• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.028 seconds

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.

A Study on the Characteristics of Easy Payment Systems for Facilitating Online Sales (온라인 시장 활성화를 위한 간편결제 특성에 관한 연구)

  • Choi, Sujung;Kim, Changsik;Kwahk, Keeyoung;Kim, Heewoong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.259-271
    • /
    • 2016
  • This study develops an extended model to predict customer satisfaction in easy payment systems based on information systems success model. Our data was collected from easy payment systems users and analyzed using PLS. This study selected four variables as easy payment systems characteristics(convenience, variety, security, speed) along with gender being used as a moderating variable. The results showed that convenience and security are turned out to affect customer satisfaction. Additionally, the test of difference in gender revealed that with respect to gender, moderating effects exist in security and speed. This implies that this study can provide different promotion strategies according to gender. Overall, the proposed model could be used to predict customers' willingness to pay on the easy payment systems.

The Relation of Attachment and Mother-Child Interactions to Peer Interactions (유아의 애착 및 어머니-유아 상호작용과 또래 상호작용간의 관계)

  • Lee, Young;Rah, Yu Mee
    • Korean Journal of Child Studies
    • /
    • v.20 no.3
    • /
    • pp.19-32
    • /
    • 1999
  • This study analyzed the relation of children's attachment security and mother-child interaction to children's peer interactions. The subjects were 51 preschoolers, 44 to 57 months of age and their mothers. Attachment was assessed using the Attachment Q-set (Waters, 1987), mother-child interactions at home were observed with the use of the Teaching Strategies Rating Scales (Erickson, Sroufe, Egeland, 1985), and peer interactions were observed during free play time, using the Holloway and Erickson(1988) categories. Pearson correlation and multiple regression showed that attachment security scores were negatively related to dependency toward peers. Mother's "structure and limit setting" and "respect for child's autonomy" were positively related to "helping with peers" and negatively to "asking for help" and "physical attack". The variables accounting for dependency toward peers were mother's hostility and attachment security.

  • PDF

Development Strategy of Information Security Industry (정보보호산업 발전전략)

  • 박성욱;고성혁;이현우;김현종
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.439-442
    • /
    • 2002
  • As Information security businesses has just emerged in Korea, they have several weakness like small size, lack of resources, the urgent need of qualified R&D personnels to compete in global markets. The purpose of this study is to explore the present situation of Korean information security industry and develop supportive strategies of the government for the internationalization of them.

  • PDF

Senior Level Leadership of the Knowledge-Intelligence-Science Military (지식.정보.과학군대의 고급대제 리더십)

  • Jo, Yeong-Gap
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.1-44
    • /
    • 2006
  • Today, the times of knowledge-intelligence made changes of the ordinary life of citizens society, and also changed greatly the circumstance of leadership in the military. The times of knowledge-intelligence changed the circumstances of national security and the features of warfares, and also make affecting decisively to senses and style of new who were servicing in the military. In order to response effectively against the changes of those leadership circumstances, senior level leadership should be understand in depth human psychology and battlefield circumstances in the dimension of policies and strategies, and should be executed their leadership. In this thesis, I reviewed the concept and vision of senior level leadership theories and cases about traits and roles In addition, I suggested development options for senior level leadership such as (1) high charactenstics and professionalism, (2)educational center of military for advanced democratic citizen and leadership, (3)execution of leadership in psychological leadership, (4)development of leadership needed in the battlefield Finally, the current military senior level leadership should be changed from one-side and authority style to the change-orientated style, which could believe and participate by themselves.

  • PDF

Multi-functionality of honey bees for eco-friendly food production (환경친화적 식량생산을 위한 꿀벌의 다원적 가치)

  • Jung, Chuleui
    • Food Science and Industry
    • /
    • v.55 no.2
    • /
    • pp.166-175
    • /
    • 2022
  • Current food system has developed with the agricultural innovation to feed the increasing population of the world, but with high costs such as environmental contamination and inequality with low sustainability. Human has developed long history of mutualistic interaction with honey bee. This manuscript describes the multi-functionality of honey bee for food production. Firstly honey bee produces honey, bee pollen, royal jelly and propolis which are rich in functionality. Second honey bee serves as the main pollinator for crop production which is worth for 28% of total crop production values in Korea. Lastly honey bee can be an alternative meat produciton system with lower energy, carbon costs but higher nutritional security. This manuscript described those parts and discussed the multi-functionality of honey bees for eco-friendly food security pursuing lowered environmental cost and carbon-zero strategies in the climate change era.

Parallel Implementation of Scrypt: A Study on GPU Acceleration for Password-Based Key Derivation Function

  • SeongJun Choi;DongCheon Kim;Seog Chung Seo
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.98-108
    • /
    • 2024
  • Scrypt is a password-based key derivation function proposed by Colin Percival in 2009 that has a memory-hard structure. Scrypt has been intentionally designed with a memory-intensive structure to make password cracking using ASICs, GPUs, and similar hardware more difficult. However, in this study, we thoroughly analyzed the operation of Scrypt and proposed strategies to maximize computational parallelism in GPU environments. Through these optimizations, we achieved an outstanding performance improvement of 8284.4% compared with traditional CPU-based Scrypt computations. Moreover, the GPU-optimized implementation presented in this paper outperforms the simple GPU-based Scrypt processing by a significant margin, providing a performance improvement of 204.84% in the RTX3090. These results demonstrate the effectiveness of our proposed approach in harnessing the computational power of GPUs and achieving remarkable performance gains in Scrypt calculations. Our proposed implementation is the first GPU implementation of Scrypt, demonstrating the ability to efficiently crack Scrypt.

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • Journal of Distribution Science
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF