• Title/Summary/Keyword: Threat awareness

Search Result 86, Processing Time 0.024 seconds

A study on analysis of 7-Eleven's competition structure and competitiveness using Porter's 5 Force model

  • Kwang-Keun LEE
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.202-208
    • /
    • 2024
  • Objective: The purpose of this study is to examine the competitive environment of 7-Eleven using Porter's 5 Force model to analyze the specific competitiveness of 7-Eleven that has maintained continuous growth as a competitive company. Methods: This study is a case study of 7-Eleven. Results: As a result of the analysis, 7-Eleven has reinforced its competitiveness with existing competitors by raising entry barriers by expanding domestic stores and developing overseas convenience store business, focusing on North America, based on economy of scale. In addition, 7-Eleven seeks to differentiate itself from other convenience stores by developing a "private brand" and strengthens its bargaining power with suppliers through the development of new products by gathering information and know-how of experts in product development based on customer needs. The bargaining power with customers has been strengthened by building loyalty and trust in the brand by allowing consumers to purchase the same products at the same price no matter which store they visit. As a threat to potential competitors, 7-Eleven has secured a competition advantage by raising the barrier to entry by concentrating stores in specific areas through a dominant franchise development strategy and increasing awareness of 7-Eleven among consumers. In the case of threats from substitute products, it was confirmed that 7-Eleven has overcome the threat from substitute products by opening 24 hours a day and providing various services such as ATMs and copiers.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Dengue-related Information Needs and Seeking Behavior of the General Public in Singapore

  • Shaheen, Majid;Hu, Ye;Hui, Yik Tan;Lin, Xinying
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.1
    • /
    • pp.17-28
    • /
    • 2019
  • Dengue infection is becoming a serious global health threat. Public awareness is a pre-requisite for the successful implementation of dengue prevention programs. The main purpose of this study was to investigate dengue-related information needs and seeking behavior of the general public in Singapore. Some areas covered by this study were: importance of dengue-related information needs, preferred channels for seeking information, and respondents' perceptions of using dengue-related information. A questionnaire was used for data collection and 152 individuals participated in this study. Data analysis showed that the most sought after information concerned: dengue-related medicines, primary symptoms of dengue infection, and different possible treatments. The popular channels for seeking information were: websites of hospitals and other health agencies, the social media, television, and newspapers. Medical staff, such as doctors and nurses, were trusted for providing accurate information. Although credibility of social media was considered low, respondents were using it due to its easy accessibility. The findings of this study will be useful to government health departments in Singapore as well as in other countries suffering from dengue, hospitals, and public welfare agencies involved in public health awareness campaigns.

Design to Integrated Display and Caution Function for KHP (기동헬기 통합시현 및 경고 기능 설계)

  • Kim, Sung-Woo;Go, Eun-Kyoung;Lee, Byoung-Hwa
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.6
    • /
    • pp.481-489
    • /
    • 2017
  • Situation awareness means recognizing everything necessary to understand progress in a flight or aircraft maintenance work. Situation awareness is based on more than simply recognizing important about the environment, and it is important to provide the meaning of information in an integrated form. The KHP provides the pilot with integrated situation display for an integrated form of situation awareness and warning that synchronizes the priority based audible signal with the visual signal. Provide integrated display and warning to reduce operator error and enable operators to focus on mission critical tasks and events. This paper introduces the integrated situation display and warning design implemented in the KHP.

A Study on the Countermeasure of the Security Threats for Coastal Passenger Ships (연안여객선의 보안위협 대응방안에 관한 연구)

  • Ju, Jong-Kwang;Lee, Eun-Kang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.3
    • /
    • pp.199-206
    • /
    • 2007
  • In analyzing the security threats and their management system and making questions on security awareness to the concerned parties in the field of coastal passenger ship, we draw its security vulnerability and the features of security threats. The countermeasures and security system are proposed in order to response the diverse security threats and to set up the security culture of coastal passenger ship.

  • PDF

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

Plasmodium knowlesi as a Threat to Global Public Health

  • Wesolowski, Roland;Wozniak, Alina;Mila-Kierzenkowska, Celestyna;Szewczyk-Golec, Karolina
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.5
    • /
    • pp.575-581
    • /
    • 2015
  • Malaria is a tropical disease caused by protozoans of the Plasmodium genus. Delayed diagnosis and misdiagnosis are strongly associated with higher mortality. In recent years, a greater importance is attributed to Plasmodium knowlesi, a species found mainly in Southeast Asia. Routine parasitological diagnostics are associated with certain limitations and difficulties in unambiguous determination of the parasite species based only on microscopic image. Recently, molecular techniques have been increasingly used for predictive diagnosis. The aim of the study is to draw attention to the risk of travelling to knowlesi malaria endemic areas and to raise awareness among personnel involved in the therapeutic process.

Review on the downfall of Konbaung Dynasty: A Case Study of Myingyun-MyingonDaing Rebellion and Its Effects

  • Kyi, Aye Mon
    • SUVANNABHUMI
    • /
    • v.5 no.1
    • /
    • pp.1-23
    • /
    • 2013
  • This study reexamines a covert factor of the colonization of Myanmar kingdom, drawing on the case of Myingyun-MyingonDaing Rebellion broke out in 1866. It criticizes that existing discussions on the downfall of the Konbaung dynasty are preoccupied with post-colonialism. These researches were focus on macro level and pointed out the imperialist stratagem and many scholars concluded for the down fall of Konbaung Dynasty that the wave of Imperialism as Sunami hit from Europe to Asia so that Myanmar could not stand as feudal society and down fall Konbaung Dynasty. All of events and comments were quite true but it is necessary to examine carefully past events. There were many controversial facts about third Anglo-Myanmar war. This paper has pointed out the Kings Mindon's false political strategic due to the lack of awareness on external threat with the giving the best example of Myingun-MyingonDaing rebellion.

  • PDF

The threat of Monkeypox in the Philippines: another problematic preparation and management for the healthcare system?

  • Dalmacito A. Cordero Jr.
    • Clinical and Experimental Vaccine Research
    • /
    • v.12 no.1
    • /
    • pp.77-79
    • /
    • 2023
  • The Philippines is still in a tight battle with the coronavirus disease 2019 pandemic since many cases are detected daily. With the continuous spread of another disease worldwide-monkeypox, many Filipinos are alarmed if the country's healthcare system is prepared enough, especially with the detection of its first case. Learning from the unfortunate experiences of the country during the current pandemic is essential in facing another health crisis. With this, recommendations for a robust healthcare system are proposed centered on: a massive digital information campaign about the disease; training healthcare workers to raise awareness about the virus and its transmission, management, and treatment; an intensified surveillance and detection procedure to monitor cases and execute contact tracing properly; and a persistent procurement of vaccines and drugs for treatment, with a well-designed vaccination program.