• Title/Summary/Keyword: Threat Factor

Search Result 179, Processing Time 0.027 seconds

A Study on Developing Low Altitude Multi-layer Air Defense System to Protect Megacities in the Korean Peninsula (한국형 메가시티 저고도 다중방공체계 구축 방안)

  • Sin, Ui-Cheol;Cho, Sang Keun;Park, Sung Jun;Sim, Jun Hak;Koo, Ja Hong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.393-398
    • /
    • 2022
  • Megacities of the Repulic of Korea(ROK) will have increased by urbanization and the fourth industrial revolution. Mgacities are absolutely the opportunity factor to make human life enriched. Simultaneously, those are the challenge foctor considering the crucial conventional threat such as massive artillery and multiple rocket launcher from the North Korea. Israel that has faced the geopolitical situation of ROK developed the Multi-layer air defense system to offset the low altitude threat from the neighboring nations. As a result, Israel substantially removed plenty of Hamas' rockes and suicidal drones in 2021. Applying Israel's concept, North Korea's low altitude threat toward the ROK's megacities can effectively be eliminated. Furthermore, this Multi-layer air defense system can be a game-changer that gets rid of the low and high altitude threat from North Korea and neighboring nations with both hyperconnected sensor-C2-shooter and artificial intelligence. Through this approach, the ROK will be able to achieve the prosperity and prowth of nation at the center of Megacities concentrated on PMESII(Politics, Military, Economy, Society, Information, and Infrastructure) factors.

A Study on the Design Methodology of SE-Based Military Force Construction in Defense Acquisition Process (Focusing on Influencing Factor Priorities) (국방획득 과정에서 SE개념 기반의 군사력건설 설계 방법론 연구(영향요인 우선순위 결정 중심으로))

  • Kim, Heung Bin;Seo, Je Hyeon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2019
  • This paper focuses on the SE concept based on the weapon system design, which is the lack of systematic research at the stage of military requirements creation prior to acquisition management phase. Influence factors were derived by focusing on the core issues that were at issue in the process of requirements analysis, requirements verification, and business management in recent years. Next, the impact factor was prioritized using the AHP technique and then alternatives were suggested. As a result, through the hierarchical analysis process, 'substantiation of necessity' was found to be the most important factor in the large category, and 'satisfaction of the operating concept' was the most important factor. In addition, as a result of calculating the final weight for each nutritional factor, it was analyzed in order of 'enemy threat response ability', 'response to operational environment change', 'performance considering operational environment', and 'guaranteed power generation'. The results of this analysis suggest which factors should be focused on, firstly, based on the concept of SE by the military and JCS.

Cross-cultural Validation of Instruments Measuring Health Beliefs about Colorectal Cancer Screening among Korean Americans

  • Lee, Shin-Young;Lee, Eunice E.
    • Journal of Korean Academy of Nursing
    • /
    • v.45 no.1
    • /
    • pp.129-138
    • /
    • 2015
  • Purpose: The purpose of this study was to report the instrument modification and validation processes to make existing health belief model scales culturally appropriate for Korean Americans (KAs) regarding colorectal cancer (CRC) screening utilization. Methods: Instrument translation, individual interviews using cognitive interviewing, and expert reviews were conducted during the instrument modification phase, and a pilot test and a cross-sectional survey were conducted during the instrument validation phase. Data analyses of the cross-sectional survey included internal consistency and construct validity using exploratory and confirmatory factor analysis. Results: The main issues identified during the instrument modification phase were (a) cultural and linguistic translation issues and (b) newly developed items reflecting Korean cultural barriers. Cross-sectional survey analyses during the instrument validation phase revealed that all scales demonstrate good internal consistency reliability (Cronbach's alpha=.72~.88). Exploratory factor analysis showed that susceptibility and severity loaded on the same factor, which may indicate a threat variable. Items with low factor loadings in the confirmatory factor analysis may relate to (a) lack of knowledge about fecal occult blood testing and (b) multiple dimensions of the subscales. Conclusion: Methodological, sequential processes of instrument modification and validation, including translation, individual interviews, expert reviews, pilot testing and a cross-sectional survey, were provided in this study. The findings indicate that existing instruments need to be examined for CRC screening research involving KAs.

A Study on the Threat Factors of Biodiversity on Hasidong Anin Coastal Dune (하시동·안인사구의 생물다양성 보전 위협 요인 분석)

  • Lee, Eun-Hye;Oh, Choong-Hyeon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.99-114
    • /
    • 2021
  • We examined a current status of damage in biodiversity and its causing factors in Hasidong Anin coastal dune, Gangneung-si, Gangwon province which is designated as ecological and landscape conservation area. In this study, we found that ecosystem and biodiversity have been primarily damaged by anthropogenic factors such as the construction of surrounding area, military facilities illegally dumped garbage and the expansion of windbreak forest. These factors occur to damage the landscape, ecosystem and biodiversity etc. There is a significant lack of basic data needed for preservation and restoration due to the lack of prior research and value assessment. In order to establish solutions for preservation and restoration, it is critical to collect fundamental data and implement value assessments. Therefore, further studies such as ecosystem services assessment, increasing biodiversity, spatial analysis and monitoring of various items related to coastal dunes are needed.

A Research on Activating Factor for Cultivating a Proactive Organizational Security Culture (조직의 능동적 보안문화 형성을 위한 활성화 요인에 관한 연구)

  • Ahn, Byunggoo;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.3-13
    • /
    • 2020
  • Organizations are facing a new, diverse security threat as ICT based industrial environment arises. As a way of effective countermeasure for security threat, organizations are making an effort to establish internalization of security culture, targeting a organizational members. However, members' awareness toward security receptiveness is low as inconvenience exists in business process and existing security culture focuses on controlling and regulating. Accordingly, this research desires to develop a participatory security culture which can higher the efficiency of security work process and induce members' voluntary participation. A comparative analysis on security culture related prior researches is conducted and based on a drawn components, statistical verification is accomplished. It is expected to contribute on future research on measuring a security culture level.

The Development of Vulnerable Elements and Assessment of Vulnerability of Maeul-soop Ecosystem in Korea (한국 마을숲 생태계 취약요소 발굴 및 취약성 평가)

  • Lim, Jeong-Cheol;Ryu, Tae-Bok;Ahn, Kyeong-Hwan;Choi, Byoung-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.4
    • /
    • pp.57-65
    • /
    • 2016
  • Maeul-soop(Village forest) is a key element of Korean traditional village landscape historically and culturally. However, a number of Maeul-soops have been lost or declined due to various influences since the modern age. For this Maeul-soop that has a variety of conservation values including historical, cultural and ecological ones, attention and efforts for a systematic conservation and restoration of Maeul-soop are needed. The purpose of the present study is to provide information on ecological restoration and sustainable use and management of Maeul-soops based on component plant species, habitat and location characteristics of 499 Maeul-soops spread throughout Korea. Major six categories of threat factors to Maeul-soop ecosystem were identified and the influence of each factor was evaluated. For the evaluation of weight by threat factors for the influence on the vulnerability of Maeul-soop ecosystem, more three-dimensional analysis was conducted using Analytic Hierarchy Process (AHP) analysis method. In the results of evaluation using AHP analysis method, reduction of area, among six categories, was spotted as the biggest threat to existence of Maeul-soops. Next, changes in topography and soil environment were considered as a threat factor of qualitative changes in Maeul-soop ecosystem. Influence of vegetation structure and its qualitative changes on the loss or decline of Masul-soop was evaluated to be lower than that of changes in habitat. Based on weight of each factor, the figures were converted with 100 points being the highest score and the evaluation of vulnerability of Maeul-soop was conducted with the converted figures. In the result of evaluation of vulnerability of Maeul-soops, grade III showed the highest frequency and a normal distribution was formed from low grade to high grade. 38 Maeul-soops were evaluated as grade I which showed high naturality and 10 Maeul-soops were evaluated as grade V as their maintenance was threatened. Also in the results of evaluation of vulnerability of each Maeul-soop, restoration of Maeul-soop's own area was found as top priority to guarantee the sustainability of Maeul-soops. It was confirmed that there was a need to prepare a national level ecological response strategy for each vulnerability factor of Maeul-soop, which was important national ecological resources.

A Validation Study on the Children's Perception of Interparental Conflict Scale (자녀가 지각한 부부갈등척도(CPIC)의 타당화 연구)

  • Kwon, Young Ock;Lee, Chung Duk
    • Korean Journal of Child Studies
    • /
    • v.18 no.1
    • /
    • pp.65-80
    • /
    • 1997
  • The purpose of this study was to validate the Children's Perception of Interparental Conflict Scale(CPIC) with Korean children. The subjects were 323 sixth graders from three elementary schools in Seoul. The CPIC Scale (Grych, Seid. & Fincham, 1992). the Children's Depression Inventory(CDI; Kovacs, 1981) and the Revised Children's Manifest Anxiety Scale( RCMAS: Reynolds & Richmond, 1978) were used as methodological instruments. The methods for data analyses were Pearson's r. factor analysis, and Cronbach's. Eight of the nine initial scales showed acceptable levels of internal consistency. The correlations among the CPIC subscales were assessed and the data were examined with factor analysis. Three factors were extracted and labeled 'Conflict Properties, Self-Blame,' and 'Threat', respectively. The validity of the CPIC subscales was assessed by examining correlations between the CPIC subscales and the CDI and the RCMAS, and the coefficients were significant. The three scales demonstrated good internal consistency (Cronbach's=.86, .81, .79).

  • PDF

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

Analysis of Threat Factors of the Chinese Maritime Militia and the Prospect of Maritime Disputes between Korea and China (중국 해상 민병대의 위협요인 분석 및 한·중 해양 분쟁 전망)

  • Park, Byeung chan
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.83-113
    • /
    • 2022
  • Although China's maritime militia has not been well known despite its long history, it is recently emerging as a serious threat to maritime security, causing neighboring countries' security concerns due to the growing number of maritime disputes with China. In this regard, it is now time to clearly define the true nature of the Chinese maritime militia. A close look at the organization and roles of the Chinese maritime militia reveals that it is an organization that is systematically managed and operated by the Chinese government and the People's Liberation Army of China. Its role is to serve the purpose of "contributing to the protection and expansion of China's marine interests." In addition, the threat factors of the Chinese maritime militia were analyzed by examining the cases of maritime disputes between the Chinese maritime militia and neighboring countries. First, the Chinese maritime militia has implemented the "Gray Zone Strategy." Second, it is a systematic organization supported by the Chinese government and the People's Liberation Army. Third, it is a maritime power that cannot be ignored as the world's largest militia organization. Fourth, it has a strategic flexibility that enables the execution of the dual mission of working for a living such as commercial fishing and serving in the maritime militia. The threats of the Chinese maritime militia are not limited to Southeast Asian countries located in the South China Sea. This is also the case in Korea as the country cannot avoid maritime disputes with China such as the Ieodo issue and the boundary delimitation of the West Sea. Accordingly, this study was focused on presenting a predictable scenario and countermeasures based on the analysis through a scenario technique with respect to the two cases that are most likely to occur in Korea-China relations. Finally, beyond identifying the nature of the Chinese maritime militia, this study takes a further step to share considerations as to how the organization may operate and develop in the future and how we can cope with its moves.

  • PDF

Use of americium as a burnable absorber for VVER-1200 reactor

  • Shelley, Afroza;Ovi, Mahmud Hasan
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2454-2463
    • /
    • 2021
  • The objective of this research is to the use of americium (AmO2) as a burnable absorber effectively instead of conventional gadolinium (Gd2O3) for VVER-1200 reactor by analyzing its impacts on reactivity, power peaking factor (PPF), safety factor, and quality of the spent fuel. The assembly is burned to 60 GWd/t by using SRAC-2006 code and JENDL-4.0 data library for finding the optimum amount and effective way of using AmO2 as a burnable absorber. From these studies, it is found that AmO2 can decrease the excess reactivity like Gd2O3 without changing the criticality life span and enrichment of 235U. A homogeneous mixture of the 0.20% AmO2+ 4.95% enriched UO2 fuel rod (model MF-4) decreases the PPF than the reference assembly. The use of AmO2+UO2 in the integral burnable absorber (IBA) rod or the outer layer could also decrease the PPF up to 10 GWd/t but increases rapidly after 30 GWd/t, which could be a safety threat. The fuel temperature coefficient and void coefficient of the model MF-4 are the same as the reference assembly. In addition, 22% of initially loaded Am are burning effectively and contributing to the power production.