• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.037 seconds

The effects of the organizational characteristics and interorganizational network level on social welfare organizations' effectiveness -Focused on resource capability of women's welfare organization- (사회복지조직의 특성과 네트워크 수준이 조직효과성에 미치는 영향 -여성복지조직의 자원확보능력을 중심으로-)

  • Jang, Yeon Jin
    • Korean Journal of Social Welfare Studies
    • /
    • v.44 no.3
    • /
    • pp.147-175
    • /
    • 2013
  • The purpose of this study is to examine the effects of the organizational characteristics and interorganizational network level on social welfare organizationas' effectiveness using structural equation model. For achieving this purpose, this study defined organizational effectiveness as financial, human and physical resource capability according to resource systems approach. Organizational characteristics variables included the number of qualified staff, degree of resource dependency, the proportion of government subsidies, the main organizational philosophy, establishment year, the attitude of top manager and the number of informal ties. Interorganizational network variables were divided by outdegree centrality and indegree centrality. The data collected from women's welfare organizations in Seoul through survey method. The analysis tools used the UCINET 6.245 for the network analysis and AMOS 18.0 for the structural equation model. The results of this study are as follows. The factors affected on the financial resource capacity were the number of qualified staff, the proportion of government subsides and the indegree centrality. Meanwhile, only indegree centrality directly influenced on the human resource capability. The significant affecting factors on physical resource capacity were the number of qualified staff, the attitude of top manager and informal ties. Based on these results, the implications of this study and the ways to enhance social welfare organization's effectiveness were discussed.

A Study on the Relationship between Job Characteristics and Individual Learning Agility and Learning Satisfaction (군 직무특성 및 개인 학습민첩성과 학습만족도 간의 관계 연구)

  • Choi, Soonwon;Jeon, Ki Seok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.197-210
    • /
    • 2020
  • Learning agility is the will and ability to flexibly change thoughts and behaviors by quickly learning in new environments and experiences, and is a core competency to overcome crisis and solve organizational problems. It is a concept that can be used in the same organization group. Based on the previous research, a study was conducted to investigate how the job characteristics and personal learning agility of the army deputy officers influence learning satisfaction. After receiving a questionnaire survey of 216 business and yarn companies, SPSS 24.0 was used to verify the reliability and validity of the measurement variables, and the hypothesis was verified by regression analysis. It was found that some of the sub-categories of personal learning agility (self-awareness, active change pursuit) had a positive effect on learning satisfaction. This means that in order to enhance the effectiveness of military cyber education, measures should be taken to avoid overload in the field, and in order to increase performance in military organizations, personal learning agility pursuing positive change based on self-awareness and feedback must be developed.

Study of Problem Based Learning for Information Security Consultant and its Analysis (정보보호 컨설턴트 양성을 위한 PBL 교육방안 적용 및 효과성 분석)

  • Oh, Changhyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2325-2332
    • /
    • 2017
  • Consulting projects such as diagnosis of vulnerabilities of major information and telecommunication infrastructure are increasing, mandatory public information infrastructure assessment (PIA) for public institutions and ISMS (Information Security Management System) The demand for information protection consulting is continuously increasing as the field obeys the law, but the lack of information security consultant is not improving. One reason is that information security consultants are not being developed to meet the increasing demand for information protection consulting. In this paper, we present the case of information protection consulting as a scenario for studying and educating the duty of information security consultant by studying overseas case and domestic case based on standardization and standardization. We propose a problem-based learning (PBL) training method. In addition, we analyze the effectiveness of the PBL - based learning method.

Development of Online Education Program and Feasibility Study on Cyberbullying Response in Schools since COVID-19 (코로나-19 이후 증가한 학교 사이버폭력 대응에 대한 온라인 교육 프로그램 개발과 타당성 연구)

  • Choi, Eunsun;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1071-1082
    • /
    • 2021
  • COVID-19 has changed a lot in our daily lives, where school classes and remote classes have been combined or converted to remote classes. Many students spent more time online, and cyberbullying, such as indiscriminate disclosure of their personal information, bullying of their classmates online, increased. In this paper, we propose an online education program as a countermeasure against cyberbullying. This program is designed for elementary, middle, and high school students and can also be used for informatics or ethics classes in the 2015 curriculum. The proposed program is divided into four major themes: 'Cyberbullying,' 'Information Security,' 'Cyber Crime,' and 'Language Violence,' and is divided into a total of ten topics according to its connection. It was organized to teach the topics evenly by grade. Also, the program's feasibility was verified by experts on the selection of educational contents and organizing of contents. In the future, it will be necessary to apply for this program and conduct an effectiveness analysis to measure whether it has effectively contributed to the decrease in cyberbullying rates among students and the improvement of coping skills.

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

Evaluation of Visual Perception in Smoking Cessation Websites and Construction of Antismoking Website

  • Lee, Yoon-Hyeon;Shin, Soon-Ho
    • Korean Journal of Health Education and Promotion
    • /
    • v.20 no.4
    • /
    • pp.95-109
    • /
    • 2003
  • Tobacco use is the most readily preventable cause of premature death; it is a worldwide problem, with a significant impact on heath and well-being. In order to design an effective tobacco education program, it is important to understand smoking patterns and the underlying factors associated with smoking in different generations such as adults or young people. Despite a general decline in the prevalence of regular smoking among adults, recent surveys commissioned by the Ministry Heath & Welfare for the Republic of Korea have shown no evidence of any decline in smoking rates among young women and adolescents. The Republic of Korea has the highest adult male smoking percentage (65.1%) in the world and smoking in adolescents is still an increasing trend. Smoking in adolescents and young women is especially more dangerous, thus health education of anti-smoking directed at these groups is an important area that will benefit from using internet content that they can easily access. The purpose of this study is the evaluation of visual perception and effectiveness analysis in smoking cessation websites in promoting smoking cessation in adolescents and young women through Internet content. As a result of this project, at first we evaluated the Internet content of cyber smoking cessation programs by the evaluation criteria of web design interface. The Internet site of http://nosmokeguide.or.kr received the most superior evaluation in the domestic Internet content for smoking cessation and the Internet site of the National Center for Tobacco-Free Kids received the most superior evaluation in the foreign Internet content for smoking cessation. This evaluation was surveyed by an expert in Internet content and user. Secondly, we developed the Internet content for cyber smoking cessation program, namely, "Dr. Smoking" that contained several menus and a database regarding anti-smoking designed in accordance with the results of this evaluation. The domain address of Dr. Smoking is http://www.dmosmoking.com and our webpage has assorted kinds of news, information, self-diagnosis, prescription, consulting, a no-smoking mall etc. In conclusion, this project is designed to develop Internet content for the most effective smoking cessation program and to contribute to eliminating smoking from our society. We also will try to develop and upgrade this web-site in order to help a smoker who want to quit smoking and diminish the physical and socioeconomic harm from smoking.m smoking.

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Development of Web-based Multimedia Content for a Physical Examination and Health Assessment Course (웹기반의 건강사정 멀티미디어 컨텐츠 개발)

  • Oh Pok-Ja;Kim Il-Ok;Shin Sung-Rae;Jung Hoe-Kyung
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.6
    • /
    • pp.994-1003
    • /
    • 2004
  • Purpose: This study was to develop Web-based multimedia content for Physical Examination and Health Assesment. Method: The multimedia content was developed based on Jung's teaching and learning structure plan model, using the following 5 processes: 1) Analysis Stage, 2) Planning Stage, 3) Storyboard Framing and Production Stage, 4) Program Operation Stage, and 5) Final Evaluation Stage. Results: The web based multimedia content consisted of an intro movie, main page and sub pages. On the main page, there were 6 menu bars that consisted of Announcement center, Information of professors, Lecture guide, Cyber lecture, Q&A, and Data centers, and a site map which introduced 15 week lectures. In the operation of web based multimedia content, HTML, JavaScript, Flash, and multimedia technology(Audio and Video) were utilized and the content consisted of text content, interactive content, animation, and audio & video. Consultation with the experts in context, computer engineering, and educational technology was utilized in the development of these processes. Conclusions: Web-based multimedia content is expected to offer individualized and tailored learning opportunities to maximize and facilitate the effectiveness of the teaching and learning process. Therefore, multimedia content should be utilized concurrently with the lecture in the Physical Examination and Health Assesment classes as a vital teaching aid to make up for the weakness of the face-to- face teaching-learning method.