Cyber Security Systems and Prospects: Focusing on the US, UK, Japan, and South Korea

2020 ◽  
Vol 20 (5) ◽  
pp. 141-161
Author(s):  
HyunMin Shin ◽  
Injai Kim
2021 ◽  
Vol 13 (10) ◽  
pp. 5573
Author(s):  
Insung Son ◽  
Sihyun Kim

This study analyzed partner volatility (new, old, revocation partners) and country-specific signal effects (United States (US), Taiwan, Japan, and South Korea) for Apple iPhone parts suppliers from 2007 to 2018. Mid- to long-term stock price movements were also analyzed to define trading patterns by investor type. The results using logit regression analysis revealed that new partners and revocation partners each have a signaling effect perceived as positive and negative information in the short term, and the excess returns by country showed a positive signaling effect in the order of the US, Taiwan, South Korea, and Japan. The findings also suggest that the change in the new partners’ stock price after the preannouncement of new products was useful investment information. Moreover, information asymmetry was found between individual investors, institutions, and foreigners. Results indicate that new partner selection in the smartphone market impacts corporate value and serves as useful investment information.


2021 ◽  
Vol 16 (3) ◽  
pp. 447-469
Author(s):  
Jonathan E. Leightner ◽  

Some Ricardian models would predict a fall in unemployment with trade liberalization. In contrast, the Heckscher-Ohlin model (Stolper Samuelson Theorem) would predict trade liberalization would cause a fall in wages for labor scarce countries, resulting in greater unemployment if there are wage rigidities. The choice of which theoretical model is used affects the empirical results obtained. This paper produces estimates of the change in unemployment due to a change in imports that are not model dependent. The estimates produced are total derivatives that capture all the ways that imports and unemployment are correlated. I find that unemployment increases with increased imports for Austria, Greece, Japan, Portugal, South Korea, Slovenia, and Sweden, but that unemployment decreases with increased imports for Australia, Belgium, Canada, Czech Republic, Denmark, Estonia, Finland, France, Germany, Hungary, Ireland, Israel, Italy, Latvia, the Netherlands, New Zealand, Norway, Poland, Slovakia, Spain, the UK, and the US.


Author(s):  
Jude Woodward

This chapter looks at South Korea’s response to the US ‘pivot’. It takes stock of the post-war division of the peninsula and its consequences for the international alignment of both North and South. It considers how the ‘economic miracle’ in South Korea led to growing competition with Japan and greater synergies with China. It looks at the degree to which North Korea threatens stability in the region, and to what extent its demonisation justifies a major US presence in close proximity to China. The chapter discusses whether resurgent China is seen as a threat to South Korean interests or chiefly viewed through the prism of mutual economic benefit; and contrasts alleged concerns about China with those provoked by Japan. It concludes that while South Korea has continued to step up its military collaboration with the US, it has not become a cheerleader for pushing back against China and has not signed up to a US strategy to contain China.


Author(s):  
Wasan Awad ◽  
Hanin Mohammed Abdullah

Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact that organizations are not capable of following the cyber security evolution and secure their storage systems from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the cyber security of their storage systems by applying certain techniques.


Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


2019 ◽  
pp. 69-100
Author(s):  
Suhi Choi

The term “Yŏsun Killings” refers to a prewar atrocity in which the US-allied South Korean forces killed numerous civilians who were accused of being either communists or communist sympathizers in the cities that had been occupied by rebels in the southwestern part of South Korea. As one of the sites of these atrocities, Gurye became the first town in South Korea to erect a public memorial in 2006 for the victims of the Yŏsun Killings. Gurye presents a case that demonstrates how democratized South Korea has continued to negotiate a strong legacy of anticommunism, even at its subversive memorial sites. In a land that has long muted the memories of an old atrocity, suppressed mourners in Gurye are still struggling to reclaim their fundamental yet long-deprived rights to mourn the loss of their loved ones.


Author(s):  
Muhammad Salman Khan ◽  
Ken Ferens ◽  
Witold Kinsner

Growing global dependence over cyberspace has given rise to intelligent malicious threats due to increasing network complexities, inherent vulnerabilities embedded within the software and the limitations of existing cyber security systems to name a few. Malicious cyber actors exploit these vulnerabilities to carry out financial fraud, steal intellectual property and disrupt the delivery of essential online services. Unlike physical security, cyberspace is very difficult to secure due to the replacement of traditional computing platforms with sophisticated cloud computing and virtualization. These complex systems exhibit an increasing degree of complexity in tracking an attack or monitoring possible threats which is becoming intractable with the existing security firewalls and intrusion detection systems. In this paper, authors present a novel complexity detection technique using generalized multifractal singularity spectrum which is able to not only capture the growing complexity of the internet time series but also distinguishes the presence of an attack accurately.


Sign in / Sign up

Export Citation Format

Share Document