• Title/Summary/Keyword: human threat

Search Result 289, Processing Time 0.021 seconds

Fuzzy Rule-Based Method for Air Threat Evaluation (적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론)

  • Choi, Byeong Ju;Kim, Ji Eun;Kim, Jin Soo;Kim, Chang Ouk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.57-65
    • /
    • 2016
  • Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.

A Case Study on Aircraft Accidents Due to Air Traffic Controller's Human Error - Applying TEM (Threat & Error Management) Analysis - (항공교통관제사의 휴먼에러에 기인한 국내외 항공기 사고 사례연구 - TEM(Threat & Error Management) 분석법을 적용하여 -)

  • Kim, Jung-Bin;Park, Sung-Sik
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.124-133
    • /
    • 2021
  • The airline industry has been growing steadily since 2016 with more than 100 million air passengers, renewing the largest number of air passengers every year. Increasing air demand leads to an increase in air traffic in limited airspace, increasing the likelihood of accidents between aircraft. Due to the massive human and material damage caused by a single mistake, aviation safety is being heavily focused around the world to efficiently use limited airspace. Studies related to various human factors are underway as most of the aviation accidents are found to be caused by human factors, but research on human factors by controllers is insufficient while they are active in terms of control and operation. Given that 82% of air accidents caused by controllers are caused by human error, the importance of management of human error and changes in perception are urgently needed. This study aims to understand the seriousness of the controller's human error by analyzing the accident cases caused by the controller's human error using TEM to identify threats and errors and derive common human factors.

Combating Identity Threat of Machine: The effect of group-affirmation on humans' intellectual performance loss (기계의 정체성 위협에 대항하기: 집단 가치 확인이 인간의 지적 수행 저하에 미치는 효과)

  • Cha, Young-Jae;Baek, Sojung;Lee, Hyung-Suk;Bae, Jonghoon;Lee, Jongho;Lee, Sang-Hun;Kim, Gunhee;Jang, Dayk
    • Korean Journal of Cognitive Science
    • /
    • v.30 no.3
    • /
    • pp.157-174
    • /
    • 2019
  • Motivation of human individuals to perform on intellectual tasks can be hampered by identity threat from intellectual machines. A laboratory experiment examined whether individuals' performance loss on intellectual tasks appears under human identity threat. Additionally, by affirming alternative attributes of human identity, researchers checked whether group-affirmation alleviate the performance loss on intellectual tasks. This research predicted that under high social identity threat, individuals' performance loss on the intellectual tasks would be moderated by valuing alternative attributes of human identity. Experiment shows that when social identity threat is increased, human individuals affirmed alternative human attributes show higher performance on intellectual tasks than individuals non-affirmed. This effect of human-group level affirmation on performance loss did not appear in the condition of low social identity threat. Theoretical and practical implications were discussed.

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

A Study on the Analysis of Internal and External Factors of Software Threat Elements (소프트웨어 위협 요소의 내부적·외부적 요인 분석에 관한 연구)

  • Lee Eun Ser
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.278-283
    • /
    • 2024
  • When implementing software, there can be side effects that pose a threat to human life. Therefore, it is necessary to measure the impact of software on safety and create alternatives to mitigate and prevent threats. To conduct a software safety assessment to measure the impact of threat factors, the following components are necessary. This paper aims to classify the threat factors of software into internal and external factors and quantitatively demonstrate the impact of these threat factors.

Children's Perception of Interparental Conflict, Child abuse, and Children's Depression (자녀가 지각한 부부갈등, 자녀학대 및 자녀의 우울)

  • Kim, Jeong-Ran
    • Korean Journal of Human Ecology
    • /
    • v.13 no.5
    • /
    • pp.683-690
    • /
    • 2004
  • This study was designed to investigate the relationship among perceptions of interparental conflict, child abuse, and children's depression. The subjects for this study include 964 children who live in Gwangju city and Jeonnam area. The results of this study are as follows: First, conflict characteristics have a significant influence on child abuse. Second, conflict characteristics and child abuse significantly influence the appraisals of self-blame and threat. Third, conflict characteristics indirectly affect the children's depression. Child abuse and appraisals of self-blame and threat have a direct influence on the children's depression. Lastly, child abuse and appraisals of self-blame and threat mediate the association between interparental conflict characteristics and children's depression.

  • PDF

A Study on Efficient Encryption for Message Communication between Devices (기기 간 메시지 부분 암호화 연구)

  • Lee, Yang-Ho;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • The advent of smart phones brought adverse effect between devices recently. For example, adverse effects of info-communication with advent of computer. Also, hacking threat aiming cyber space that is getting more advanced is spreading in terms of range and danger, so that it reaches the level that the nation has to concern. In this circumstance, crimes involving info-technology is now problem in society. As internet technology advances, it enlarges the range of hacker's threat to not only smart phones, but ships, aircrafts, buildings, and cars. It could be seen as social threat of between human and human, between machine and machine, and between human and machine. This study discuss these problems.

Development of user-oriented human elements for e-navigation human element assessment (e-navigation 인적요소평가를 위한 사용자 지향적 인적요소 개발)

  • Shim, Woo-Seong;Lieto, Antonio Di;Lim, Yong-Kon;Lee, Sang-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1113-1118
    • /
    • 2012
  • The e-navigation in IMO(International Maritime Organization) has been developed as a strategy for user oriented service followed by HEAP(Human Element Analysing Process) to assess the solutions in view of human ergonomics. Although IMO already had an interim guideline for human element assessment, it did not include appropriate human elements for user-oriented assessment, therefore there should be a need for revising the human elements of current guideline for ergonomic assessment of e-navigation. We have developed user-oriented human element checklist, threat elements caused by human external condition and error elements originated by human itself in line with the e-navigation development concept of user-based approach.

Cyanobacterial Toxins, Drinking Water and Human Health

  • Wickramasinghe Wasantha A.;Shaw Glen R.
    • Journal of Environmental Health Sciences
    • /
    • v.31 no.3
    • /
    • pp.192-198
    • /
    • 2005
  • The occurrence of toxic cyanobacterial blooms has been reported worldwide and poses a threat to human health through drinking water exposure. The toxins they produce are highly water soluble and can leach into the water body. To eliminate any risk of drinking water exposure, removal of these toxins is essential before the water is consumed. Conventional water treatment techniques such as chlorination, if managed well, can be effectively used to remove some of these toxins, however, saxitoxin and its derivatives pose a problem. Little toxicological data are available to evaluate the real threat of these toxins.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.