• Title/Summary/Keyword: Security Behavior

Search Result 892, Processing Time 0.028 seconds

Between Regime Change and Political Development: Myanmar's Defective Democracy and the Task for the Political Development (체제 전환과 정치발전의 사이에서: 미얀마의 결손민주주의와 정치발전의 과제)

  • JANG, Junyoung
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.161-196
    • /
    • 2018
  • The major object of this study is to analyze the political development of Myanmar's civilian government on the concept of defective democracy, and to investigate the main actors who delayed or stymied political development and their interrelation. In doing so, this study suggests the tasks required for political development overcoming the current political structure and behavior. The civilian government, which was launched in 2016, failed to achieve positive political development by following the behavior of military authoritarianism in terms of exercise of power and decision making structure. On the perspective of the government, delegative democracy and domain democracy have been strengthening since one person has taken over all political power and hesitate to take horizontal accountability for each power organizations. The military, which is responsible for national defence and security seeks illiberal democracy and exclusive democracy, keeping on an undemocratic constitution by the military and Burman ethnocentrism. The reasons why defective democracy has been occurred are that the lack of a group to run a democratic institutions and the limitation of power structure that fails to adhere to the principle of civilian control to the military due to long-term military rule. Therefore, there is a need for military's come back to barracks and transform the power structure to democratic of the civilian government which is tamed an authoritarian order for the political development in Myanmar. In order to achieve this, this study concludes that setting up a empowered democratic government is required.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Latent Profile Analysis of Senior Lifestyle Profile: A stringent study of similarity and differences (시니어세대 라이프스타일 잠재프로파일 유형과 관광 행동 연구)

  • Seo In-seog;Kim Young-mi;Oh Hyun-sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.899-910
    • /
    • 2023
  • The majority of research on lifestyle has been conducted based on a variable-centered approach. However, over the last decades, there is a growing body of research on lifestyle in terms of a person-centered approach. Hence, this study identifies senior generations' profiles based on the combination of the five realms of lifestyle. More specifically, this study utilized a Latent profile analysis(LPA) to explore both quantitatively and qualitatively distinct types of senior generation' lifestyle profiles. As a result, the five distinct types of senior lifestyle profiles were identified and these five profiles were then contrasted with traveling attitude and behavioral intention(traveling intention). In addition, this study attempted to identify similarity in the patterns of relations with theoretical antecedent, correlate and outcome variables. Results showed that even though senior generation belonging to profile groups pertaining to the high level of all five types of lifestyle were associated with a high level of attitude and behavior intention, there was no differences among the profiles. This means that regardless of the patterns of senor generation lifestyle profiles, there was no similarity. Nevertheless, it should be considered that senior generation consider a security when making a travel ling decision regardless of the patterns of lifestyle profiles. This results suggest that senior generation' traveling satisfaction is more likely obtained with the experience of safety and convenience during their travel. At last, this study discusses some implication tourism theory related to lifestyle, practices and future research on tourism profiles.

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

Quality of Life in Low Income Korean Aged (기초생활보장 수급 노인의 삶의 질)

  • Kim, Hye-Ryoung;Oh, Ka-Sil;Oh, Kyong-Ok;Lee, Sun-Ock;Lee, Sook-Ja;Kim, Jeong-Ah;Jun, Hoa-Yun;Kang, Jung-Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.38 no.5
    • /
    • pp.694-703
    • /
    • 2008
  • Purpose: The purpose of this study was to identify the quality of life and its predictors in low income Korean aged. Methods: This was a predictive correlational study. An accessible sample from the population of people who were 65 and over and were supported by the basic livelihood security system was 1,040. Quota sampling with strata of state division in the nation was chosen. Quality of life and its predictors in the subjects were measured. Results: The mean quality of life in the subjects was 47.0$\pm$10.7. Predictors of this study significantly explained 54.3% of the total variance of quality of life. Depression was the most significant predictor of quality of life. Health problems, district, social support, leisure activity, and health behavior had effects on quality of life. Conclusion: This finding indicates that quality of life in lower income Korean aged is different from other populations by economic status. Demographics, health status and social status were predictors of quality of life in the aged with a small income.

Traffic Anomaly Detection for Campus Networks using Fisher Linear Discriminant (Fisher 선형 분류법을 이용한 비정상 트래픽 탐지)

  • Park, Hyun-Hee;Kim, Mee-Joung;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.140-149
    • /
    • 2009
  • Traffic anomaly detection is one of important technology that should be considered in network security and administration. In this paper, we propose an abnormal traffic detection mechanism that includes traffic monitoring and traffic analysis. We develop analytical passive monitoring system called WISE-Mon which can inspect traffic behavior. We establish a criterion by analyzing the characteristics of a traffic training set. To detect abnormal traffic, we derive a hyperplane by using Fisher linear discriminant and chi-square distribution as well as the analyzed characteristics of traffic. Our mechanism can support reliable results for traffic anomaly detection and is compatible to real-time detection. In addition, since the trend of traffic can be changed as time passes, the hyperplane has to be updated periodically to reflect the changes. Accordingly, we consider the self-learning algorithm which reflects the trend of the traffic and so enables to increase the pliability of detection probability. Numerical results are presented to validate the accuracy of proposed mechanism. It shows that the proposed mechanism is reliable and relevant for traffic anomaly detection.

  • PDF

Factors affecting the Health Promotion Behaviors of the Low-Income Elderly Living Alone -Focusing on the Mediating Effect of Social Support (저소득 독거노인의 건강증진행위에 관한 융합적 연구 -사회적 지지의 매개효과를 중심으로-)

  • Cho, Sung-Hui
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.423-431
    • /
    • 2015
  • This study aimed to examine the mediating effect of social support in the influence of depression on the health promotion behavior of low-income elderly living alone. The data were collected from 294 elderly recipients of national basic livelihood security who are living alone and the data were analyzed by path analysis. The results were that depression and social support had direct effect on health promotion behaviors and depression had indirect effect on health promotion behaviors through mediating effect of social support. Results showed the importance of depression and social support in the health promotion behaviors of the low-income elderly living alone, which should be considered in the intervention. On the basis of the results, practical suggestions to increase the health promotion behaviors of the low-income elderly living alone were discussed.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF