• Title/Summary/Keyword: Security Measurement

Search Result 445, Processing Time 0.027 seconds

노년기 여성의 사회심리적 특성과 의복행동간의 상관성 연구

  • Im, Suk-Ja;Im, Chi-Gyeong
    • Journal of the Korean Society of Costume
    • /
    • v.10
    • /
    • pp.51-62
    • /
    • 1986
  • The purpose of this study was to investigate the relationships among Clothing Satisfaction, Social approval, Psychological dependence, and Social security-insecurity and to determine the difference of clothing behaviors by the demographic variables such as age, socioeconomics status, education, religion, and material status. Clothing Satisfaction was measured by Rim's Questionnaire(1974) moditide and supplemented for this study. For the measurement of Social approval and Psychological dependence, the Clothing Interest Inventory developed by Creekmore (1971) was adapted for this story. The measurement for the Social security-insecurity was adapted from Lapitsky's (1961) Social Security Inventory. Data were collected from 322 purposively selected elderly women over sixty dwelling in Seoul by means of interviews. For statistical analysis, frequency distribution, one-way analysis of variance, Pearson's correlation coefficients were used. The results were as follows: 1. There were significant relationships among Clothing satisfaction, Social approval, and Psychological dependence. Negative significant relaionships were found between Clothing satisfaction and Social approval and between Clothing satisfaction and Psychological dependence. 2. There was negative significant relationship between Social security-insecurity and Clothing satisfaction, while positive significant relationships were found between Social security-insecurity and Social approval, and between Social security- insecurity and Psychological dependence. 3. There was significant difference in Clothing satisfaction according to socioeconomic status and education. 4. There was significant difference in Social approval according to socioeconomic statusand education. 5. There was significant difference in Psychological dependence according to education and religion.

  • PDF

A Study on Evaluation Criteria and Procedures for Measuring Radiation Leakage of Aviation Security Equipment (항공보안장비 방사선 누출량 측정을 위한 평가 기준 및 절차에 관한 연구)

  • Kihyun Kim;Ye-Eun Jeong;Ye-Jun Kim;Yong Soo Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.3
    • /
    • pp.435-444
    • /
    • 2023
  • Purpose: To attain advanced performance certification, safety aspects along with functionality and performance are essential. Hence, this study suggests radiation leakage assessment methods for aviation security equipment during its performance certification. Methods: Detection technology guided the choice of radiation leakage assessment targets. We then detailed measurement and evaluation methods based on equipment type and operation mode. Equipment was categorized as container or box types for establishing measurement procedures. Results: We've developed specific radiation leakage assessment procedures for different types of aviation security equipment, crucial for ensuring airport safety. Using these procedures allows efficient evaluation of compliance with radiation leakage standards. Conclusion: The suggested radiation leakage assessment method aims to enhance aviation security and reliability. Future research will focus on identifying risks in novel aviation security equipment detection technologies and establishing safety standards.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

Optimal WAMS Configuration in Nordic Power System

  • Mohamed A.M. Hassan;Omar H. Abdalla;Hady H. Fayek;Aisha H.A. Hashim;Siti Fauziah Toha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.130-138
    • /
    • 2023
  • The Smart grids are considered as multi-disciplinary power systems where the communication networks are highly employed. This paper presents optimal wide area measurement system (WAMS) configuration in Nordic power system. The transition from SCADA to WAMS becomes now trend in all power systems to ensure higher reliability and data visibility. The optimization applied in this research considered the geographical regions of the Nordic power system. The research considered all the devices of WAMS namely phasor measurement units (PMUs), phasor data concentrators (PDCs) and communication links. The study also presents two scenarios for optimal WAMS namely base case and N-1 contingency as different operating conditions. The result of this research presents technical and financial results for WAMS configuration in a real power system. The optimization results are performed using MATLAB 2017a software application.

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

Morale enhancing determination model of information security (정보보호 사기진작 결정모델 연구)

  • Kim, Kyongwon;Lim, Jong In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.889-903
    • /
    • 2015
  • As the number of recent information security incident occurrence increases, more and more workload and liability pressure are given to info-security professionals, which results in decrease of morale level of working groups in the field. In order to solve this problem, Korean government is providing various action plans to improve the morale level of info-security professionals, and also requiring financial companies to submit its own action plan of increasing morale of info-security professionals to Financial Service Agency. For this study, based on the previous studies and relevant professionals' interviews, we selected 16 critical morale increase variables, and performed survey for empirical analysis. As a result, 3 features; role, system, and relationship were presented as the main factor of morale increasement of info-security professionals. This study also suggests a decision making method of utilizing the developed morale measurement model for individual organizations.

Accuracy of Data-Model Fit Using Growing Levels of Invariance Models

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.157-164
    • /
    • 2021
  • The aim of this study is to provide empirical evaluation of the accuracy of data-model fit using growing levels of invariance models. Overall model accuracy of factor solutions was evaluated by the examination of the order for testing three levels of measurement invariance (MIV) starting with configural invariance (model 0). Model testing was evaluated by the Chi-square difference test (∆𝛘2) between two groups, and root mean square error of approximation (RMSEA), comparative fit index (CFI), and Tucker-Lewis index (TLI) were used to evaluate the all-model fits. Factorial invariance result revealed that stability of the models was varying over increasing levels of measurement as a function of variable-to-factor ratio (VTF), subject-to-variable ratio (STV), and their interactions. There were invariant factor loadings and invariant intercepts among the groups indicating that measurement invariance was achieved. For VTF ratio (3:1, 6:1, and 9:1), the models started to show accuracy over levels of measurement when STV ratio was 6:1. Yet, the frequency of stability models over 1000 replications increased (from 69% to 89%) as STV ratio increased. The models showed more accuracy at or above 39:1 STV.

Tracking ond Distance Measurement of the Moving Object in Stereo Camera System as a Security Equipment (방범 설비의 스테레오 카메라 시스템에서 이동객체의 추적과 거리측정)

  • 이재수;홍권의;손영우
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.4
    • /
    • pp.106-115
    • /
    • 2003
  • In crossing stereo camera system as a security equipment system, a new algorithm for the tracking method of the moving object and the measurement method of distance of the object from cameras to moving object is proposed. The stereo input images are matched by a pixel for the moving object extraction, then the moving elements obtained from an adaptive threshold's value for an error correction and the moving object area extracted by noise eliminative algorithm. In addition to, the moving object traced by control pan/tilt of cameras using a coordinate value of the moving object, and the measurement method of distance to moving object by using special features of the crossing stereo camera system is proposed. From the experimental results, the proposed algorithm was found to be able to measure of the distance and trace for moving object in a stereo security camera system. The error rate of a distance measurement be existed within 6%. Moreover in implementation the proposed algorithm, the stereo security system, the automatic moving robot system and the stereo remote control system will be applied practical application.

Development and Application in Measurement of Security Need Satisfaction From Users of Electronic Security System (기계경비시스템 이용자의 안전욕구충족 척도 개발과 적용)

  • Kim, Chan-Sun
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.47-64
    • /
    • 2008
  • The purpose of this study is to develop the measurement of security needs satisfaction from users of electronic security system, to verify its validity and reliability, and by applying them, to examine the effects between the communities using this system. In 2008, the users of electronic security system in big cities in Seoul(Yong-San, Jong-Lo) and Gyung-Gi Do(Su-Won) for their convenience stores, jewelry shops, communication services, banks, government and public offices, etc. were arranged for a population and 262 of them were used for the final analysis by purposive sampling. This study yields following results. First, the validity of security need satisfaction from users of electronic security system is very high, which means the explanatory adequacy of environmental security need is the highest. Second, the reliability of security need satisfaction from users of electronic security system is very high, in which the reliability value(Cronbach's $\alpha$) of internal consistency is over .765. Third, the security need of electronic security system has the most effects on the group of bank workers. That is, through a close cooperative system between the bank and the service of electronic security system, the more keeping satisfied the environmental, bodily, physical security needs are, the less the in security of this group has. Informational security need has the most effects on convenient store group. It means the service companies of electronic security system offer more services at dawn time and make or supply all sorts of visual information system, which reduces insecurity of the convenient store group.

  • PDF