검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 25

        1.
        2024.05 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.
        4,300원
        2.
        2024.02 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 논문의 목적은 한국이 직면한 뉴테러리즘 양상과 위협 요인을 분석해보고, 선제적으로 대응할 수 있는 과제에 대해 제시해 봄에 있다. 현재 한국은 포괄적 안보상황 하에서 대중과 다중이용시설 대상 무차별적 공격의 사전 차단 및 대량살상 등 전방위적으로 테러위협에 대응하고 있다. 이에 이 논문에서는 테러 수단의 첨단화 및 고도화되고 있는 뉴테러리즘에 대해 선제적으로 국가 및 국민적 인식을 강화하고 취약점 보완을 위해 법률적, 제도적 대응 방안을 제시했다. 또 포괄적 안보 상황을 반영하여 국내 테러 양상을 분석하고, 테러예방시스템 구축을 위한 통합방위법 및 테러방지법의 상호 연계성과 사법집행 강화를 위한 근거를 마련해야 한다. 특히 AI 기반의 테러예방 및 대응 시스템 등 4차 산업혁명의 신기술 적용을 토대로 테러위협을 선제적 으로 차단하고 이 같은 기술을 활용하는 대테러업무 담당자를 대상 으로 교육훈련을 강화할 수 있는 방안 역시 마련해야 한다.
        7,000원
        3.
        2023.11 구독 인증기관·개인회원 무료
        In recent times, drone technology has been rapidly advancing and becoming increasingly popular. Furthermore, there has been an increase in the number of crimes and terrorism cases targeting national facilities using drones. This study aims to categorize the types of drone threats that could pose future risks to nuclear power plants. For this study, we are investigating domestic and foreign drone terrorism cases and identifying the specifications of drones used. It has been confirmed that products from Chinese DJI companies have frequently appeared as commercial drones used in terrorism. This suggests that conversion of general commercial drones into weapons can be effectively utilized for terrorist activities. There is an elevated risk of terrorism involving multiple small drones. Nuclear power plants must also devise protective measures against a large influx of drones. Additionally, it is predicted that North Korea is developing drones equipped with return technology through GPS-based autonomous mission flights. North Korea’s drones are presumed to have been converted from Chinese drones (SKY-09P, UV10CAM, etc.). According to the analysis based on the weight and size of the drone, drones weighting less than 150 kg and wingspan of less than 3 m are used for terrorism. To effectively detect drones, it is necessary to implement measures such as integrating and deploying various equipment to compensate for equipment limitations (radio waves, radar, video, sound, etc.). In the case of long-distance flight, a number of fixed-wing drones capable of autonomous mission flight and long-distance flight were used. North Korea’s drones use GPS-based autonomous mission flights, so it is necessary to prepare drones that do not transmit RF signals to detect them. Both RF signal detection and GPS jamming should be carried out, with GPS jamming taking precedence, even in the case of fixedwing drones. The results of this study could contribute to enhancing the level of physical protection of nuclear power plants.
        4.
        2023.07 구독 인증기관·개인회원 무료
        The hospitality industry is widely using customer data to develop successful personalized marketing communication. However, in the event of information leakage, personalized advertising may escalate customers’ privacy distress. Building on Conservation of Resources theory, this study proposes three dimensions for privacy threats that impact the relationship between personalized hospitality advertising and consumer responses. Findings from six experiments across high and low involvement hospitality products demonstrate diverging effects of personalized advertising depending on the type of privacy threat communicated. Results further indicate that customers’ psychological comfort mediates the relationship between high-personalized advertising and the customer response to the advertising when privacy threat is high. Additionally, when the perceived severity and distance of the announced privacy threat are high and low respectively, rational appeals generate higher levels of psychological comfort, while the same happens for emotional appeals when the perceived scope of the threat is high. The study concludes with value-adding theoretical and managerial implications for the hospitality industry.
        5.
        2023.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 연구는 아시아의 국제관계가 변화하는 맥락에서 "아시아 나토"의 실 행 가능성과 잠재적 영향을 검토한다. 아시아 버전 나토의 가능성을 분 석하기 위해 세 가지 목표를 추구한다: (1) 나토의 성격을 조사하고 아시 아에서의 잠재적 적용을 검토한다, (2) 세력균형이론과 위협균형이론의 관점에서 나토의 과거 실패를 검토한다, (3) 정치와 군사적 도전을 고려 한 아시아 나토의 실행 가능성을 평가한다. 이 연구는 미국과 일본을 중 심으로 아시아 나토에 대한 관심이 증가한 지정학적 변화를 탐구한다. 현재 미중 균형과 위협 사이의 균형은 양자 및 삼자 동맹을 설정하는 데 이르렀지만 아시아 나토의 가능성은 여전히 쉽지 않다. 그러나 중국이 지역 패권 추구로 인한 압도적인 외부 위협을 초래하면, 아세안 국가들 은 집단 안보 체제에 가입할 수 있다. 본 논문은 특히 이러한 상황에서 한국이 직면할 수 있는 문제점에 대해서도 지적한다.
        6,700원
        6.
        2023.05 구독 인증기관·개인회원 무료
        In the wake of the Fukushima NPP accident, research on the safety evaluation of spent fuel storage facilities for natural disasters such as earthquakes and tsunamis has been continuously conducted, but research on the protection integrity of spent fuel storage facilities is insufficient in terms of physical protection. In this study, accident scenarios that may occur structurally and thermally for spent fuel storage facilities were investigated and safety assessment cases for such scenarios were analyzed. Major domestic and international institutions and research institutes such as IAEA, NEA, and NRC provide 13 accident scenario types for Spent Fuel Pool, including loss-of-coolant accidents, aircraft collisions, fires, earthquakes. And 10 accident scenario types for Dry Storage Cask System, including transportation cask drop accidents, aircraft collisions, earthquakes. In the case of Spent Fuel Pool, the impact of the cooling function loss accident scenario was mainly evaluated through empirical experiments, and simulations were performed on the dropping of spent nuclear fuel assembly using simulation codes such as ABAQUS. For Dry Storage Cask System, accident scenarios involving structural behavior, such as degradation and fracture, and experimental and structural accident analyses were performed for storage cask drop and aircraft collision accidents. To evaluate the safety of storage container drop accidents, an empirical test on the container was conducted and the simulation was conducted using the limited element analysis software. Among the accident scenarios for spent fuel storage facilities, aircraft and missile collisions, fires, and explosions are representative accidents that can be caused by malicious external threats. In terms of physical protection, it is necessary to analyze various accident scenarios that may occur due to malicious external threats. Additionally, through the analysis of design basis threats and the protection level of nuclear facilities, it is necessary to derive the probability of aircraft and missile collision and the threat success probability of fire and explosion, and to perform protection integrity evaluation studies, such as for the walls and structures, for spent fuel storage facilities considering safety evaluation methods when a terrorist attack occurs with the derived probability.
        7.
        2023.05 KCI 등재 구독 인증기관 무료, 개인회원 유료
        On January 4, 2020, the official Twitter account of the former US President Trump threatens to target Iran’s cultural heritage sites conditioned on any Iranian retaliation on US military forces then stationed in the Middle East. The immediate context was that the US-led drone strike had killed Iran’s Major General Qasem Soleimani in Iraq (Baghdad) only two days prior. This study critically analyzes whether “Tweets” uploaded to President Trump’s Twitter account could reasonably be construed as a type of harm against international law instruments and framework on the safeguarding of cultural heritage. This paper provides a brief contextual overview of President Trump’s Tweets; traces the historical destruction of cultural property during conflicts and discusses the preservation of heritage; delineates international laws and assesses whether President Trump and the US might be legally bound to refrain from threats to destroy cultural property; and examines the increasing role of social media in the evolution of the idea of diplomacy.
        5,800원
        8.
        2023.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 논문은 북한의 무인기 위협과 한국의 대응을 분석하기 위한 것이 다. 이를 위해 무인기와 비대칭위협, 북한의 무인기 위협 현황 및 평가, 한국의 북한 무인기 위협 대응과제를 살펴본 후 결론을 도출하였다. 최 근 북한은 비행금지구역을 침범하는 등 무인기에 의한 새로운 형태의 대 남도발을 시도하고 있다. 북한의 무인기 침투의 경우 운용상의 비대칭성 과 대남 테러 가능성으로 인해 비대칭성이 존재한다. 북한의 무인기 개 발은 기존의 정보·감시·정찰의 목적에서 공격용으로 전환되는 추세이다. 북한의 무인기 개발배경은 북한의 안보적·상징적·대남위협적 동기 및 효 과에서 나온 것이다. 향후 북한의 무인기 대응을 위해 ①민·관·군 협력 제고, ②합동 드론사령부 창설, ③한미동맹 차원의 협력 제고 등의 과 제를 적극 추진해 나가야 할 것이다.
        8,400원
        9.
        2022.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        동북아 지역에서 미국과 중국이 세계 유일 초강대국의 지위를 두고 충 돌하는 사이에 일본은 재래식 군사력을 꾸준히 증강시키고 있으며, 러시아 는 영토확장 욕심을 우크라이나 침략전쟁을 통해 나타내고 있다. 국제사회 의 다양한 제재에도 불구하고 지속적으로 핵무장을 추구해온 북한은 이제 한국을 향한 핵무기 사용까지 노골적으로 언급하고 있다. 이처럼 변화하 고 있는 동북아 지역의 안보환경은 세계 10대 경제대국이자 재래식 군사 력 6위권에 있는 한국으로 하여금 독자적으로 생존할 수 있는 생존전략을 모색하도록 요구하고 있다. 동북아 지역에서 미국과 중국이 벌이고 있는 패권경쟁의 틈바구니에 놓인 한국이 독자적으로 생존하고 지속적으로 번 영하기 위해서는 최우선적으로 국민들의 호국정신부터 고양시킨 다음 한 국군을 정예화시켜야 한다. 최근 우크라이나와 러시아간에 진행되고 있는 전쟁상황을 보더라도 외부 위협에 대한 국민들의 저항의지를 고양시키는 것이 가장 중요한 것으로 입증되고 있다. 일대일로 전략을 통해 전 세계의 패권을 장악하려는 중국의 동진 위협에 대응하기 위해서는 미국의 인도- 태평양 전략에 적극적으로 참여해야 하며, 한-미-일 동맹관계를 강화해야 한다. 현실화된 북한의 핵과 미사일 위협은 한국의 생존에 결정적인 영향 을 미치므로 미국의 확장억제 정책에 대한 신뢰도를 높이고, 독자적인 핵 무장을 추진해서 자위권을 확보해야 한다. 낸시 펠로시 미국 하원의장의 대만 방문을 계기로 美·中 충돌 가능성이 더욱 높아져 가고 있다. 20세기 초 국제안보환경 변화에 제대로 대응하지 못해서 일본의 식민지가 되었던 과오를 되풀이하지 않기 위해서는 우리 스스로 생존능력을 갖춰야 한다.
        7,700원
        10.
        2022.05 구독 인증기관·개인회원 무료
        KINAC (Korea Institute of Nuclear Non-proliferation and Control) is entrusted with the NSSC (Nuclear Safety And Security Commission) to conduct threat assessments for nuclear facilities. As part of the threat assessment, DBT (Design Basis Threat) must be established every three years, and a threat assessment report must be developed for DBT establishment. This paper suggests a method for collecting and analyzing cyber threat information for the development of a cyber security threat assessment report. Recently, cyber threats not only in the IT (Information Technology) field but also in the ICS (Industrial Control System) field are rapidly increasing. As cyber threats increase, threat information including related attack techniques is also increasing. Although KINAC is conducting a threat assessment on cyber security at nuclear facilities, it cannot collect and analyze all cyber threat information. Therefore, it is necessary to determine a reliable source of threat information for threat assessment, and establish a strategy for collecting and analyzing threat information for DBT establishment. The first method for collecting and analyzing threat information is to first collect threat information on industrial fields with high similarity to nuclear facilities. Most of the disclosed cyber threat information is in the IT field, and most of this information is not suitable for closed-network nuclear facilities. Therefore, it is necessary to first collect and analyze threat information on facilities that use networks similar to nuclear facilities such as energy and financial sector. The second method is to analyze the attack technique for the collected threat information. The biggest factor in DBT reset is whether there is a new threat and how much it has increased compared to the existing threat. Therefore, it is necessary to analyze which attack technique was used in the collected threat information, and as part of the analysis, a cyber attack analysis model such as a kill chain can be used. The last method is to collect and manage the disclosed vulnerability information. In order to manage vulnerabilities, it is necessary to analyze what assets are in the nuclear facility first. By matching the reported vulnerability with the CDA (Critical Digital Asset) in the facility, it is possible to analyze whether the CDA can be affected by a cyber attack.As cyber threats continue to increase, it is necessary to analyze threat cases of similar facilities, attack techniques using attack models, and vulnerability analysis through asset identification in order to develop a threat assessments report.
        11.
        2022.04 KCI 등재 구독 인증기관 무료, 개인회원 유료
        북한은 지속적으로 핵능력을 고도화하고 있다. 이에 본 연구를 통해 북핵 위협에 대비하기 위한 억제 및 방호를 중심으로 현실적인 대응방 안을 제시하고자 한다. 현실적 대응방안은 다음과 같다. 우선 명확한 북핵 위협을 실체를 인식해야 한다. 둘째 기존의 북핵 대응 정책의 전 면적인 재정비가 필요하다. 셋째 한미동맹을 바탕으로 확장억제의 실행 력이 제고되어야 한다. 넷째 가용한 모든 수단을 활용하여 포괄적 전방 위 억제대책이 강구되어야 한다. 마지막으로 억제 실패에 대비한 실질 적인 핵방호 및 피해 최소화 방안을 강구해야 한다. 이러한 대응방안을 강구함에 있어 결단과 국민의 공감대 형성이 필수적이다. 한국형 핵공 유와 핵동맹 등 특단의 대책도 필요하다. 그리고 세부적인 로드맵과 강 력한 실행계획을 바탕으로 북핵 위협에 철저히 대비해야 할 것이다.
        5,500원
        12.
        2021.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.
        4,000원
        13.
        2021.12 KCI 등재 구독 인증기관·개인회원 무료
        점차 최근 들어 새로운 기술로 주목받고 있는 무인항공기 또는 드론을 이용한 테러공격의 개연성이 점차 심각한 위협으로 대두되고 있다. 테러 집단의 신기술에 대한 관심과 투자는 자신들의 테러 목적을 달성과 테러 활동을 지속을 위해 새로운 기술적 수단을 찾는 형태로 지속되고 있다. 이에 따라 오늘날 몇몇 테러집단들은 테러공격수단으로 상당한 수준의 드론을 확보하고 있는 상황이다. 이와 관련해 심각한 문제는 드론을 이 용한 공격이 전통적인 무기를 사용할 때 보다 더 많은 사상자를 발생시킬 수 있고, 대량살상무기들인 핵물질이나 화학물질과 함께 이용하면 그 살상력과 파괴력이 더욱 커진다는 점이다. 또한 드론은 값이 싸며, 조종 이나 이용이 간편하고 기존의 보안시스템을 회피할 수 있다는 장점이 있다. 더 나아가 앞으로 테러집단의 드론을 이용한 테러공격이 가속화되고 정교화 될 경우 하드타켓에 대한 테러의 접근이 용이해 질 것으로 보여져 그 피해가 더욱 클 것으로 우려된다. 이 같은 무인항공기 또는 드론을 이용한 테러집단의 테러전략과 전술의 변화를 국제사회는 매우 심각하게 받아들이고 대응할 필요가 있다. 테러세력은 언제나 새로운 공격방법, 진전된 공격무기와 수단을 찾는 다는 점을 인식하고 국가안보기관의 대응 역시 새로운 기술발전의 추이에 발맞추어야 할 것이다. 그러나 국제적으로 기존의 항공법 등과 관련한 다수의 기존법률이 안보기관들의 무인항공기/드론 테러에 대한 대응을 효과적으로 지원하지 못하는 문제점이 존재한다는 점이 지적되고 있다. 국내의 경우도 마찬가지로 이 같은 대응에 대해 아직까지 입법적 조치가 이루어지지 않은 상황이다. 따라서 이와 같은 관련 부문에 대한 필요에 따라 이 연구는 국내의 무인항공기 또는 드론의 법적 의미와 그 범위를 파악하고 국내의 무인항공기 관리와 그 문제점들에 대해 평가한다. 또한 미국의 안보기관의 드론 테러 대응 실험 및 연구, 테스트 등을 가능하게 하는 입법조치를 소개하면서 국내의 적용가능성에 대해 논의하였다.
        14.
        2021.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        This study examines the trends of domestic and foreign smart industries and discusses safety and security issues. Based on the actual situation survey and interview of the smart factory, we would like to examine the perspectives on risks and threats. We will examine safety and health issues related to new harmful and risk factors that may occur in smart factories and suggest institutional development directions for future safety and health. First, a safety and health-related work environment for smart factory workers is investigated and interviews are conducted. Second, we investigate new risk factors and threats to prevent industrial accidents for workers in smart factories. The purpose of this study is to examine what are the new risk factors in the smart factory. In addition, we will try to find reasonable improvement measures by finding out the risks and threats of smart factories through case studies in advanced countries, on-site interviews and surveys.
        4,000원
        16.
        2021.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        This study aims to face common threats from the depletion of fish resources, the decline of production and employment as well as the increase of life risk in East Sea Rim countries, North Korea, South Korea, Japan and Russia due to the Chinese fishing fleets entering East Sea. The recent competition in fishing among fishing vessels and fleets of national origin operating in the East Sea has induced a significant change in the ecological landscape of the fishing fleets cluster while having influenced production and employment in the fishing industries of South Korea and Japan as well as life threat on the fishermen in North Korea. It seems that the population organizational ecological theory can be applied to this change. It can be seen as the isomorphism of the selection process over the exclusive economic zone (EEZ) to avoid the environment in which these North Korean fishing vessels are pushed against the Chinese fleet in the North Korean part of the East Sea. To resolve the fishery disputes or conflict in the common waters in East Sea, first of all, Chinese fishing fleets will be required to put international pressure so as to solve the unfairness of the illegal fishing and overfishing by the International Fishery Organization or the UN violations of the sanctions against North Korea selling fishing rights to China. Although it is not easy for South Korea to cooperate with North Korea in the short term, South Korea will be able to support the fishery infrastructure in North Korea in the mid- to the long-term to prevent the loss of innocent lives for their fishermen and to raise their incomes.
        5,800원
        18.
        2017.07 구독 인증기관 무료, 개인회원 유료
        Brand threats are unexpected, widely spread negative brand occurrences that are manifest in various forms such as rumours (Einwiller et al., 2008), negative publicity (Ahluwalia et al., 2000), ethical scandals (Huber et al., 2010; Lisjak et al., 2012; Trump, 2014) and product failures (Dawar and Pillutla, 2000; Ahluwalia et al., 2001). They are quite common in the marketplace with adverse effects on brand reputations and brand equity (Duttta and Pullig, 2011) by thwarting consumers` expected benefits from the brand (Ahluwalia et al., 2000; Dawar and Pillutla, 2000; Dutta and Pullig, 2011). Due to the frequency and seriousness of brand threats, academic interest in studying the effects of brand threats as well as predicting consumers responses has been rising in the past decade (Swaminathan et al., 2007; Cheng et al., 2012; Lisjak et al., 2012; Trump, 2014). Brand threat literature has evolved over the years from few case studies focusing on organizational response strategies to empirical work documenting cognitive and attitudinal responses by consumers to different types of threats. However, there are still a number of inconsistencies within this loose body of work that requires further research attention. The following section will highlight some of the most imminent controversies within the brand threat literature and thus paving the way for the current review paper to synthesize different streams of research and offer some conceptual clarity on brand threats. First, with regards to the conceptualization of brand threats, there appears to be no broad agreement on a precise definition of what constitutes a threat at the brand level. Over the past few years, scholars have expressed this notion using words such as negative brand publicity (Ahluwalia et al., 2000;2001; Pullig et al., 2006), brand scandal (Roehm and Tybout, 2006), brand failure (Roehm and Brady, 2007; Cheng et al., 2012), brand-related crisis ( Dawar and Lei, 2009; Dutta and Pullig, 2011), brand misconduct (Huber et al., 2010) and brand transgression (Trump, 2014). While these definitions can be used interchangeably as they reflect the overall characteristic of brand threats; they draw upon different theoretical foundations. As a result, competing views and understandings of brand threats have materialised, resulting in perennial dissensus within the extant literature. In addition, there is a debate in the literature with regards to the differential effects of brand threat types. The majority of prior research on brand threats has predominantly focused on two types of threat which is product–related brand threat (Ahluwalia et al., 2000; 2001; Cheng et al., 2012; Swaminathan et al., 2007) and values-related brand threats. Product-related threats usually involve defective or dangerous products and reduce a brand's perceived ability to deliver its functional benefits (Dawar and Pillutla, 2000; Pullig et al., 2006; Roehm and Brady, 2007; Dawar and Lei, 2009). Values-related threats, on the other hand can be defined as unexpected events that threaten a brand's perceived ability to deliver expressive or symbolic benefits (Dawar and Lei, 2009; Pullig et al., 2006). They do not involve the product but rather the social or ethical values of the brand (e.g., Pullig et al., 2006). Both types of threats have negative impact such as brand equity, satisfaction and choice likelihood (Dutta and Pullig, 2011), however existing work offer contradictory findings with regards to the degree of damage caused by either type of brand threat. While some studies implicate the product related threats are more damaging to the brand, other studies indicate that values related threats have more negative impact. For instance, product related threats have been reported to damage brand image and trust (Dawar and Pillutla, 2000), lead to consumer brand switching and consequently cause financial losses (Cleeren et al., 2008). On the other hand, Huber et al. (2010) report that a brand's moral threat can be more damaging for consumers` relationship quality with the brand as well as repurchase intention. In addition, Folkes and Kamins (1999) indicate that negative ethical information is perceived as more diagnostic than product attribute information. Additionally, Trump (2014) compared both types of threats (product vs. ethical) in the same study and reported that ethical-related brand threats can be more damaging than product-related threats. This in turn has contributed to growing inconsistencies within the brand threat literature and elaborated the need for more empirical work to reconcile these conflicting streams of research. An additional layer of controversy within the brand threat literature pertains to the impact of consumer brand relationship in predicting consumer responses. The general assumption is that the stronger the relationship between the consumer and the brand, the more insulated the brand remains from the negative impact of brand threats, however research yield mixed results. While some studies indicate the positive role of strong consumer brand relationship in mitigating the negative impact of brand threats (Ahluwalia et al., 2000; 2001; Einwiller et al., 2006), studies by Roehm and Brady, (2007) and Cleeren et al., (2008) suggest that these positive impacts are only shortlived. While other researchers show that high quality brand relationship may actually result in more negative consumer responses following threat (Hubler et al., 2010). Lastly, there has not been a unified conceptual framework to predict consumer responses to brand threat; different studies have used different theoretical underpinnings to examine the phenomenon reporting different results. Earlier studies on the subject were quite sparse, apart from a few attempts limited to case studies from public relations and publicity literature, there has been no systematic study of how consumers respond to brand threats (Ahluwaia et al., 2000). A common assumption in that literature was that brand threats in the form of negative publicity is considered more credible and influential than the brand`s marketing communications and therefore will always lead to serious adverse consequences (Bond and Kirshenbaum, 1998). Moreover, consumers were assumed to always respond in a uniform manner (Mgrconi, 1997; Pearson and Mitroff 1993). Although these studies have offered insights into how people process negative information and form evaluations, their findings were limited to experimental contexts in which subjects have to evaluate unfamiliar individuals. Although, several theoretical models have been proposed to understand consumers' responses to different types of brand threats (Ahluwalia et al., 2000; Dawar and Pillutla, 2000; Dawar and Lei, 2009; Huber et al., 2010; Roehm and Tybout, 2006; Cleeren et al., 2008; Dutta and Pullig, 2011), the findings of these studies reported mixed findings. Additionally, this body of work failed to present a unifying theoretical framework that predicts how consumers respond to negative information about commercial brands that they are familiar with nor did they identify the factors that could moderate the response strategies (Ahluwalia et al., 2000). Therefore, the current study seeks to review the existing literature on brand threats to propose an integrative classification framework that predicts consumer responses to different types of brand threats. Specifically, this review will offer four important contributions. Firstly, the review will offer a holistic conceptualization of brand threats and its different forms. Secondly, it will highlight existing studies that demonstrate consumer responses to brand threats and the important moderating factors captured in previous studies clustered around four main categories: corporate responses, threat-related characteristics, consumer characteristics, and consumerbrand relationships. Thirdly, the review will propose a theoretical framework and a number of propositions that predict the conditions under which consumers pursue specific responses to brand threat. The proposed framework will also identify a number of situational factors and individual traits that moderate may consumer responses. Lastly, the review will conclude by highlighting underdeveloped theoretical intersections pertaining to the long term effects of brand threats and suggesting potentially fruitful directions for future inquiry. The above contributions will integrate brand threat research in marketing and management theory within a single organizing framework. Moreover, by consolidating past results and setting the stage for further efforts, this review will seek to foster greater integration of fresh perspectives from other disciplines such as social psychology, sociology, consumer research and management to broaden the scope of research on band threat.
        3,000원
        19.
        2016.05 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The two Japanese security laws which came into force on March 29, 2016, have faced severe domestic and international criticism. They are seen as representing a dramatic policy change in violation of due process and international norms, and representing a threat to international peace and security. This paper finds that while the direct implications of the “war” legislation are neither threatening nor without precedent, what the legislative process says about the nature of governance under Abe is deeply troubling. The disdain shown by the Abe administration to due process and constitutional procedures is what threatens domestic and international governance stability.
        4,000원
        20.
        2014.05 KCI 등재 구독 인증기관 무료, 개인회원 유료
        ‘Chinese threat’ is highly controversial in international academia. This article attempts to expose the China threat and provide a comprehensive analysis as to the extent of the so - called threat. The essence of the ‘Chinese threat’ is based on misunderstandings concerning Chinese culture, on ill - reasoned historical experiences of rising powers and conflict, on the great gap between Christian and Chinese culture, and on the inherent nature of expansiveness of the former. In contrast, the Bush Doctrine (including the preemptive strike theory) poses an actual threat to China, as does the US protection of Japan unconditioned on Japanese admission and repentance for heinous war crimes committed during World War II. Treating China as an equal is the best policy that could be employed by the West. China’s unification and domestic stability would greatly contribute to world peace, while supporting the China threat ideology would have the opposite effect.
        5,400원
        1 2