• Title/Summary/Keyword: threat model

Search Result 529, Processing Time 0.024 seconds

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.

Simulating Engagement Model of Avionic ECM Pod on the Virtual Battle Field (가상전장환경하에서 항공전자전 ECM 파드의 전자전 교전모델 시뮬레이션 개발)

  • 김형균;이행호;조성찬;홍장의;변재정
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.1
    • /
    • pp.69-76
    • /
    • 2004
  • When simulating the mission flight of a fighter equipped with the avionic ECM pod, it is massively required to provide the correct information of threats, to depict the real environment of mission area, and to precisely model the capability of the ECM system. Also, in order to get the reliable results of those simulation, it should be supported the flexible changes of threat environments and the examination of multiple flight paths. This paper presents a software system which is possible to flexible and interactive ECM simulation. This system has capable of the 2D or 3D visualization of virtual battle field, the management of electronic threat data, and the simulation of engagement model.

Utilizing the Health Belief Model to predicting female middle school students' behavioral intention of weight reduction by weight status

  • Park, Dong-Yean
    • Nutrition Research and Practice
    • /
    • v.5 no.4
    • /
    • pp.337-348
    • /
    • 2011
  • Weight reduction behavior is common among adolescent girls. The present study examined the status of weight reduction behavior and factors affecting the behavioral intention of weight reduction using the Health Belief Model (HBM) for female middle school students by weight category. Survey data was collected from three girl's middle schools in Gyeongju, Korea. A total of 299 female middle school students participated in this study. The questionnaire had questions about general characteristics, weight reduction behavior, and variables of HBM (perceived threat, perceived benefits, perceived barriers, cues to action, self-efficacy in dietary life and exercise, and behavioral intention of weight reduction). Descriptive statistics, Chi-square tests, ANOVA, and multiple regression analysis were applied to analyze the variables. A higher percentage of students in the overweight group attempted weight reduction than those in the underweight and the normal weight groups (P < 0.001). Among students who had attempted weight reduction, 73% tried diet therapy, while 78% tried exercise. Students in the normal and overweight groups showed significantly higher threat (P < 0.01) and cues to action (P < 0.001) than those in the underweight group. As for perceived benefits, barriers, and self-efficacy in dietary life and exercise, there were no significant differences among weight groups. Students in the overweight group showed the strongest intention of weight reduction and there were significant differences among the three weight groups (P < 0.001). Perceive threat (P < 0.01), cues to action (P < 0.001), and perceived self-efficacy (P < 0.01) were significantly associated to behavioral intention of weight reduction for all respondents. For the underweight group, perceived threat (P < 0.05) and perceived self-efficacy (P < 0.01) were the significant variables. For the overweight group, cue to action was the significant variable (P < 0.05).

A qualitative study on the psychological difficulties of conglomerates executives after involuntary retirement (대기업 임원들이 비자발적 퇴직 이후 겪는 심리적 어려움에 대한 질적 연구)

  • Jabok Koo;Taeyun Jung
    • Korean Journal of Culture and Social Issue
    • /
    • v.25 no.4
    • /
    • pp.249-277
    • /
    • 2019
  • This study examined the involuntary retirement of executives in conglomerates based on Williams' need-threat temporal model of ostracism(2009), which explains the psychology of individuals facing social exclusion in the stages of reflexive, reflective and resignation. In-depth interviews were conducted on 15 retirees from conglomerates, and their contents were used for phenomenological method of analysis. As a result, in the reflexive stage of need-threat temporal model of ostracism, they experienced cognitive panic and emotional panic immediately following retirement. Due to an unexpected shocking experience of retirement notice, they experienced cognitive numbness first, and repressed the following negative feelings cognitively to hide them. In the reflective stage, retirees dream of 'a complete restoration to their best performance in the past', but as such expectation fails, they don't adjust to the reality more due to 'unrealistic thought', 'self-deception', and 'shift responsibility'. In resignation stage, a long-term failure to satisfy the desire led them to experience a sense of defeat and helplessness. Such results were reviewed and compared to Williams' need-threat temporal model of ostracism, and the implications of such result on the nation, companies and retirees in terms of the response to retirement.

Reliability Analysis of Interleaved Memory with a Scrubbing Technique (인터리빙 구조를 갖는 메모리의 스크러빙 기법 적용에 따른 신뢰도 해석)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.443-448
    • /
    • 2014
  • Soft errors in memory devices that caused by radiation are the main threat from a reliability point of view. This threat can be commonly overcome with the combination of SEC (Single-Error Correction) codes and scrubbing technique. The interleaving architecture can give memory devices the ability of tolerating these soft errors, especially against multiple-bit soft errors. And the interleaving distance plays a key role in building the tolerance against multiple-bit soft errors. This paper proposes a reliability model of an interleaved memory device which suffers from multiple-bit soft errors and are protected by a combination of SEC code and scrubbing. The proposed model shows how the interleaving distance works to improve the reliability and can be used to make a decision in determining optimal scrubbing technique to meet the demands in reliability.

The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat (위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링)

  • Kim, Min-Sik;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • To get legitimacy of a security investment, the analysis of ROI about the security investment is required. In this paper, we suggest a practical quantitative model with considering factors that do decision-making of optimized security investment difficult. This model makes use of the value of a residual risk to decide the best information security solution and considers a corelation of response techniques of the information security solution against each threat to do exact decision-making.

  • PDF

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness (자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류)

  • Jeong, Yong-Woong;Noh, Sang-Uk;Go, Eun-Kyoung;Jeong, Un-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Methodology of Analyze the Risk Using Method of Determinated Quantity (정량적 방법을 이용한 위험분석 방법론 연구)

  • Park, Joong-Gil
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.851-858
    • /
    • 2006
  • The risk analysis's aim is analyze the risk for the asset of organization with asset assessment, vulnerability assessment, threat assessment. existing TTA risk analysis methodology model propose to overall flow, but can not propose to detail behavior or each level. That is, step of risk analysis is insufficient in classification of threat and detail proposal of considered the risk with classified threat. So this paper propose that analysis and evaluate the vulnerability and threat assessment with determinated quantity. this paper consider current national information system and threat of environment and technology. So can estimate the risk with determinated quantity. Finally, analyze the asset risk of organization.