• Title/Summary/Keyword: cyber ba

Search Result 7, Processing Time 0.029 seconds

A Spatial Study on the Network Formation Process of Personal Actors: The Case of Institutional Building Networks in Industries for the Elderly (개인 행위주체의 네트워크 형성 과정에 대한 공간적 고찰: 고령친화산업의 제도구축 네트워크를 사례로)

  • Koo, Yang-Mi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.334-349
    • /
    • 2008
  • In this study, the network formation process of personal actors in industries for the elderly was analyzed. This process is applied to the knowledge creation model of the SECI (Nonaka-Takeuchi learning cycle), that is socialization, externalization, combination, internalization. There are some kinds of opportunities to interact in these industries in the forms of field survey teams to overseas, some seminars and symposiums, many kinds of meetings, education and training programs, trade fairs and on-line forums. These palces(ba) - originating ba, interacting ba, cyber ba, exercising ba - played great roles in the formation of personal actor networks. Personal actors had opportunities to interconnect with distant actors through those places(ba). In the spatial perspective, personal actors could make face-to-face contact and build trust through temporary geographical proximity or temporary clusters with the help of personal mobility. Relations in the virtual spaces such as the Internet community did much toward building personal networks.

  • PDF

Assessment of Apartment Building Construction Workers' Noise Exposure (아파트 건설노동자 소음 노출평가)

  • Taesun Kang
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.3
    • /
    • pp.308-316
    • /
    • 2023
  • Objectives: The aim of this study is to measure and assess the occupational noise exposure levels among construction workers at apartment building construction sites in South Korea. Methods: Noise exposure assessments were conducted for 139 construction workers across 10 different trades at 53 apartment building construction sites in the northern part of Gyeonggi-do. Assessments were carried out using a noise dosimeter set with a 90 dB criterion, an 80 dB threshold, and a 5 dB exchange rate over a period of more than 6 hours(LMOEL) Results: The mean LMOEL (equivalent continuous noise level over 8 hours) for the 139 dosimeter samples was 87.8 ± 4.3 dBA. The mean noise exposure level for each construction trade, referred to as the trade mean, was also calculated. Significant differences in noise exposure levels were observed between construction trades (ANOVA, p < 0.001). The highest LMOEL values were recorded for concrete chippers (93.2 ± 2.6 dBA), followed by ironworkers (88.4 ± 0.7 dBA), concrete finishers (88.3 ± 2.7 dBA), masonry workers (87.7 ± 1.9 dBA), pile driver operators (85.6 ± 1.7 dBA), concrete carpenters (84.9 ± 2.4 dBA), interior carpenters (83.5 ± 2.1 dBA), and other groups (81.4 ± 2.2 dBA). Conclusions: The findings suggest that nearly all construction workers in this study are at risk of Noise-Induced Hearing Loss (NIHL). Moreover, the study establishes that construction trades can serve as a useful metric for assessing noise exposure levels at apartment construction sites.

The Effect of Information Technology on the Knowledge Management Activity from MANDO and POSCO (정보기술이 지식경영활동에 미치는 영향: 만도와 포스코 사례를 중심으로)

  • Choi, Eunsoo
    • Knowledge Management Research
    • /
    • v.9 no.2
    • /
    • pp.169-191
    • /
    • 2008
  • Information technology instruments arc being rampantly used for knowledge management in companies. IT is used as an interplay tool to enhance the flow of knowledge and information between people. KMS, especially, supports the knowledge management process including sharing, creating, and using of knowledge within a company, and maximizes the value of knowledge resources within an organization. The purpose of this paper is to understand how IT is changing the knowledge management activity. through various examples based on exploratory research from MANDO, the Korean automotive parts manufacturer, and POSCO, the global leading steelmaker. The result shows that IT boosts communication skills, thus creates a mutual relationship outcome. In the same context, the process of knowledge conversion by Nonaka's SECI model simplifies to an Externalization-Internalization process. This process accelerates the birth of explicit knowledge and Socialization, supplements the Limitations of the creation of knowledge in the E-I cycle. The E of knowledge simultaneously promotes the I, and eventually brings an advanced learning skill. IT aids the E of knowledge and furthermore, I and E activity, through the knowledge sharing, brings vitality into an organization. The interplay stage for knowledge activity is to be reorganized to a cyber ba. Furthermore, IT will galvanize the formation of core knowledge through systemized acquisition, management of core knowledge and standardization of work.

  • PDF

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

Effect of perceived luxuriousness on brand equity

  • Kang, Ju-Young M.;Kim, Jieun
    • The Research Journal of the Costume Culture
    • /
    • v.24 no.5
    • /
    • pp.697-708
    • /
    • 2016
  • The term used to describe consumer's valuation of a brand is brand equity. One concept that can be managed and may impact valuation of a prestige brand is "luxuriousness." As the concept of "luxuriousness" appears to be a key factor contributing to the equity of a prestige brand, the purpose of this study was to examine how luxuriousness is related to the brand equity utilizing a model developed by Yoo, Donthu, and Lee (2000). Yoo et al. (2000) identified three dimensions [brand association with awareness (BA), perceived quality (PQ), brand loyalty (BL)] accounted for the equity (OBE) of a brand. We speculated that the five dimensions of luxuriousness (i.e., quality, extended self, hedonism, accessibility, and tradition) would selectively influence the two dimensions of brand equity (BA, PQ) and that loyalty would mediate the relationship between the two dimensions of brand equity (BA, PQ) and overall brand equity. A total of 502 participants aged from 18 to 74 were surveyed in USA. Using AMOS 18, the path analysis was conducted with the maximum-likelihood estimation procedure. The model exhibited a good fit with the data and all hypotheses were supported except one. Quality, accessibility, and hedonism dimensions of luxuriousness affected perceived quality of the equity of a brand. Hedonism and extended self dimensions affected brand association with awareness. However, tradition dimension did not significantly influence brand association with awareness. Overall, this research expands understanding of brand equity as it documents the contributions of luxuriousness, a component that can be controlled by brand managers.

IoT botnet attack detection using deep autoencoder and artificial neural networks

  • Deris Stiawan;Susanto ;Abdi Bimantara;Mohd Yazid Idris;Rahmat Budiarto
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1310-1338
    • /
    • 2023
  • As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy. Botnet is one of the threats that dominate the attacks as it can easily compromise devices attached to an IoT networks/systems. The compromised devices will behave like the normal ones, thus it is difficult to recognize them. Several intelligent approaches have been introduced to improve the detection accuracy of this type of cyber-attack, including deep learning and machine learning techniques. Moreover, dimensionality reduction methods are implemented during the preprocessing stage. This research work proposes deep Autoencoder dimensionality reduction method combined with Artificial Neural Network (ANN) classifier as botnet detection system for IoT networks/systems. Experiments were carried out using 3- layer, 4-layer and 5-layer pre-processing data from the MedBIoT dataset. Experimental results show that using a 5-layer Autoencoder has better results, with details of accuracy value of 99.72%, Precision of 99.82%, Sensitivity of 99.82%, Specificity of 99.31%, and F1-score value of 99.82%. On the other hand, the 5-layer Autoencoder model succeeded in reducing the dataset size from 152 MB to 12.6 MB (equivalent to a reduction of 91.2%). Besides that, experiments on the N_BaIoT dataset also have a very high level of accuracy, up to 99.99%.

Propagation Models for Structural Parameters in Online Social Networks (온라인 소셜 네트워크에서 구조적 파라미터를 위한 확산 모델)

  • Kong, Jong-Hwan;Kim, Ik Kyun;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.125-134
    • /
    • 2014
  • As the social media which was simple communication media is activated on account of twitter and facebook, it's usability and importance are growing recently. Although many companies are making full use of its the capacity of information diffusion for marketing, the adverse effects of this capacity are growing. Because social network is formed and communicates based on friendships and relationships, the spreading speed of the spam and mal-ware is very swift. In this paper, we draw parameters affecting malicious data diffusion in social network environment, and compare and analyze the diffusion capacity of each parameters by propagation experiment with XSS Worm and Koobface Worm. In addition, we discuss the structural characteristics of social network environment and then proposed malicious data propagation model based on parameters affecting information diffusion. n this paper, we made up BA and HK models based on SI model, dynamic model, to conduct the experiments, and as a result of the experiments it was proved that parameters which effect on propagation of XSS Worm and Koobface Worm are clustering coefficient and closeness centrality.