• Title/Summary/Keyword: Security Feedback

Search Result 134, Processing Time 0.023 seconds

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

A Study of Secure Password Input Method Based on Eye Tracking with Resistance to Shoulder-Surfing Attacks (아이트래킹을 이용한 안전한 패스워드 입력 방법에 관한 연구 - 숄더 서핑 공격 대응을 중심으로)

  • Kim, Seul-gi;Yoo, Sang-bong;Jang, Yun;Kwon, Tae-kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.545-558
    • /
    • 2020
  • The gaze-based input provides feedback to confirm that the typing is correct when the user types the text. Many studies have already demonstrated that feedback can increase the usability of gaze-based inputs. However, because the information of the typed text is revealed through feedback, it can be a target for shoulder-surfing attacks. Appropriate feedback needs to be used to improve security without compromising the usability of the gaze-based input using the original feedback. In this paper, we propose a new gaze-based input method, FFI(Fake Flickering Interface), to resist shoulder-surfing attacks. Through experiments and questionnaires, we evaluated the usability and security of the FFI compared to the gaze-based input using the original feedback.

ISM Application Tool, A Contribution to Address the Barrier of Information Security Management System Implementation

  • Chandra, Nungky Awang;Sadikin, Mujiono
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.39-48
    • /
    • 2020
  • Information-security management systems (ISMSs) are becoming very important, even for micro, small, and medium enterprises (MSMEs). However, implementing an ISMS is not an easy task. Many obstacles must be overcome, e.g., complexity, document tracking, competency management, and even changing cultures. The objective of our study is to provide ISMS application tools, based on ISO 27001:2013 ISM frameworks. The application was developed on the Odoo Open Enterprise Resource Planning platform. To validate its feasibility for future improvement, the application was implemented by an MSME company. For this implementation, information-security-related users gave their feedback through a questionnaire. The distributed feedback questionnaire consists of nine assessment parameters, covering topics from the application's technical aspects to users' experiences. Based on the questionnaire feedback, all users of the application were satisfied with its performance.

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao;Wang, Chengqi;Zheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1785-1801
    • /
    • 2017
  • In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

Probabilistic Precontract Pricing for Power System Security (전력계통 안정성확보를 위한 확률적 예약요금제)

  • 임성황;최준영;박종근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.43 no.2
    • /
    • pp.197-205
    • /
    • 1994
  • Security of a power system refers to its robustness relative to a set of imminent disturbances (contingencies) during operation. The socially optimal solution for the actuall level of generation/consumption has been well-known spot pricing at shot-run marginal cost. The main disadvantage of this approach arises because serious contingencies occur quite infrequently. Thus by establishing contractual obligations for contingency offering before an actual operation time through decision feedback we can obtain socially optimal level of system security. Under probabilistic precontract pricing the operating point is established at equal incremental cost of the expected short-run and collapse cost of each participant. Rates for power generation/consumption and for an offer to use during a contingency, as well as information on the probability distribution of contingency need for each participant, are derived so that individual optimization will lead to the socially optimal solution in which system security is optimized and the aggregate benefit is maxmized.

  • PDF

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.

The Effect of the Superior's Leadership style of Private Security Service Employee's on Job Satisfaction (민간경호종사자의 상사 리더십유형이 직무만족에 미치는 영향)

  • Kim, Young-In;Lee, Kye-Sok;Kim, Hee-Kyu
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.91-112
    • /
    • 2007
  • The purpose of this study is to identify effect of superior leadership style in private security service on job satisfaction. The survey research tool was a questionnaire. The subjects of this study were selected from the population of private security service employee's and sampled by using convenience sampling. Data obtained from 448 athletes were used. Questionnaire was used as a tool to attain the purpose of this study, SPSS 12.0 program was used to analyze the data, and statistical tests including correlation analysis and multiple regression analysis were conducted at significance level of p<.05. The results of this study were as follows. First, the democratic behavior, affirmative feedback, training and direction and social support in leadership style have a significant effect on a satisfaction of relation with supervisor. Second, the democratic behavior, affirmative feedback and training and direction in leadership style have a significant effect on a satisfaction of relation with coworkers. Third, the democratic behavior, affirmative feedback and training and direction in leadership style have a significant effect on a satisfaction of work. Fourth, the democratic behavior and authoritative behavior in leadership style have a significant effect on a satisfaction of pay. Finally, the democratic behavior, affirmative feedback and training and direction in leadership style have a significant effect on a satisfaction of promotion opportunity.

  • PDF

Disturbance Torque Suppression Control of Servo Motors for Missile Fin Actuators (미사일 Fin 액츄에이터용 서보모터의 외란 토크 억제 제어)

  • Kim, Chang-Hwan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.311-343
    • /
    • 2003
  • In this paper, we propose a generalized disturbance torque suppression control scheme of servo motors for missile fin actuators. Our controller consists of both a model based feed-forward controller and a stabilizing feedback controller. The feed-forward controller is designed such that the output of nominal plant tracks perfectly the reference position command with a desired dynamic characteristics. The feedback controller stabilizes the overall closed loop system. Furthermore, the feedback controller contains a free function that can be chosen arbitrary. The free function can be designed so as to achieve both the suppression of disturbances and the robustness to model uncertainties. In order to illuminate the superior performance of our control scheme to the conventional ones, we present some simulation results.

  • PDF

Romanian-Lexicon-Based Sentiment Analysis for Assesing Teachers' Activity

  • Barila, Adina;Danubianu, Mirela;Gradinaru, Bogdanel
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.43-50
    • /
    • 2022
  • The students' feedback is important to measure and improve teaching performance. Many teacher performance evaluation systems are based on responses to closed question, but the free text answers can contain useful information which had to be explored. In this paper we present a lexicon-based sentiment analysis to explore students' text feedback. The data was collected from a system for the evaluation of teachers by students developed and used in our university. The students comments are in Romanian language so we built a Romanian sentiment word lexicon. We used this to categorize the feeback text as positive, negative or neutral. In addition, we added a new polarity - indifferent - in order to categorize blank and "I don't answer" responses.

ATM Cell Security Techniques Using OFB Mode on AES Block Cipher (AES 블록 암호에 OFB 모드를 적용한 ATM 셀 보안 기법)

  • Im, Sung-Yeal
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1237-1246
    • /
    • 2021
  • This paper is about Asynchronous Transfer Mode (ATM) cell security in which an Output Feedback (OFB) mode is applied to an AES block ciphers. ATM cells are divided into user data cells and maintenance cells, and each cell is 53 octets in size and consists of a header of 5 octets and a payload of 48 octets. In order to encrypt/decrypt ATM cells, the boundaries of cells must be detected, which is possible using the Header Error Control (HEC) field in the header. After detecting the boundary of the cell, the type of payload is detected using a payload type (PT) code to encrypt only the user cell. In this paper, a security method for ATM cells that satisfies the requirements of ISO 9160 is presented.