• Title/Summary/Keyword: cyber risks

Search Result 85, Processing Time 0.024 seconds

Understanding MyData-Based Platform Adoption for SW·AI Education & Training Programs

  • Hansung Kim;Sae Bom Lee;Yunjae Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.269-277
    • /
    • 2024
  • This study aims to explore the key factors for the systematic development and activation of a MyData-based platform for SW·AI education and training programs recently initiated by the government. To achieve this, a research model based on the Value-based Adoption Model (VAM) was established, and a survey was conducted with 178 participants who had experience in SW·AI education and training programs. The research model was validated using confirmatory factor analysis and Partial Least Squares Structural Equation Modeling (PLS-SEM). The main findings of the study are as follows: First, transparency and self-determination significantly influenced perceived benefits, while technical effort and security significantly influenced perceived risks. Second, perceived benefits positively affected the intention to use the platform, whereas perceived risks did not show a significant impact. Based on these results, this study suggests implications for the systematic development and activation of a MyData-based platform in the field of SW·AI education and training.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

Consumer Type and Characteristics According to Word-of-Mouth Behavior (구전행동에 따른 소비자 유형과 특성)

  • Seo, Hyun-Jin;Lee, Kyu-Hye
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.1
    • /
    • pp.27-38
    • /
    • 2013
  • Word-of-mouth (WOM) communication (traditionally important in consumption) is expanding its influence into cyber space and is playing an important role in online shopping. Consumers who use online shopping might not readily make purchasing decisions due to information overload, lack of accurate product recognition, and the distrust of commercial information. Subsequently, people use WOM communication for a mutual interchange with others who share common concerns, interests, and purposes. This study examines the consumer characteristics, perceived risk on online shopping and benefits of online shopping according to WOM behavior that may significantly affect consumer actions. Factor analysis, t-test, one-way ANOVA, cluster analysis, and Chi-square analysis were used for statistical analysis to identify the differences in consumer characteristics. Online WOM behavior consumers purchased more various items than offline WOM behavior consumers; however, the most influential purchasing factor was price regardless of WOM behavior. Offline WOM behavior consumers have shown higher perceived online shopping risks and benefits.

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment

  • Liu, Zhiquan;Ma, Jianfeng;Jiang, Zhongyuan;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.914-934
    • /
    • 2016
  • In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.

Development of CAE Service Platform Based on Cloud Computing Concept (클라우드 컴퓨팅기반 CAE서비스 플랫폼 개발)

  • Cho, Sang-Hyun
    • Journal of Korea Foundry Society
    • /
    • v.31 no.4
    • /
    • pp.218-223
    • /
    • 2011
  • Computer Aided Engineering (CAE) is very helpful field for every manufacturing industry including foundry. It covers CAD, CAM, and simulation technology also, and becomes as common sense in developing new products and processes. In South Korea, more than 600 foundries exist, and their average employee number is less than 40. Moreover, average age of them becomes higher. To break out these situations of foundry, software tools can be effective, and many commercial software tools had already been introduced. But their high costs and risks of investment act as difficulties in introducing the software tools to SMEs (Small and Medium size Enterprise). So we had developed cloud computing platform to propagate the CAE technologies to foundries. It includes HPC (High Performance Computing), platforms and software. So that users can try, enjoy, and utilize CAE software at cyber space without any investment. In addition, we also developed platform APIs (Application Programming Interface) to import not only our own CAE codes but also 3rd-party's packages to our cloud-computing platforms. As a result, CAE developers can upload their products on cloud platforms and distribute them through internet.

Studies on the role of the system administrator according to the changing IT environment (IT환경변화에 따른 시스템 관리자의 역할에 관한 연구)

  • Choi, Dae-young;Kim, Myung-su;Seo, Won-woo;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.264-266
    • /
    • 2014
  • The current is quickly changed to a simple structure in the existing system architecture is complex and diverse structures. Especially due to the new cyber threat is growing more and more system risks. And many kinds of system monitoring and analysis tools are released in order to minimize the risk, but there is a limit to such a system depends on the Partially automated tools. Therefore, to present the role of a system administrator for effectively managing the system for the new changing environment out of the frame of the old system in order to minimize the systemic risk management system in this study.

  • PDF

Macroeconomic Determinants of Housing Prices in Korea VAR and LSTM Forecast Comparative Analysis During Pandemic of COVID-19

  • Starchenko, Maria;Jangsoon Kim;Namhyuk Ham;Jae-Jun Kim
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2024
  • During COVID-19 the housing market in Korea experienced the soaring prices, despite the decrease in the economic growth rate. This paper aims to analyze macroeconomic determinants affecting housing prices in Korea during the pandemic and find an appropriate statistic model to forecast the changes in housing prices in Korea. First, an appropriate lag for the model using Akaike information criterion was found. After the macroeconomic factors were checked if they possess the unit root, the dependencies in the model were analyzed using vector autoregression (VAR) model. As for the prediction, the VAR model was used and, besides, compared afterwards with the long short-term memory (LSTM) model. CPI, mortgage rate, IIP at lag 1 and federal funds effective rate at lag 1 and 2 were found to be significant for housing prices. In addition, the prediction performance of the LSTM model appeared to be more accurate in comparison with the VAR model. The results of the analysis play an essential role in policymaker perception when making decisions related to managing potential housing risks arose during crises. It is essential to take into considerations macroeconomic factors besides the taxes and housing policy amendments and use an appropriate model for prices forecast.

Testing the SERVQUAL scale and Perceived risk in the Internet Shopping-mall (인터넷쇼핑몰의 서비스품질차원과 지각된 위험에 관한연구)

  • Chung, Ki-Han;Oh, Jae-Sin
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.239-259
    • /
    • 2001
  • The purpose of this study is to analyze service quality factors that consumers perceive during their purchasing product on Internet Shopping Mall. The study defines the characteristic quality dimensions of Internet Shopping Mall by adding three dimensions consisting of convenience, security and entertainment to PZB's SERVQUAL scale. Consumers' purchase process on Internet Shopping Mall is examined by finding the relation between their perceived risk factor and repurchase intention. The study results show that consumers' higher appraisal degree on service quality means their higher repurchase intentions, their lower perceived risks degree. The repurchase intentions and the perceived risks degree have negative correlation. The more consumers have experienced buying on Internet Shopping Mall, the higher consumer assess service quality, they have higher repurchase intention and lower perceived risk. The most basic contribution is that new service quality dimensions, which is able to clarify service quality on Cyber Mall, is identified with the established PZB(I988; 1991)'s SERVQUAL dimensions.

  • PDF

SDN based Discrimination Mechanism for Control Command of Industrial Control System (SDN 기반 산업제어시스템 제어명령 판별 메커니즘)

  • Cho, Minjeong;Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1185-1195
    • /
    • 2018
  • Industrial Control System (ICS) is a system that carry out monitoring and controls of industrial control process and is applied in infrastructure such as water, power, and gas. Recently, cyber attacks such as Brutal Kangaroo, Emotional Simian, and Stuxnet 3.0 have been continuously increasing in ICS, and these security risks cause damage of human life and massive financial losses. Attacks on the control layer among the attack methods for ICS can malfunction devices of the field device layer by manipulating control commands. Therefore, in this paper, we propose a mechanism that apply the SDN between the control layer and the field device layer in the industrial control system and to determine whether the control command is legitimate or not and we show simulation results on a simply composed control system.