• Title/Summary/Keyword: Threat awareness

Search Result 85, Processing Time 0.023 seconds

The Relationship between National Identity, Threat Awareness, and Multi-cultural Acceptability - Moderating Effect of Living in Ethnic Places - (국민정체성과 위협의식, 다문화수용성의 관계에 관한 연구 - 외국인 밀집지역 거주여부의 조절효과를 중심으로 -)

  • Park, Seoyeon
    • Journal of the Korean Regional Science Association
    • /
    • v.35 no.1
    • /
    • pp.19-31
    • /
    • 2019
  • This study examines the effect of national identity and threat awareness on the multi-cultural acceptability and whether contact theory actually work. For the analysis, this study used '2013 Korea General Social Survey' data and compared two groups divided according to whether or not they live in ethnic places using structural equation modeling. The empirical analysis shows that national identity does not have a direct effect on multi-cultural acceptability, and threat awareness has a full mediating effect between national identity and multi-cultural acceptability. In addition, the negative effect of the threat awareness on multi-cultural acceptability was greater in groups living in ethnic places. The findings suggest that multi-cultural awareness education is necessary to reduce the threat awareness toward foreigners, and that community-level programs are needed to prevent and coordinate conflicts arising from contact between foreigners and Koreans.

Development of an Autonomous Situational Awareness Software for Autonomous Unmanned Aerial Vehicles

  • Kim, Yun-Geun;Chang, Woohyuk;Kim, Kwangmin;Oh, Taegeun
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.2
    • /
    • pp.36-44
    • /
    • 2021
  • Unmanned aerial vehicles (UAVs) are increasingly needed as they can replace manned aircrafts in dangerous military missions. However, because of their low autonomy, current UAVs can execute missions only under continuous operator control. To overcome this limitation, higher autonomy levels of UAVs based on autonomous situational awareness is required. In this paper, we propose an autonomous situational awareness software consisting of situation awareness management, threat recognition, threat identification, and threat space analysis to detect dynamic situational change by external threats. We implemented the proposed software in real mission computer hardware and evaluated the performance of situational awareness toward dynamic radar threats in flight simulations.

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.12
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

A Study on Complex Threat Emulation for Situation Awareness of ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2180-2186
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon systems, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to protect the platform and operator against at modernized hostile weapon. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. In this study, it describes the fact that the performance of ASE system with proposed threat integration algorithm is verified in the developed threat emulation system and also, suggests system verification method before deployment by dealing with complex threat situation.

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness (자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류)

  • Jeong, Yong-Woong;Noh, Sang-Uk;Go, Eun-Kyoung;Jeong, Un-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

The Study on the Difference of Information Security Awareness between PC and Smartphone (사용자의 PC와 스마트폰에 대한 정보보안 인식 차이에 관한 연구)

  • Piao Zhengxian;Sungmin Kang
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.69-89
    • /
    • 2017
  • In the information age, the rapid development of information technology provides people with an enriching experience yet also causes them harm because of information security (IS) issues. The IS of smartphones faces great challenges. Although many studies on IS awareness have been conducted, most of them have focused on PCs and do not consider the security issues of smartphones. In this study, we focus on those factors that affect IS awareness for both PCs and smartphones. We also analyze the differences in the impacts of certain factors on PCs and smartphones based on the proposed research model. The results are summarized as follows. First, the understanding of security technique, understanding of IS threat, and IS education have significant impacts on IS awareness for PCs and smartphones, while IS intention has a significant impact on IS awareness for PCs but not for smartphones. Moreover, IS policy has no significant impact on IS awareness. Second, PCs and smartphones show no significant differences in IS awareness, IS threat, and IS intention, but show significant differences in understanding of security technique, IS education, and IS policy.

E-Safety Awareness of Saudi Youths: A Comparative Study and Recommendations

  • Alharbi, Nawaf F;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah F
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.181-188
    • /
    • 2021
  • The use of the internet has become a basic need for many across the globe. The situation is very much the same for the youth in many countries like Saudi Arabia who have grown up surrounded and accessing the internet. This demographic, however, is at an increased risk of falling as victims to cybercrime because of a low level of technical awareness. This review looks at the level of technical awareness of internet use in 3 different countries which include the USA, South Africa, and New Zealand. The review will compare the situation in these nations with those in KSA. Based on the review and comparisons, recommendations are made for culturally and socially acceptable e-Safety awareness of Saudi youths.