• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.024 seconds

A Study on Countermeasures through Messenger Phishing Experience Analysis (메신저피싱 경험사례 분석을 통한 대응방안 연구)

  • Nam, Sowon;Lee, Haksun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.791-805
    • /
    • 2022
  • In recent years, the number of scams related to voice phishing has been on the decline, but the number of messenger phishing attacks, a new type of crime, is increasing. In this study, by analyzing SNS posts containing messenger phishing cases, criminal trends of the main methods, imposture of trusted relative and fake payment were identified. Through the analysis, main words and patterns composing the message and the similarity and continuity of the phone numbers used were derived as criminal attributes, and criminal organizations were grouped. As the results of the analysis, we propose a cooperative system to prevent damage from messenger phishing by disseminating the criminal information collected by investigative agencies to private operators, and a plan to respond to messenger phishing predicted through grouping of criminal organizations.

A Study on the Keyword Collection System for Tracking Drug Crimes on Social Media (소셜 미디어 상의 마약 범죄 추적을 위한 키워드 수집체계 연구)

  • Min-Jae Choi;Ho-Dong Lee;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.209-212
    • /
    • 2023
  • 소셜미디어를 통한 마약 유통이 증가하면서 젊은 연령층의 마약 문제가 사회 문제로 대두되고 있다. 소셜미디어 상의 마약 유통을 차단하고자 유해 키워드 차단 정책이 마련되고 있지만, 사용자들은 차단 정책을 우회할 수 있는 마약 관련 은어 및 변형어를 사용하여 검색을 시도하기 때문에 다양한 은어 및 변형어를 수집하여 차단 정책에 반영하는 것이 필요하다. 본 논문에서는 마약 유통 및 구매에 빈번하게 사용되는 일반어, 은어, 그리고 일반어와 은어의 각 변형어를 수집하고, 이를 페이스북, 인스타그램, 카카오톡, 트위터, 텔레그램을 통해 검색하여 소셜미디어 유형별로 수집되는 마약 관련 게시글을 정량적으로 분석하였다. 분석 결과, 5종의 소셜미디어 중, 트위터에서 마약 관련 은어 및 변형어를 포함하는 게시글이 가장 많이 검색되는 것을 확인하였다.

  • PDF

Factors Influencing Clinical Nurses' Practice of Personal Information Protection: Focusing on Knowledge of Personal Information Protection Law and Nursing Patient Advocacy (임상간호사의 개인정보보호 실천 영향요인: 개인정보보호법 지식, 옹호간호를 중심으로)

  • Kim, Dongeun;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.3
    • /
    • pp.261-270
    • /
    • 2023
  • Purpose: This study aimed to identify the influence of knowledge of personal information protection law and nursing patient advocacy on practice of personal information protection among nurses. Methods: The subjects were 130 nurses who have worked for six months or more in the ward of the tertiary or general hospitals. Data were collected from February 20 to March 3, 2023. Results: Factors influencing practice of personal information protection were acting as an advocate (β=.32, p=.004), environmental and educational influences (β=.21, p=.040), knowledge of personal information protection law (β=.19, p=.013) and clinical experience for five years or more but less than ten years (β=.17, p=.036). The regression model showed an explanatory power of 34.0%. Conclusion: Acting as an advocate has the most effect on practice of personal information protection. To promote practice of personal information protection for nurses, it is necessary to provide education related to privacy protection and encourage nursing patient advocacy.

Development of a Collection System of Bait Links to Social Media on Dark Web to Track Drug Crimes (마약 범죄 추적을 위한 다크웹 상의 소셜미디어 유인 링크 수집체계 개발)

  • Sol-Kyu Park;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.123-125
    • /
    • 2024
  • 다크웹(Dark Web)은 마약, 불법 촬영물, 해킹, 무기 등 불법 콘텐츠의 공유 및 거래가 이루어지는 인터넷 영역으로서 최근에는 소셜미디어와 연계된 형태로 범죄 양상이 변화하고 있다. 본 논문에서는 최근 국내 외 사회 문제로 대두되고 있는 마약 범죄를 추적하기 위한 다크웹 수사 기술로서 다크웹 사용자를 소셜미디어로 유인하는 마약 정보 수집체계를 개발한다. 먼저 미국 마약단속국에서 공개한 대표적인 마약 용어 3개의 표준어 및 은어를 검색 키워드로 사용하여 마약 관련 다크웹을 수집하고, 수집된 다크웹을 크롤링하여 소셜미디어 계정 링크를 추출한다. 본 논문에서는 다양한 소셜미디어 중, 트위터 및 텔레그램 접속 링크를 수집하였으며 실험 결과, 접속 가능한 총 54개 다크웹 도메인의 9,046개 웹 페이지에서 트위터 유인 링크 567개, 텔레그램 유인 링크 118개를 추출하였다.

  • PDF

A Study on Data Collection and Analysis of NaverWorks Collaboration Tool from a Digital Forensics Perspective (디지털포렌식 관점에서의 협업 도구 네이버웍스의 데이터 수집 및 분석 연구)

  • Hangyeol Kim;Dabin We;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.895-905
    • /
    • 2024
  • Even now that the coronavirus pandemic has ended, collaboration tools that connect office work and remote work are showing high usage rates. These collaboration tools are related to sensitive data within an organization, and a lot of data is generated through the interactions of not only individuals but also members of various organizations. However, the generated data is structurally mixed, encrypted, or deleted or hidden through anti-forensic functions supported by collaboration tools. Digital investigations targeting collaboration tools require analysis methods to collect this data and obtain key data. In this paper, we explained how to collect and analyze data using Naver Works, a collaboration tool in the Windows environment.

An Investigation of Local Naming Issue of Tamarix aphylla (에셀나무(Tamarix aphylla)의 명칭문제에 대한 고찰)

  • Kim, Young-Sook
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.1
    • /
    • pp.56-67
    • /
    • 2019
  • In order to investigate the issue with the proper name of eshel(Tamarix aphylla) mentioned in the Bible, analysis of morphological taxonomy features of plants, studies on the symbolism of the Tamarix genus, analysis of examples in Korean classics and Chinese classics, and studies on the problems found in translations of Korean, Chinese and Japanese Bibles. The results are as follows. According to plant taxonomy, similar species of the Tamarix genus are differentiated by the leaf and flower, and because the size is very small about 2-4mm, it is difficult to differentiate by the naked eye. However, T. aphylla found in the plains of Israel and T. chinensis of China and Korea have distinctive differences in terms of the shape of the branch that droops and its blooming period. The Tamarix genus is a very precious tree that was planted in royal courtyards of ancient Mesopotamia and the Han(漢) Dynasty of China, and in ancient Egypt, it was said to be a tree that gave life to the dead. In the Bible, it was used as a sign of the covenant that God was with Abraham, and it also symbolized the prophet Samuel and the court of Samuel. When examining the example in Korean classics, the Tamarix genus was used as a common term in the Joseon Dynasty and it was often used as the medical term '$Ch{\bar{e}}ngli{\check{u}}$(檉柳)'. Meanwhile, the term 'wiseonglyu(渭城柳)' was used as a literary term. Upon researching the period and name of literature related to $Ch{\bar{e}}ngli{\check{u}}$(檉柳) among Chinese medicinal herb books, a total of 16 terms were used and among these terms, the term Chuísīliǔ(垂絲柳) used in the Chinese Bible cannot be found. There was no word called 'wiseonglyu(渭城柳)' that originated from the poem by Wang Wei(699-759) of Tang(唐) Dynasty and in fact, the word 'halyu(河柳)' that was related to Zhou(周) China. But when investigating the academic terms of China currently used, the words Chuísīliǔ(垂絲柳) and $Ch{\bar{e}}ngli{\check{u}}$(檉柳) are used equally, and therefore, it appears that the translation of eshel in the Chinese Bible as either Chuísīliǔ (垂絲柳) or $Ch{\bar{e}}ngli{\check{u}}$(檉柳) both appear to be of no issue. There were errors translating tamarix into 'やなぎ(willow)' in the Meiji Testaments(舊新約全書 1887), and translated correctly 'ぎょりゅう(檉柳)' since the Colloquial Japanese Bible(口語譯 聖書 1955). However, there are claims that 'gyoryu(ぎょりゅう 檉柳)' is not an indigenous species but an exotics species in the Edo Period, so it is necessary to reconsider the terminology. As apparent in the Korean classics examples analysis, there is high possibility that Korea's T. chinensis were grown in the Korean Peninsula for medicinal and gardening purposes. Therefore, the use of the medicinal term $Ch{\bar{e}}ngli{\check{u}}$(檉柳) or literary term 'wiseonglyu' in the Korean Bible may not be a big issue. However, the term 'wiseonglyu' is used very rarely even in China and as this may be connected to the admiration of China and Chinese things by literary persons of the Joseon Dynasty, so the use of this term should be reviewed carefully. Therefore, rather than using terms that may be of issue in the Bible, it is more feasible to transliterate the Hebrew word and call it eshel.

The Multi Knowledge-based Image Retrieval Technology for An Automobile Head Lamp Retrieval (자동차 전조등 검색을 위한 다중지식기반의 영상검색 기법)

  • 이병일;손병환;홍성욱;손성건;최흥국
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • A knowledge-based image retrieval technique is image searching methods using some features from the queried image. The materials in this study are automobile head lamps. The input data is composed of characters and images which have various pattern. The numbers, special symbols, and general letters are under the category of the character. The image informations are made up of the distribution of pixel data, statistical analysis, and state of pattern which are useful for the knowledge data. In this paper, we implemented a retrieval system for the scientific crime detection at traffic accident using the proposed multi knowledge-based image retrieval technique. The values for the multi knowledge-based image features were extracted from color and gray scale each. With this 22 features, we improved the retrieval efficiency about the color information and pattern information. Visual basic, crystal report and MS access DB were used for this application. We anticipate the efficient scientific detection for the traffic accident and the tracking of suspicious vehicle.

  • PDF

Andro-profiler: Anti-malware system based on behavior profiling of mobile malware (행위기반의 프로파일링 기법을 활용한 모바일 악성코드 분류 기법)

  • Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.145-154
    • /
    • 2014
  • In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using an automatic classifier based on behavior profiling. First, we propose the representative behavior profiling for each malware family represented by system calls coupled with Droidbox system logs. This is done by executing the malicious application on an emulator and extracting integrated system logs. By comparing the behavior profiling of malicious applications with representative behavior profiling for each malware family, we can detect and classify them into malware families. Andro-profiler shows over 99% of classification accuracy in classifying malware families.

A Study of five elements in 『Hyupgiltongui』 Bonwon chapter one (『협길통의(協吉通義)』 본원일(本原一)의 5행(行)에 관한 연구)

  • Kwon, Yung-soo;Kim, Ki-Seung
    • Industry Promotion Research
    • /
    • v.5 no.3
    • /
    • pp.135-144
    • /
    • 2020
  • Five elements that form all things have been symbolized in that they are indispensable elements in human life. Moreover, each unique energy has been used to explain the existence of all creation and the origin of action. The theory of five elements can be changed and utilized into various forms, including co-existence and conflict of five elements, five elements itself, the combination of Ganji five elements, Wangsanhyususa(旺相休囚死), five elements and Yin-yang. Especially, 『Hyupgiltongui Bonwon chapter one covers five elements, five elements of Ganji, seasonal use of five elements, prosperity and decline of five elements depending on seasons, Union of 3 elements among Twelve Zodiac Signs(三合), Union of two elements among Twelve Zodiac Signs(六合), changes of Cheongan 5hab. Therefore, if you analyze and utilize them, you can tell someone's fortune by theory of five elements only and read fortune in detail by combining it with other theories.

A Study on Conspired Insurance Fraud Detection Modeling Using Social Network Analysis

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.117-127
    • /
    • 2020
  • Recently, proving insurance fraud has become increasingly difficult because it occurs intentionally and secretly via organized and intelligent conspiracy by specialists such as medical personnel, maintenance companies, insurance planners, and insurance subscribers. In the case of car accidents, it is difficult to prove intentions; in particular, an insurance company with no investigation rights has practical limitations in proving the suspicions. This paper aims reveal that the detection of organized and conspired insurance fraud, which had previously been difficult, could be dramatically improved through conspiring insurance fraud detection modeling using social network analysis and visualization of the relation between suspected group entities and by seeking developmental research possibilities of data analysis techniques.