• Title/Summary/Keyword: Threat Management

Search Result 651, Processing Time 0.026 seconds

Effects of the User's Perceived Threat to Freedom and Personalization on Intention to Use Recommendation Services (자유 위협과 개인화에 대한 사용자의 지각이 상품 추천 서비스 수용에 미치는 영향)

  • Lee, Gyu-Dong;Kim, Jong-Uk;Lee, Won-Jun
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.123-145
    • /
    • 2007
  • There are flourishing studies in the acceptance or usage of information systems literature. Most of them have taken the pro - acceptance view. Undesirably, information technologies often provoke users' reactance or resistance. This paper explores one of the negative reactions -psychological reactance. The present paper studies the effects of the users' perception of threatened freedom and personalization degree on intention to use recommendation services. High personalization can be a major motivation for users to accept recommendation systems. However recommendation services are a two-edged sword, which not only provides users the efficiency of decision making but also poses threats to free choice. When people consider that their freedom is reduced or threatened by others, they experience the motivational state to restore the freedom. This motivational state must be considered in understanding usage of information systems, especially personalized services which are designed for persuasion or compliance. This paper empirically investigates the effect of personalization and the psychological reactance on the intention to use information systems in the personalized recommendation context. Users' perception of personalization increases the usefulness of recommendation service while their perception of threat to freedom reduces the intention to use personalized recommendation service. Findings and implications are discussed.

Security Information and Event Management System for Ship Cyber Security (해사 사이버 보안 대응을 위한 선박용 보안 정보와 이벤트 관리 시스템)

  • Nam-seon Kang;Chang-sik Lee;Seong-sang Yu;Jong-min Lee;Gum-jun Son
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.497-506
    • /
    • 2024
  • In this study, we proposed security information and event management for ship as a technology to respond to maritime cybersecurity regulations and evolving cyber threats. We analyze the main technologies of network management system and security information and event management, which are representative technologies for responding to ship cyber security, and propose SIEM for ships based on this. Optimized for ships based on the International Maritime Organization's Maritime Cyber Threat Management Guidelines, IACS UR E26, 27, etc. Derive the main functions of the SIEM for ship, linkage and normalization plan for the ship's heterogeneous equipment, ship's cyber threat and ship detection policy to identify ship's cyber security threats, and ship's operating environment and operating personnel.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

A Study on the Simplified Estimating Method of Off-site Consequence Analysis by Concentration of Hydrochloric Acid (염산수용액의 농도별 간이 영향 평가 방법 연구)

  • Jung, Y.k.;Kim, B.;Heo, H.;Yoo, B.;Sin, C.;Yoon, Y.;Yoon, J.;Ma, B.
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.2
    • /
    • pp.52-58
    • /
    • 2017
  • One of the most important elements of the management of chemical accident is threat zone estimation of fires, explosions and toxic gas dispersion based on chemical releases. The threat zone estimation is going to be standard of emergency response for the first defender and base line data of off-site risk assesment (hereinafter referred to as "ORA") and risk management plan (hereinafter referred to as "RMP"). Generally, ALOHA form EPA(U.S.) and Kora(from KOREA MINISTRY OF ENVIRONMENT) has been used for the off-site consequence analysis in Korea. However it is hard to predict accurate consequences rapidly in case of emergency. Hydrochloric acid is a multipurpose raw material used in many industrial applications such as chemical, metal and food industries. It is usually treated in concentrations from 10 ~ 35 %, and release accident have occurred frequently. In this study, we have developed a simplified estimating method and equation to calculate threat zone easily in case of emergency due to release accident of hydrochloric acid.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory (언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로)

  • Lee, Seohyun;Lee, Saerom;Kwak, Dong-heon
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.45-64
    • /
    • 2022
  • With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

조기 경보와 위협관리

  • 채현주
    • Review of KIISC
    • /
    • v.15 no.1
    • /
    • pp.17-22
    • /
    • 2005
  • 웜, 바이러스, 해킹 등 아직 일어나지 않은 사이버 위협을 예측하여 소기 예·경보를 통해 능동적으로 방어할 수 있는 위협관리시스템(TMS; Threat Management System)이 보안업계의 새로운 관심분야로 떠오르고 있다. 본 논문에서는 이 위협관리시스템의 개념과 기능에 대해 선명하고, 이를 통한 조기 경보의 방법을 논의하고자 한다.

Unknown Threats Detection by Using Incremental Knowledge Acquisition (상황 지식 축적에 의한 알려지지 않은 위협의 검출)

  • Park, Gil-Cheol;Cooke, Hamid B. M.;Kim, Yang-Sok;Kang, Byeong-Ho;Youk, Sang-Jo;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.19-27
    • /
    • 2007
  • Detecting unknown threats is a paradox ; how do you detect a threat if it is not known to exist? The answer is that unknown threat detection is the process of making a previously unknown threat identifiable in the shortest possible time frame. This paper examines the possibility of creating an unknown threat detection mechanism that security experts can use for developing a flexible protection system for networks. A system that allows the detection of unknown threats through monitoring system and the incorporation of dynamic and flexible logics with situational knowledge is described as well as the mechanisms used to develop such a system is illustrated. The system not only allows the detection of new threats but does so in a fast and efficient manner to increase the available time for responding to these threats.

  • PDF

A study of Structural relationship between public crisis communication and Heart & Fellings influence and behavioral intention in crisis risk situations (국가적 위기·위험상황에서 대중(大衆) 위기커뮤니케이션과 심정(心情) 영향력 및 행동의도간의 구조적 관계)

  • Lee, Jung-Eun
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.239-251
    • /
    • 2022
  • This study tried to understand the structural relationship between public crisis communication, emotional influence, and behavioral intention in a national crisis/risk situation. Based on the results of previous studies and empirical studies, the results of crisis/threat type, crisis/threat response, sentiment (crisis/risk responsibility, strategic risk/risk reflective response), and action intention For tourists who visit tourist destinations, as well as the relationship between crisis and risk communication at the tourist destination and one of the unique emotions of Koreans (crisis threat responsibility, strategic response, and reflective response to crisis threat) The relationship between the outcome variable, behavioral intention, was identified. A theoretical study was conducted on each research concept to achieve the proposed research purpose. Based on this, a questionnaire was drawn up and empirical research was conducted in parallel. Three hypotheses were established, and meaningful results were confirmed according to the results of the hypotheses. When a risky situation occurs, the government, business, and local community will actively respond and respond to it as an opportunity to offset the risk of crisis.