• Title/Summary/Keyword: Threat Management

Search Result 651, Processing Time 0.029 seconds

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing (사이버위협정보 공유 활성화를 위한 관리적·기술적 개선모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • This paper shall suggest the improvement model for invigorating cyber threat information sharing from the national level, which includes, inter alia, a comprehensive solutions such as the legislation of a guideline for information sharing, the establishment of so-called National Center for Information Sharing, the construction and management of a integrated information system, the development of techniques for automatizing all the processes for gathering, analyzing and delivering cyber threat information, and the constitution of a private and public joint committee for sharing information, so much so that it intends to prevent cyber security threat to occur in advance or to refrain damage from being proliferated even after the occurrence of incidents.

Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere (해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.44
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

Nurses' Calling, Perceived Risk, Performance on Standard Precautions, and Burnout in the COVID-19 Pandemic (COVID-19 팬데믹 상황에서 간호사의 소명의식, 지각된 위험, 표준주의지침 수행 및 소진)

  • Hyun Jeong;Younghye Go;Mihyun Lee;Miri Jeong
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.65-74
    • /
    • 2023
  • This study aimed to identify the effect of occupational calling, compliance with standard precautions and perceived threat for COVID-19 on the COVID-19 burnout of hospital nurses in the convergence society. The participants were 212 nurses; data were analyzed using t-test, ANOVA, Pearson correlation, multiple regression. This study found that: hospital nurses showed higher score for perceived threat of COVID-19, higher scores for COVID-19 burnout. The main factors influencing COVID-19 burnout were perceived threat of COVID-19 (𝛽=.233), and working unit (𝛽=.154). They explained about 6.7% of the COVID-19 burnout. Therefore, systematic support and nursing education is needed to reduce the perceived threat of COVID-19 among nurses.

Understanding the Managing Conditions and Improvement Strategies of Domestic Protected Areas in Korea - Focus on Ecological and Landscape Conservation Areas and Wetland Protected Areas - (국내 보호지역의 관리여건 파악 및 개선방향 고찰 - 생태·경관보전지역, 습지보호지역을 중심으로 -)

  • Choi, Ji-Eun;Chae, Hee-Myung;Cho, Dong-Gil;Kim, Su-Ryeon;Song, Yu-Jin;Moon, Sang-Kyun;Kim, Jong-Cheol;Park, Yong-Su
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2016
  • This study is aimed at using the grasped problems of protected areas in Korea as the basic data for management planning and system improvement of protected areas by grasping realistic problems through the interview with the persons in charge on the basis of general problems of domestic protected areas. To this end, this study deducted major problems in urgent need of improvement, and improvement direction through the survey of the persons in charge of protected areas. This study result is as follows: The major problems, which should be preferentially improved, were found to be shortages of management infrastructure, cooperation between interested parties, and threat factors in protected areas, etc. Such problems are interconnected with each other, thus coming up complexly; therefore, it's necessary to make a comprehensive approach to the problems after confirming the causal relationship of the identified problems. In addition, for the purpose of effective management of a protected area, it's necessary to implement priority management of major problems through different management intensity from the planning phase. Also, it's important to enhance the effectiveness of planning by considering a possible potential threat factor in the outside of protected areas, and referring to the contents of the development plan for the relevant area in time of management planning. Lastly, there is the need for systematic improvement of an institution through thorough status review of the actual state of management planning fulfillment in order to increase the effectiveness of planning in a follow-up study hereafter.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

The Effects of Leadership on the Cockpit Culture in Commercial Airlines (리더십이 민간항공 조종실 문화에 미치는 영향)

  • Kim, Young-Kil;Byeon, Soon-cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.344-356
    • /
    • 2021
  • In the field of civil aviation in Korea, inappropriate crew resources management(CRM) constantly occurs between captains and first officers during flight. Therefore, the active role of first officers is emphasized in pilot training for CRM, threat & error management(TEM), safety management system(SMS), fatigue risk management system(FRMS), and training in simulators. Thus, it is urgent for captains to change their transformational leadership to emotional leadership, advantages of which include horizontal interpersonal relationship, open-mindedness, leading by example, considerateness, mutual respect, and using informal language. For the direction to improve 'the cockpit culture' in civil aviation, the key idea of the current thesis paper is the influence of captains' transformational and emotional leadership on the emotions of first officers.

A Study on the Improvement of Air Traffic Safety Information Management (관제 안전정보 관리체계 개선을 위한 연구)

  • Shin, Oksig;Kim, Ilyoung
    • Journal of Aerospace System Engineering
    • /
    • v.2 no.3
    • /
    • pp.7-11
    • /
    • 2008
  • This is a study to research the effective way to enhance the performance of safety management by gathering and analyzing the information of undesirable occurrences that may result in accident or serious incident. This includes the way to identify the potential hazards related with the proactive activities. As detailed improvements, this paper introduces the mandatory and voluntary reporting system, normal operation safety survey, ATC quality assurance and the encouragement of just culture.

  • PDF

A Study on the Management for Reducing empty truck movements (사업용 화물자동차의 공차운행 감소에 관한 연구)

  • 전만술;김연희
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2002.05a
    • /
    • pp.285-294
    • /
    • 2002
  • This study is focused on the operation of truck with conscious for environmental logistics system to reduce empty truck movements, and to control running empty truck. With the logistics function, road transport represents the biggest environmental threat. Using nonrenewable natural resources, contributing to air and noise pollution, trucks are environmentally unfriendly. Any steps to reduce transport activity will help minimize negative impact. In particular, noxious emissions must be reduced, but in the long term more environmentally friendly vehicles are required.

  • PDF

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment (V2X 융합서비스 환경에서 지능형차량시스템의 위협 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.33-38
    • /
    • 2015
  • In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manager, customer, and anonymous user. Many software applications have considered solutions to be satisfied the specific requirements of driving care programs, and plans. This paper describes data flow diagram of a secure clinic system for driving car diagnosis, which is included in clinic configuration, clinic, clinic page, membership, clinic request processing, driver profile data, clinic membership data, and clinic authentication in the V2X convergence service environment. It is reviewed focusing on security threat issue of ITS diagnostic system such as spoofing, tampering, repudiation, disclosure, denial of service, and privilege out of STRIDE model.