• Title/Summary/Keyword: Threat analyzing

Search Result 154, Processing Time 0.028 seconds

Analysis of Attitudes and Influencing Factors on Foreign Workers (외국인 근로자에 대한 태도와 영향요인 분석)

  • Lee, Misook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.150-160
    • /
    • 2018
  • The purpose of this study is to classify the attitudes of Korean people regarding foreign workers and to analyze the influence factors. Analysis of the attitude difference and the influential factors utilized the SPSS ${\chi}^2$ test and multinomial logistic regression analysis using 2016 data obtained from the 'Koreans' Consciousness and Values'. Socio-demographic variables, national identity, and socioeconomic variables were used as explanatory variables. The attitude types (friendly, negative, and dual) of respondents were identified, and the influence of explanatory variables influencing these attitudes was identified. Analysis found they have a relatively generous stance on granting legal rights, while they are negative regarding the economic and social threats from foreign workers. As a result of analyzing the factors affecting attitudes, there are significant differences in each influence. However, negative attitudes and dual attitude concerning with negative legal rights found common to the influence of the factors of national identity. Gender and ratio of foreign workers were influential factors for dual attitudes with a high economic threat. On the other hand, socioeconomic factors reflecting the realistic conflict theory were not found to have any effect. The negative attitude of foreign workers in our society can be regarded as cognitive threats rather than realistic experiences or conflicts.

Factors Affecting the Threat Awareness of Multiculture Society: Focusing on the Differences in Perception of Koreans and Resident Foreigners in Korea (다문화 사회의 위협인식에 대한 영향요인: 한국인과 거주 외국인의 인식차이를 중심으로)

  • Jeong, Hana
    • 한국사회정책
    • /
    • v.23 no.2
    • /
    • pp.83-112
    • /
    • 2016
  • Increase of immigrants in Korean society means that ethnic and cultural diversity witnessed in Western immigration countries is also appearing in overall Korean society. The purpose of this study is to suggest policy directions which fit multicultural society in the future by comparing and analyzing the difference in the recognition of multiculturalism between Koreans and immigrants. As the result of empirical analysis, it turned out that there is difference in recognition between Koreans and immigrants, for which different policy directions are required. First, it was contact experience that decided Koreans' multicultural attitudes. High level of influence of contact experience means that although Koreans take multicultural society as granted, they actually have low level of contact experience with immigrants, which requires policy tools to convert actual strengthened contact experience into positive directions. Second, in the case of immigrants, the less they recognize discrimination and the more bias is fortified, the more they accept multiculturalism as a threat. This exhibits their dual sense of identity in which they recognize themselves as foreigners toward Koreans but they distinguish themselves from other foreigners. Thus, assimilation to Korean society is not deemed to be the only alternative and Korean society needs to practice genuine multiculturalism to strengthen immigrants' ethnic identity. Study also conducted in-depth discussions on the implications of above results.

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

Breeding Status and Management System Improvement of Pseudemys concinna and Mauremys sinensis Designated as Invasive Alien Turtles in South Korea (법적지정 생태계교란생물의 사육 현황과 관리 개선 방안 - 리버쿠터와 중국줄무늬목거북을 중심으로)

  • Kim, Philjae;Yeun, Sujung;An, Hyeonju;Kim, Su Hwan;Lee, Hyohyemi
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.4
    • /
    • pp.388-395
    • /
    • 2020
  • Exotic species have been imported for economic purposes, but more recently, an increasing number of animals are imported as pets. With the increasing popularity of two species of turtles, Mauremys sinensis and Pseudemys concinna, the number of pet turtle owners has gradually increased since 2014. The number of turtles increased by 180 in 2017 and 281 in 2019. However, these turtle species have been abandoned to nature, owing to their long lifespans and the changes in conditions of pet owners. The two turtle species have been designated as invasive alien species (AIS) in Korea considering their ecological risks, and the Biological Diversity Act prohibits their release. The owners of Mauremys sinensis and Pseudemys concinna are required to submit the "Application for Approval of Breeding and Grace for AIS" document. In this study, the breeding conditions for the two turtle species were investigated by analyzing the information in the submitted applications for six months (e.g., the suitability of breeding facilities, number of turtles, breeding period, type of pet adoption, and local district of pet owner). A total of 614 cases were analyzed. Because only 58% of breeders provided suitable breeding conditions, breeding information and responsible pet ownership training should be offered to prevent abandonment in natural ecosystems. In addition, continuous monitoring is necessary to prepare for potential problems caused by the lack of information in many applications and the one-off licensing policy.

Analysis of the Electromagnetic Leakage from Liquid Crystal Display Monitors (LCD 모니터의 누설 전자파에 대한 분석)

  • Lee, Ho seong;Sim, Kyuhong;Oh, Seungsub;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.9
    • /
    • pp.844-853
    • /
    • 2016
  • Generally, the compromising electromagnetic emanations are generated from LCD(Liquid Crystal Display) monitor which is typical output component of computer. Because display information transmitted to LCD monitor is included in these emanations, there are risks about information leakage of monitor by eavesdropping of leaked signal. So, analysis about possibility of information leakage is necessary because electromagnetic security through the electromagnetic emanations is being at issue. In this paper, the possibility of display information leakage are demonstrated by analyzing the electromagnetic emanations from desktop and laptop monitors. The characteristics of leaked signal from LCD monitor is verified by analyzing display mechanism and the electromagnetic emanations are measured in the long distance by eavesdropping experiment. Also, threat of information leakage is confirmed by recovering display information with several signal processing technique and comprising with target display.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

An Efficient Method for Analyzing Network Security Situation Using Visualization (시각화 기반의 효율적인 네트워크 보안 상황 분석 방법)

  • Jeong, Chi-Yoon;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Na, Jung-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.107-117
    • /
    • 2009
  • Network administrator recognizes the abnormal phenomenon in the managed network by using the alert messages generated in the security devices including the intrusion detection system, intrusion prevention system, firewall, and etc. And then the series of task, which searches for the traffic related to the alert message and analyzes the traffic data, are required to determine where the abnormal phenomenon is the real network security threat or not. There are many alert messages to have to inspect in order to determine the network security situation. Also the much times are needed so that the network administrator can analyze the security condition using existing methods. Therefore, in this paper, we proposed an efficient method for analyzing network security situation using visualization. The proposed method monitors anomalies occurred in the entire IP address's space and displays the detail information of a security event. In addition, it represents the physical locations of the attackers or victims by linking GIS information and IP address. Therefore, it is helpful for network administrator to rapidly analyze the security status of managed network.

A Study on Developing the Adolescent Anger Provocation Scale(AAPS) for Korean Adolescents (한국 청소년 분노유발요인 척도개발연구)

  • Lee, Jee-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.261-272
    • /
    • 2022
  • The aim of the study is to develop the Adolescent Anger Provocation Scale(AAPS) for Korean adolescents. In order to develop the scale, two research processes were conducted. First, a total of 130 items were derived from various related research. After analyzing 130 items by a research team(2 related field professors and 2 Ph.D. students), a total of 54 items reconstructed based on redundancy, cultural relevancy, and appropriateness. Second, a survey was administered among 252 Korean adolescents. After analyzing an exploratory factor analysis, 12 items of poor factor loading were deleted. Thus, seven factors and 42 items were extracted. Seven factors were as follows: (1) threat to self-esteem, (2) uncontrollable situations, (3) violation of personal property, (4) incidents associated with rejection, (5) violation of regulation or rules, (6) disrespectful treatment, (7) unfair treatment due to age. The internal consistency and convergence validity of the scale were supported. The results of confirmatory factor analysis were also reported. In addition, study limitations and recommendations of future research were discussed.

A Simulation Study on the Improvement of Lighting Condition on Sidewalks Considering the Type and Growth of Roadside Trees (가로수의 유형 및 성장을 고려한 보행로 조명환경 개선에 관한 시뮬레이션 연구)

  • Lee, Jong-Sung;Lee, Seok-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.3
    • /
    • pp.93-103
    • /
    • 2013
  • In recently, a growing concern for the health of urban residents increased interests in a variety of outdoor activities simply be done in terms of cost and time. They are specially interested in low-impact and safe exercises around residential or working area. Walking is the one of easily doing exercise in daytime or nighttime near residential area. The sidewalks of boulevard near the residential area is the best place for exercise because of easy access and the green space with roadside trees. However, if the nighttime is not guaranteed the proper lighting condition, the possibility of exposure to crime and the threat to pedestrian safety can be increased. Because roadside trees are one of the potential obstacle for lighting condition, supplementary lightings are important to mitigate interruption for safety. To meet such a need, the purpose of this study is to propose a simulation approach which improves lighting condition on sidewalks of boulevard with variety of roadside trees. To do so, the simulation approach is applied for analyzing the interrupted condition by classified five standard types of roadside trees considering the growth of them and finding optimal layout of supplementary luminaires by lighting types. The results of this approach shows that it is useful for assessing the safety of pedestrian in nighttime.

New Terrorism and National Crisis Management (뉴테러리즘과 국가위기관리)

  • Kim, Boum-Joong;Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.284-291
    • /
    • 2009
  • Changes in the environment of the 21st century, national crisis, national security threats taempoga yimyeonseo type of fast, flexible and diverse, principal, resulting in a diagnosis of a threat far greater than in the past and deal with uncertainty in the features have done. That this study, the traditional concept of terrorism and to examine the characteristics of new terrorism, terrorism by analyzing the actual conditions of, any country to be a target of terrorism, and terrorism, people also can become the target of a real national crisis management in situations In contrast with the policy dimensions of terrorism is to the recommendations.