• Title/Summary/Keyword: Cyber Behavior

Search Result 254, Processing Time 0.023 seconds

The Impacts of Education and Non-Labor Income on Employment Among the Elderly: An Estimation with a Panel Logit Model to Address the Problem of Endogenous Predictors (교육수준과 비근로소득이 고령자 취업에 미치는 영향: 내생성을 고려한 패널로짓 모형 추정)

  • Kim, Cheoljoo
    • 한국사회정책
    • /
    • v.23 no.1
    • /
    • pp.95-123
    • /
    • 2016
  • As Korean society grows rapidly older, a systematic analysis of the determinants of labor supply behavior among the elderly becomes a prerequisite for designing more effective senior employment policies and income security regime for the elderly. Literatures review shows that a majority of previous researches have been ignoring the problem of "endogenous predictor" especially when it comes to the estimation of the effects of the two key variables, education and non-labor income, on labor supply decisions among older people. They have failed to take into consideration the unobserved heterogeneities which might affect both labor supply decisions of the elderly and their levels of education and non-labor income, which means, according to some econometric literatures, that the estimated coefficients of the two predictors can be inconsistent. The paper tries to redress the endogeneity problem by employing a panel logit model with data from the 1st. to 4th. wave of the KLoSA(Korean Longitudinal Survey of Ageing) to estimate the effects of key predictors on the probability of getting jobs among older people(ages of 60 or older). Both a random effects and a fixed effects model reaffirms that non-labor income has a negative effect on the chances of being employed. And a random effects model shows that the effect of education is also negative, as has frequently been reported by previous studies. That means the effects of education and non-labor income on elderly employment remain negative after the effect of unobserved heterogeneities is controled for and the problem of endogenous predictors is redressed through an appropriate panel data analysis. These findings mean, in turn, that when Korean baby-boomers, who had acquired an unprecedentedly higher level of education and were expected to enjoy ever-larger amount of non-labor income than their preceding generations, retires in near future, their incentives to work will become much weaker and the lack of labor-force and the burden of financing increased public pension expenditure will become more troublesome. The paper concludes with recommending some policy initiatives helpful to solve these expected problems.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

An Experimental Study and Numerical Analysis on Load Transfer Characteristics of Drilled Shafts (현장타설말뚝의 하중전이 특성에 대한 실험 및 해석적 연구)

  • Eonsang Park;Seungdo Park
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2023
  • In this study, the load transfer characteristics of the base and skin of drilled shafts were analyzed and the load sharing ratio was calculated by performing a load transfer large-scale model test and three-dimensional numerical analysis considering the similarity of drilled shafts, which is the design target. From the linear behavior of drilled shafts shown in the large-scale model test and 3D numerical analysis results, the skin load transition curve for the design conditions of this study was proposed by Baquelin et al., and the base load transition curve was proposed by Baquelin et al. For the horizontal load transition curve, the formula proposed by Reese et al. was confirmed to be appropriate. The test value was slightly larger than the numerical analysis value for the axial load at the rock socketing, but the load sharing ratio at the rock socketing increased, on average, about 27.8% as the vertical load increased. The analysis value of the vertical settlement of the pile head under the vertical load was evaluated to be slightly smaller than the test value, and the maximum vertical settlement of the pile head in the model test and analysis maximum vertical load was 10.6 mm in the test value and 10.0 mm in the analysis value, and the maximum vertical settlement value at the base of the pile was found to be a test value of 2.0 mm and an analysis value of 1.9 mm. The horizontal displacement at the head of the column (ground surface) and the head of the pile during the horizontal load was found to agree relatively well with the test value and the analysis value. As a result of the model soil test, the horizontal load measured at the maximum horizontal displacement of 38.0 mm was evaluated to be 24,713 kN, and the horizontal load in the numerical analysis was evaluated to be 26,073 kN.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

The coping and defense features of the North Korean Defectors in the Rorschach test (로샤 검사에 나타난 북한이탈주민의 대처와 방어)

  • Yun Kyeung Choi;Jong Nam Kim;Jung-Min Chae
    • Korean Journal of Culture and Social Issue
    • /
    • v.15 no.4
    • /
    • pp.507-528
    • /
    • 2009
  • Coping and defense are similar psychological mechanisms to reduce stress response, but they are regarded as distinct from each other. Defense involved distortions of reality, but coping was used for strategies associated with accepting the true nature of the situation. The purpose of the present study was to investigate the coping and defense features of the North Korean Defectors in the Rorschach test. The subjects were then categorized into four groups based on their birth place and gender: Male North Korean defectors( N=16), female North Korean defectors(N=28), male South Koreans(N=17), and female South Koreans(N=25). All subjects were individually administered the Rorschach test, and protocols were scored according to the Exner(2003)'s Rorschach Comprehensive systems. Coping or defense-related Rorschach variables were selected for analysis: EA, CDI, Adj D, EB style, Lamda, Zd, X-%, Xu%, W:Dd:D, P, reaction time, and other behavior characteristics during the testing. Compared with other groups, female North Korean defectors were more likely to show poor coping resources(low EA), adjustment difficulties(Adj D), and distortions of reality(high X-%). They also demonstrated more 'don't know' responses and more delayed responses than other groups. These findings suggest that poor coping resources make female North Korean defectors more vulnerable to stress, and psychological intervention such as social skills training may help them settle successfully in south Korea. Limitations of the current study and implications for future research were discussed.

  • PDF

The Rehabilitation of Gambling Addiction: Comparison with the other psychiatric disorder (도박중독의 재활: 타 정신장애와의 비교)

  • Heung-Pyo Lee;Tae-Woo Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.16 no.3
    • /
    • pp.241-265
    • /
    • 2010
  • This study reviewed the present state and differences of rehabilitation programs of the gambling addiction by comparing with other psychiatric disorder(including psychotic disability and alcohol addiction). This study also intended to suggest necessities, meanings and inherent fields of the rehabilitation in gambling addiction. First of all, the government and a few gambling industries run clinic centers for gamblers and their families, but have been lacked rehabilitation services for social comeback and adaptation or devaluated rehabilitation services than therapies. Gambling addict didn't have impairments of the cognitive function and their daily abilities was better than any other psychiatric disorders. But Damage of social role or function of gambling addiction was severe. And it is caused by nonadaptive nature of gambling behavior, personality/emotional change through gambling addiction process, and previous personality problem etc. There are many severe failure of social role and its attendant bankrupcy, family's problems and social poverty in gambling addiction, Therefore, important fields in the rehabilitation of gambling addiction should be services for basic social comeback support service, credit recovery support, monetary management, support of rehabilitation of family and vocational rehabilitation. Finally, the significance and critical points of the current study has been discussed as well.

  • PDF

Analysis of research trends on infants and school-age-child: Focusing on Journal of The Korean Society for School & Community Health Education from 2000 to 2023 (영·유아기 및 학령기 아동에 관한 연구동향 분석: 2000~2023년 한국학교·지역보건교육학회지 게재논문을 중심으로)

  • Hee-Jung Park;Minsung Sohn;Seok Hwan Kim
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.25 no.3
    • /
    • pp.39-49
    • /
    • 2024
  • Purpose: This study aims to analyze the current status of research related to infants and school-age-child published in the journal of Korean society for school & community health education from 2000 to 2023, with the goal of contributing to the future development and enhancement of the journal. Method: From 2000 to 2023, 52 papers were analyzed, comparing and classifying their journal topic, research types, data collection methods, and data analysis methods. Results: The results shows that the highest publication trend occurred between 2008 and 2012, with most studies focusing on school-age children. In terms of research topic, 'health behavior and health education' was the most frequent with 14 papers (26.9%), followed by oral health with 9 papers (17.3%), safety management with 7 papers (13.5%), and sexual awareness with 6 papers (11.5%). Quantitative research was the most common research type, with surveys being the primary data collection method. Descriptive statistics and t-test were the most frequently used data analysis methods. Conclusion: To enhance the quality of the journal of Korean society for school & community health education, there should be an expansion of evidence-based research focusing on infants and school-age children. Additionally, there is a need for greater diversity in research design, data collection, and analysis methods.

A Study on Characters of Select Behaviors of Tourist - at a spa & resort - (관광객의 선택행동 특성에 관한 연구 - 온천리조트를 중심으로 -)

  • Oh, Jae-kyung
    • Journal of Distribution Science
    • /
    • v.4 no.2
    • /
    • pp.81-106
    • /
    • 2006
  • The value of Its visitors is very important factors on selection of a Spa & Resort. The first detailed purpose of this paper is to analyse the differences of select behaviors of a Spa & Resort according to the types of values of the visitors. The second aim is to conduct a research on the characters of select behaviors of the visitors. The third aim is to analyse the degree of satisfaction of the visitors, re-visitation and the intention of recommendation. The fourth purpose is to provide useful materials on analysis about the values of the visitors at various Spa & Resorts and to trigger dramatic effect of recuperation, relaxation with its visitor's needs met, the maximum of hotel's management profit at Spa & Resort's area and programs to activate the region's economy. Factor Analsis Routine of SPSS Windows Version 10.0 was applied to accomplish the issues of the study. The Applied analysis by research process are as follows; This paper applied Frequency analysis to figure out interviewee's demographic characters and various using types of the visitors, using their experience of visiting, Select influence, Visiting period, Accommodation they use, Accompanyist, Costs, Season, Transportation, The necessary time. This paper showed important correlation between the visitors' select attributes and behaviors after using it, between their personal value and behaviors after using it, between their individual value, motive of use and their select behavior of destinations. In accordance with it, Managers or developer of a Spa & Resort should make a plan after a sufficient review of the visitors' individual value. The visitor's value is changing continuously according to the change of spatial, occasional environment and should be assessed by those changes.

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF