster on psychosocial adaptation, and the implications were discussed based on the results of this study.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

Smart door locks with facial recognition (안면 인식이 적용된 스마트 도어락)

  • Da-Young Lee;Jea-Wook Jeon;Yun-Seo Ha;Hyuck-Jun Suh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.788-789
    • /
    • 2023
  • 기존 도어락의 핀 인증 방식은 사용자에 따라 불편함을 느끼기도 한다. 이에 대한 솔루션으로 안면인식 도어락을 제안하며 Jetson nano에 face recognition 딥러닝 모델을 적용한 도어락을 제작한다. 거주자의 이미지를 촬영한 뒤 얼굴의 특징점을 분석하여 저장한다. 사용자가 도어락의 카메라에 인식되었을 때 저장된 안면 정보를 바탕으로 사용자가 거주자의 특징점과 일치하는지 확인한다. 거주자임이 인지되었을 때 도어락은 unlock되어 열리게 된다. 안면 인식 도어락 사용 시 보안상 취약해질 수 있는 기존 도어락의 핀 인증 방식에 대해 보안을 강화할 수 있으며 카메라를 통해 촬영된 사용자의 사진 및 영상을 활용하여 여러 서비스를 적용할 수 있다.

A Study on the Deployment Strategy of Zero Trust Security Model Based on Human-Centered Security Design (인간중심보안설계 기반 제로 트러스트 보안모델 전개방안에 관한 연구)

  • Jin-Yong Lee;Byoung-Hoon Choi;Sujin Jang;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.1-7
    • /
    • 2024
  • Traditional security model design presents two primary issues. First, these models have been developed and implemented with a technology-centered approach rather than considering human factors. Such structures can be undermined by cognitive vulnerabilities like psychological resistance within organizations and user errors. Second, these models are typically designed based on network perimeter security. This design is unsuitable for the boundary-less remote work environments rapidly becoming prevalent due to the Fourth Industrial Revolution and the COVID-19 pandemic. This paper proposes an approach to address these limitations by integrating human-centered threats within the Zero Trust security model, a state-of-the-art boundary-less security framework. By doing so, we suggest a robust security model design that can protect against both technical and human-centered threats.

A Study on Reuse Intention of the Easy Payment Service (간편 결제서비스 재사용의도에 관한 연구)

  • Kim, Jun-Woo;Nam, Jung-Ki;Jeon, Dong-Jin
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.303-312
    • /
    • 2018
  • The purpose of this study is to design the easy payment service research model and to find the influencing effect on the intention for the reuse of easy payment service by analysing the factors such as the social influence, the promotion condition, the security and the convenience as UTAUT model has. Also the research model employs the trust and the user satisfaction as parameters. The result shows that even though people feel the trust due to the convenience by the social influence, it has a negative influence on the user satisfaction if the risk recognized in the easy payment service and the weakness in the security are anticipated. The results of this study are academically meaningful as they established the research model for the easy payment service and the theoretical basis of the easy payment service area; they have provided the various practical implications.

Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification (이미지 분류를 위한 오토인코더 기반 One-Pixel 적대적 공격 방어기법)

  • Jeong-hyun Sim;Hyun-min Song
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1087-1098
    • /
    • 2023
  • The rapid advancement of artificial intelligence (AI) technology has led to its proactive utilization across various fields. However, this widespread adoption of AI-based systems has raised concerns about the increasing threat of attacks on these systems. In particular, deep neural networks, commonly used in deep learning, have been found vulnerable to adversarial attacks that intentionally manipulate input data to induce model errors. In this study, we propose a method to protect image classification models from visually imperceptible One-Pixel attacks, where only a single pixel is altered in an image. The proposed defense technique utilizes an autoencoder model to remove potential threat elements from input images before forwarding them to the classification model. Experimental results, using the CIFAR-10 dataset, demonstrate that the autoencoder-based defense approach significantly improves the robustness of pretrained image classification models against One-Pixel attacks, with an average defense rate enhancement of 81.2%, all without the need for modifications to the existing models.

A study on the influence of information security in selecting smart-phone (정보보안이 스마트폰 선택에 미치는 영향에 관한 연구)

  • Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.207-214
    • /
    • 2014
  • Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.

Exploring the Relationship between the Level of News Usage on Influenza A(H1N1) and Media Users' Behavioral Intention toward Personal and Public Health Protection: Focusing on Protection Motivation Theory (신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Yeo-Ra
    • Korean journal of communication and information
    • /
    • v.51
    • /
    • pp.5-25
    • /
    • 2010
  • The purpose of this research examined the relationship between the level of news usage on Influenza A(H1N1) and media users' behavioral intention toward health protection. Specifically, the study investigated causal relationships among exposure of media information on Influenza A(H1N1) as an independent variable, psychological protection motivation factors such as perceived severity, vulnerability, response efficacy, & self-efficacy as mediated variables and behavioral intention on personal and public health protection as dependent variables using structure equation model analysis. Self-reported questionnaires were administrated to 460 college students. The result indicated the followings. First, the level of news usage on Influenza A(H1N1) was not statistically significant on influencing behavioral intention toward personal and public health protection. Second, perceived severity, vulnerability, and self-efficacy were significant variables on behavioral intention toward personal health protection whereas perceived vulnerability and response efficacy were significant on public health protection. The function among factors in protection motivation theory is dependent upon whom protected from illness.

  • PDF

Direct and indirect effects of social support on young children's behavior problems and cognitive development in single-mother families with low income (미국 저소득 미혼모가구의 사회적 지지가 아동의 문제행동과 인지능력에 미치는 영향)

  • Pyun, Ho-Soon;Choi, Jeong-Kyun
    • Journal of the Korean Society of Child Welfare
    • /
    • no.36
    • /
    • pp.133-163
    • /
    • 2011
  • The aim of this study is to examine the relationships between social support and child behavior problems and cognitive development in low income female-headed families. Informed by the stress-coping theory, family process model, and theoretical perspectives related to social support, this study estimates both direct and indirect effects of social support on child behavior problems and cognitive development. In particular, we focus on how the relationship between child outcomes and social support is mediated by mothers' parenting stress. The first three waves of longitudinal data from a subsample of 1,315 single and non-cohabiting low-income mothers in the Fragile Families and Child Wellbeing Study were utilized in this study. Results suggest that social support is directly associated with child behavior problems and also indirectly associated with child behavior problems mediated by mothers' parenting stress. Social support did not have a direct effect on children's cognitive development but rather had an indirect effect, which was mediated by mothers' parenting stress. The policy and practice implications of these findings are discussed.