• Title/Summary/Keyword: cyber behavior

Search Result 250, Processing Time 0.025 seconds

The Effect of Relational Leadership on Empowerment, and Organizational Commitment: Focus on the Relationship between Owner and Manager in Chinese Restaurant Context (관계지향적 리더십이 임파워먼트와 조직몰입에 미치는 영향 - 중식당 소유주와 지배인 간의 관계를 중심으로 -)

  • Byun, Gwang-In;Choi, Soo-Keun
    • Journal of the Korean Society of Food Culture
    • /
    • v.20 no.5
    • /
    • pp.561-573
    • /
    • 2005
  • This research is to examine the structural relationships between transformational/transactional leadership, empowerment, relationship quality, and organizational commitment in Chinese restaurant context. In order to empirically investigate the proposed model, the data were collected from 188 respondents randomly selected from among the managers who work in 188 Chinese restaurants in Seoul and Kyonggi-do, which registered in Korean Food Central Association, korean foodservice management Association, Menupan.com We choose to limit our investigation to luxury Chinese restaurants where the average check is above 12,000 won. The survey was executed during two-week period in the autumn of 2004. The findings and discussion are as follows: First, intellectual stimulus behavior of transformational leadership had a positive effect on empowerment. Second, contingent reward leadership had a positive effect on empowerment. Third, empowerment had a positive effect on affective organizational commitment. Fourth, empower had a negative effect on continuous organizational commitment. Fifth, intellectural stimulus behavior of transformation leadership had a positive effect on affective organizational commitment indirectly and had a negative effect on continuous organizational commitment indirectly through mediating role of empowerment. Finally, contingent reward leadership had a positive effect on affective organizational commitment indirectly and had a negative effect on continuous organizational commitment indirectly through mediating role of empowerment. At the end of this paper, managerial implications, discussions, and limitations and future research directions are presented.

The Influence of Innovation-oriented Organizational Culture on Management Performance - Focusing on the Mediating Effect of Proactive Entrepreneurial Behaviour and Market Orientation - (혁신지향 조직문화가 경영성과에 미치는 영향 -진취적 기업가행동과 시장지향성의 매개효과를 중심으로-)

  • Joo, Cheol-Keun
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.119-131
    • /
    • 2020
  • The purpose of this study is to examine the mediated effects of entrepreneurship and market orientation on organizational culture and management performance as the cause of the reversal phenomenon of startups defeating traditional giants. Through the research method of bootstrapping proposed by Hayes (2013), the total effect, direct effect and indirect effect analysis were conducted. As a result, there was no direct impact relationship between organizational culture and management performance, but it was confirmed that it had a positive impact on management performance by mediating both entrepreneurial behavior and market orientation in the relationship between organizational culture and management performance. This study is meaningful in that it is linked to existing theories such as entrepreneurship and market orientation and it extends the scope of competency targets required for business performance to an organizational culture. Companies need to create an innovation-oriented organizational culture for management performance and value creation, and they have to open up their culture with entrepreneurial behavior and market orientation by breaking away from the inertia of organization.

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

Real-time model updating for magnetorheological damper identification: an experimental study

  • Song, Wei;Hayati, Saeid;Zhou, Shanglian
    • Smart Structures and Systems
    • /
    • v.20 no.5
    • /
    • pp.619-636
    • /
    • 2017
  • Magnetorheological (MR) damper is a type of controllable device widely used in vibration mitigation. This device is highly nonlinear, and exhibits strongly hysteretic behavior that is dependent on both the motion imposed on the device and the strength of the surrounding electromagnetic field. An accurate model for understanding and predicting the nonlinear damping force of the MR damper is crucial for its control applications. The MR damper models are often identified off-line by conducting regression analysis using data collected under constant voltage. In this study, a MR damper model is integrated with a model for the power supply unit (PSU) to consider the dynamic behavior of the PSU, and then a real-time nonlinear model updating technique is proposed to accurately identify this integrated MR damper model with the efficiency that cannot be offered by off-line methods. The unscented Kalman filter is implemented as the updating algorithm on a cyber-physical model updating platform. Using this platform, the experimental study is conducted to identify MR damper models in real-time, under in-service conditions with time-varying current levels. For comparison purposes, both off-line and real-time updating methods are applied in the experimental study. The results demonstrate that all the updated models can provide good identification accuracy, but the error comparison shows the real-time updated models yield smaller relative errors than the off-line updated model. In addition, the real-time state estimates obtained during the model updating can be used as feedback for potential nonlinear control design for MR dampers.

Effectiveness of a Smoking Cessation Program for Adolescents

  • Kim, Soyaja;Nam, Kyoung-Ah;Seo, Mia;Lee, Hyun-Hwa
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.4
    • /
    • pp.646-654
    • /
    • 2004
  • Purpose. The purpose of this study was to test the effectiveness of a comprehensive smoking cessation program for Korean adolescents. Method. The study design was quasi-experimental with one pre and three post-tests. The three posttests were done immediately after, three months later, and six months after the completion of the program. A total of 43 high school students who smoked participated in the study with 22 in the experimental group and 21 in the control group. The smoking cessation program consisted of 9 sessions with content on enhancement of self-efficacy, stress management, correction of distorted thoughts, consciousness raising, and assertiveness training. The study variables were urine cotinine levels, self-efficacy, stress, and stages of changed behavior. Results. Urine cotinine levels significantly decreased in the experimental group after the program (F=3.02, p=.06) but significantly increased in the control group (F=6.32, p=.004). Self-efficacy and the degree of stress did not change in either group. The stages of smoking cessation behavior tended to change when compared with raw data for the experimental group. For most participants, the stages of change had been precontemplation and contemplation, but changed to action and maintenance stage among the experimental group. Conclusion. The program was effective in smoking cessation and influencing stages of change but did not change psychosocial factors such as self-efficacy and stress. It is suggested a program should be developed to change psychosocial variables on a long-term basis. It is also desirable to involve peers and families of adolescents who smoke when planning programs to enhance social support.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

Development of Integrated Security Control Service Model based on Artificial Intelligence Technology (인공지능 기술기반의 통합보안관제 서비스모델 개발방안)

  • Oh, Young-Tack;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.108-116
    • /
    • 2019
  • In this paper, we propose a method to apply artificial intelligence technology efficiently to integrated security control technology. In other words, by applying machine learning learning to artificial intelligence based on big data collected in integrated security control system, cyber attacks are detected and appropriately responded. As technology develops, many large capacity Is limited to analyzing individual logs. The analysis method should also be applied to the integrated security control more quickly because it needs to correlate the logs of various heterogeneous security devices rather than one log. We have newly proposed an integrated security service model based on artificial intelligence, which analyzes and responds to these behaviors gradually evolves and matures through effective learning methods. We sought a solution to the key problems expected in the proposed model. And we developed a learning method based on normal behavior based learning model to strengthen the response ability against unidentified abnormal behavior threat. In addition, future research directions for security management that can efficiently support analysis and correspondence of security personnel through proposed security service model are suggested.

Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning (머신러닝을 활용한 행위 및 스크립트 유사도 기반 크립토재킹 탐지 프레임워크)

  • Lim, EunJi;Lee, EunYoung;Lee, IlGu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1105-1114
    • /
    • 2021
  • Due to the recent surge in popularity of cryptocurrency, the threat of cryptojacking, a malicious code for mining cryptocurrencies, is increasing. In particular, web-based cryptojacking is easy to attack because the victim can mine cryptocurrencies using the victim's PC resources just by accessing the website and simply adding mining scripts. The cryptojacking attack causes poor performance and malfunction. It can also cause hardware failure due to overheating and aging caused by mining. Cryptojacking is difficult for victims to recognize the damage, so research is needed to efficiently detect and block cryptojacking. In this work, we take representative distinct symptoms of cryptojacking as an indicator and propose a new architecture. We utilized the K-Nearst Neighbors(KNN) model, which trained computer performance indicators as behavior-based dynamic analysis techniques. In addition, a K-means model, which trained the frequency of malicious script words for script similarity-based static analysis techniques, was utilized. The KNN model had 99.6% accuracy, and the K-means model had a silhouette coefficient of 0.61 for normal clusters.

Determinants of Households with Risky Debts (부채 취약가계 결정 요인)

  • Baek, Eun-Young;Sung, Yong-Ae
    • Korean Journal of Human Ecology
    • /
    • v.21 no.2
    • /
    • pp.225-240
    • /
    • 2012
  • The purpose of this study was to investigate the determinants of households with risky debt loads. The study used financial ratios to determine which households were over-indebted. The 3 ratios used were Debt to Asset ratio, Debt to Financial asset ratio, and Debt Service ratio. Data for this study was the 2011 Survey of Household Finance. Households that demonstrated total debts of 70% or more when compared to total assets were 8.8%. Households that demonstrated a debt load totaling 5 or more times their total financial assets were 19%. Households with monthly repayment obligations of 40% or more of disposable income were 20%. Households that fulfilled all 3 financial ratio criteria were 1.5% of total indebted households. Over-indebted households demonstrated severe economic condition in terms of debt, but not all over-indebted households were categorized as being in economically vulnerable group. The major determinants of households with risky debts were income, asset, purpose of loans, and spending behavior of the households.

Understanding Perceived Enjoyment, Perceived Risk and Intention to Use Smart phone Banking Services (스마트폰 뱅킹서비스의 지각된 위험과 지각된 즐거움이 지속적 사용의도에 미치는 영향)

  • Lee, Hyun soo;Chae, Young Il
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.205-218
    • /
    • 2013
  • Recently, due to the proliferation of smartphones, users of mobile banking services which are based in wireless Internet without constraint of the time and places are significantly increased. In the study, considering the characteristics of mobile banking services based on the smartphone and the user behavior. we analyse the factors which have an effect on the behavioral intention to use mobile banking services based on the smartphone. For this purpose, we use the model which is based on Technology Acceptance Model (TAM) and add two constructs:the perceived enjoyment and the perceived risk. A survey data for 194 students at the K cyber university is used for statistical analysis. As a result, the perceived ease of use affects the perceived usefulness and the perceived enjoyment, and the perceived ease of use. And the perceived usefulness and perceived enjoyment affect continuous intention to use. On the other hand, the hypothesis which the perceived risk would affect adversely the continuous intention to use is rejected. Through this study, we expect to provide the useful implications for the smartphone banking services and contribute to the development of strategy for them.