• Title/Summary/Keyword: Cyber Index

Search Result 80, Processing Time 0.03 seconds

Design of Evaluation Index System for Information Experience based on B2C e-Commerce Bigdata and Artificial Intelligence

  • KANG, Jangmook;HU, Haibo;CHEN, Yinghui;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The online retail market continues to grow, especially in China, as e-commerce has developed rapidly in recent years in many countries. Meanwhile, the development and use of new network information technology provides consumers with various contact and experience environments for online shopping. Based on the theory of media weakness, the study began to focus consumer experience on the nature of commercial transactions. The study proposed and designed an initial measure of the consumer information evaluation index, which combines previous findings with implications. Finally, the five-dimensional B2C system was established to evaluate consumers' information experience providing information display, information interaction, information support and information personalization. We researched on evaluation index system for information experience of B2C e-commerce consumers based on samples of Chinese consumers.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

Evaluation on the Accuracy of Targeting Error Correction Through the Application of Target Locating System in Robotic CyberKnife (로봇 사이버나이프에서 위치인식시스템을 이용한 Targeting Error값 보정의 정확성 평가)

  • Jeong, Young-Joon;Jung, Jae-Hong;Lim, Kwang-Chae;Cho, Eun-Ju
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.21 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • Purpose: The purpose is to evaluate the accuracy of correcting the targeting error through the Target Location System (TLS) for the location change error of the reference point which arises from the movement or motion of patient during the treatment using the CyberKnife. Materials and Methods: In this test, Gafchromic MD-55 film was inserted into the head and neck phantom to analyze the accuracy of the targeting, and then the 6 MV X-ray of CyberKnife (CyberKnife Robotic Radiosurgery System G4, Accuray, US) was irradiated. End to End (E2E) program was used to analyze the accuracy of targeting, which is provided by Accuray Corporation. To compute the error of the targeting, the test was carried out with the films that were irradiated 12 times by maintaining the distance within the rage of $0{\pm}0.2\;mm$ toward x, y, z from the reference point and maintaining the angle within the rage of $0{\pm}0.2^{\circ}$ toward roll, pitch, yaw, and then with the films which were irradiated 6 times by applying intentional movement. And the correlation in the average value of the reference film and the test film were analyzed through independent samples t-test. In addition, the consistency of dose distribution through gamma-index method (dose difference: 3%) was quantified, compared, and analyzed by varying the distance to agreement (DTA) to 1 mm, 1.5 mm, 2 mm, respectively. Results: E2E test result indicated that the average error of the reference film was 0.405 mm and the standard deviation was 0.069 mm. The average error of the test film was 0.413 mm with the standard deviation of 0.121 mm. The result of independent sampling t-test for both averages showed that the significant probability was P=0.836 (confidence level: 95%). Besides, by comparing the consistency of dose distribution of DTA through 1 mm, 1.5 mm, 2 mm, it was found that the average dose distribution of axial film was 95.04%, 97.56%, 98.13%, respectively in 3,314 locations of the reference film, consistent with the average dose distribution of sagittal film that was 95.47%, 97.68%, 98.47%, respectively. By comparing with the test film, it was found that the average dose distribution of axial film was 96.38%, 97.57%, 98.04%, respectively, at 3,323 locations, consistent with the average dose distribution of sagittal film which was 95.50%, 97.87%, 98.36%, respectively. Conclusion: Robotic CyberKnife traces and complements in real time the error in the location change of the reference point caused by the motion or movement of patient during the treatment and provides the accuracy with the consistency of over 95% dose distribution and the targeting error below 1 mm.

  • PDF

A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea (개인정보유출 피해 비용 산출 모델에 관한 연구)

  • Lim, Gyoo Gun;Liu, Mei Na;Lee, Jung Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.215-227
    • /
    • 2018
  • As Korea is rapidly becoming an IT powerhouse in the short term, various side effects such as cyber violence, personal information leakage and cyber terrorism are emerging as new social problems. Especially, the seriousness of leakage of personal information, which is the basis of safe cyber life, has been highlighted all over the world. In this regard, it is necessary to estimate the amount of the damage cost due to the leakage of personal information. In this study, we propose four evaluation methods to calculate the cost of damages due to personal information leakage according to average real transactions value, personally recognized value, compensation amount basis, and comparison to similar countries. We analyzed data from 2007 to 2016 to collect personal information leakage cases for 10 years and estimated the cost of damages. The number of cases used in the estimation is 65, and the total number of personal information leakage is about 430 million. The estimated cost of personal information leakage in 2016 was estimated to be at least KRW 7.4 billion, up to KRW 220 billion, and the 10 year average was estimated at from KRW 10.7 billion to KRW 307 billion per year. Also, we could find out the singularity that the estimated damage due to personal information leakage increases every three years. In the future, this study will be able to provide an index that can measure the damage cost caused by the leakage of personal information more accurately, and it can be used as an index of measures to reduce the damage cost due to personal information leakage.

Comparison of Corporate Security Control Level with Social Trust Index (사회 신뢰수준에 따른 기업의 보안통제 수준 비교)

  • Na, Husung;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.673-685
    • /
    • 2017
  • STI(Social Trust Index) indicates levels of trustworthiness, honesty and reliability among people in a society. Since the STI varies in countries, security control on cyber space should be applied differently according to the STI so that companies can protect their assets efficiently and effectively. We compare STIs between Korea and United States using the Diamond Model and investigate how the STIs affect corporate security controls in those two countries. We finally present a formula using AHP (Analytic Hierarchy Process) to measure levels of corporate security controls in different countries.

The Effects of Multi-identity on One's Psychological State and the Quality of Contribution in Virtual Communities: A Socio-Psychological Perspective

  • Suh, A-Young;Shin, Kyung-Shik;Lee, Ju-Min
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.57-79
    • /
    • 2010
  • In a virtual community, one can possess multiple identities and pretend to be different by creating self-identity in contrast with his or her actual self. Does false identity undermine the qualitative growth of a virtual community by reducing members' accountability? Or does it stimulate their contributive behaviors by ensuring freedom of speech? It is imperative to understand the effects of multi-identity considering the distinct properties of a virtual community in which people easily change their identities at little or no cost. To answer these questions, we adopted the concept of self-discrepancy from the social psychology theory rooted in the concept of the self and developed a theoretical model to predict quality of contribution of the individual member in virtual communities. Based on the self-discrepancy theory, we first identified two different domains of the self: (1) an "actual self" that consists of attributes that the person believes he or she currently possesses in real life and (2) a "cyber self" that consists of attributes the person believes he or she possesses in a virtual community. Next, we derived an index for two different types of self-discrepancy by using the differences between the actual and the cyber identities: Personal Self-discrepancy and Social Self-discrepancy. Personal Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's intelligence, education, and expertise. Social Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's morality, sociability, and accordance with social norms. Finally, we linked them with sense of virtual community, perceived privacy rights, and quality of contribution to examine how having a multi-identity influences an individual's psychological state and contributive behaviors in a virtual community. The results of the analysis based on 266 respondents showed that Social Self-discrepancy negatively influenced both the Sense of Virtual Community and Perceived Privacy Rights, while Personal Self-discrepancy negatively influenced only Perceived Privacy Rights, thereby resulting in reduced quality of contribution in virtual communities. Based on the results of this analysis, we can explain the dysfunctions of multi-identity in virtual communities. First, people who pretend to be different by engaging in socially undesirable behaviors under their alternative identities are more likely to suffer lower levels of psychological wellbeing and thus experience lower levels of sense of virtual community than others. Second, people do not perceive a high level of privacy rights reflecting catharsis, recovery, or autonomy, even though they create different selves and engage in socially undesirable behaviors in a virtual community. Third, people who pretend to be different persons in terms of their intelligence, education, or expertise also indirectly debase the quality of contribution by decreasing perceived privacy rights. The results suggest that virtual community managers should pay more attention to the negative influences exercised by multi-identity on the quality of contribution, thereby controlling the need to create alternative identities in virtual communities. We hope that more research will be conducted on this underexplored area of multi-identity and that our theoretical framework will serve as a useful conceptual tool for all endeavors.

A Proposition for Smart Warehouse Management System (SWMS) through IoT (IoT를 채용한 스마트 창고관리 시스템 설계 제안)

  • Kim, Jun Yeong;Jeon, Byeong-Woo;Hong, Dae Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-93
    • /
    • 2015
  • Warehouse Management System (WMS) is a key control for Material Handling System (MHS) and Inventory Control System (ICS). How to design and implement for WMS is crucial factor for achieving the key performance index for Manufacturing Industry. In particular, iron and steel making industry, where the volume and weight is large and hence FIFO (First Input First Out) is not working, how to design WMS is a key factor. In this paper, we systematically define the problem of WMS via developing StR (Stakeholders' Requirements) or ORD (Operational Requirement Documents), SyR (System Requirement), and SA (System Architecture) based on the emerging technologies. In particular, IoT (Internet of Things), CPS (Cyber Physical System) concepts and enabling technologies haves been incorporated in developing Smart WMS. The deliverables of the research can provide a conceptual framework for developing the next generation industrial WMS.

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

  • Li, Huanruo;Guo, Yunfei;Huo, Shumin;Ding, Yuehang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1891-1908
    • /
    • 2021
  • Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts attackers from valuable digital documents and attracts unauthorized access by deliberately exposing fake content. The effectiveness of distraction and trap lies in the enticement of fake content. However, existing studies on the Honeyfile focus less on this perspective. In this work, we seek to improve the enticement of fake text content through enhancing its readability, indistinguishability, and believability. Hence, an enticing deceptive-content generator, EDGE, is presented. The EDGE is constructed with three steps: extracting key concepts with a semantics-aware K-means clustering algorithm, searching for candidate deceptive concepts within the Word2Vec model, and generating deceptive text content under the Integrated Readability Index (IR). Furthermore, the readability and believability performance analyses are undertaken. The experimental results show that EDGE generates indistinguishable deceptive text content without decreasing readability. In all, EDGE proves effective to generate enticing deceptive text content as deception defense against APTs.

New Cyber Space for Literature and criticism: Applied to Social Network (문학과 비평의 새로운 사이버 공간: 소셜 네트워크의 적용)

  • Ko, In-Hwan;Jeong, Hwa-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.93-98
    • /
    • 2012
  • Literature has showing a phenomenon of the society and the year's issue for a long time. Many critics used index to do not only understand the years' but also just literature. That is, the literature was an essential method to express the society. However, it can be different for each people to have a view point for the literary work. Therefore, people has a self-analysis for the work, and the activity affect that the it can be difficult for people to public their interest for the literary. In this paper, we make new cyber space for social network of the literary and propose a framework that people can discuss their opinion for the literary work. In that time, we make a literary work as digital content.

Inpatient care focused strategy and convergence performance in hospitals (병원의 입원 진료 집중화 전략과 융합적 운영 성과)

  • Yoo, Hai-Won
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.59-66
    • /
    • 2016
  • This study analyzed the relationship between the convergence performance in hospital. This study examined previous research and calculated centralized index using diagnosis related groups. In addition, multiple regression analysis was used based on LOS in order to understand the effect of focused strategy which quality of medical inpatient service. The centralized level was examined by analyzing national inpatient sample data using 'Internal Herfindahl-Hirshman index' This study is significant because it reviewed medical inpatient service quality by measuring hospital centralized level which has been rarely studied before Korea.