• Title/Summary/Keyword: 개인적 원인

Search Result 2,450, Processing Time 0.039 seconds

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

자동차용 블랙박스(사고영상기록장치) 데이터에 대한 보안기술 적용방안 연구

  • Kim, Won Joo;Kim, HongHee
    • Review of KIISC
    • /
    • v.24 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • 자동차 산업 인프라의 발달로 자동차 사용 인구는 지속적으로 증가하고 있으며, 이에 따른 자동차 사고도 매년 증가하고 있다. 자동차 사고는 개인 및 사회의 비용손실과 즉결되므로 많은 운전자들이 자동차용 블랙박스(사고영상기록장치)를 구입하여 장착하고 있다. 이런 자동차용 블랙박스는 교통사고 시점의 영상을 저장 재생 하므로 정확한 사고원인을 규명하는데 활용되고 교통사고를 예방하는 효과가 있다. 그러나 그 이면에 자동차용 블랙박스는 자동차가 운행될 때 마다 영상을 촬영하고 저장되기 때문에 의도되지 않은 개인의 사생활이 노출 될 수 있으며 또한 저장된 사고영상 데이터를 의도적으로 조작하여 교통사고의 원인규명을 방해하는 문제가 발생 하기도 한다. 본 연구에서는 이러한 문제를 해결하기 위한 국내 관련 동향을 알아보고 보안기술을 적용 할 수 있는 방안을 제시하고자 한다.

Theory of planned behavior and use of Virtual Personal Assistant(VPA) (계획된 행동이론과 가상개인비서 이용)

  • Eunji Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.703-708
    • /
    • 2023
  • The current study investigates VPA usage (i.e.,continuance intention of use, WOM intention) of by Theory of Planned Behavior (i.e.,attitude toward to VPA, subjective norm, perceived behavioral control) and perceived value/risk. The results show that (1) attitude toward to VPA, subjective norm, perceived behavioral control, and perceived value positively predicted the continuance intention of VPA use. Regarding WOM of intention, there were positively significant effects of the attitude toward to VPA, subjective norm, perceived behavioral control, and perceived value. The results of this study are expected to provide a variety of practical and theoretical implications in promising artificial intelligence market by the impact of TPB (i.e.,attitude toward to VPA, subjective norm, perceived behavioral control) and perceived values of VPA.

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

Analysis on the Relations of Citizen's Personal Character and Fear of Crime (시민의 개인적 특성과 범죄두려움 관계 분석)

  • Seong, Yong-Eun;Yoo, Young-Jae
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.261-283
    • /
    • 2007
  • In recent studies for explaining the causation of crime fear shows interest and effort in studies attempting microscopical individual level and macroscopical local level of sex, age, economic level, crime damage level and etc. However, in this study, it is considered that interest and analysis of individual on characteristics of these local level may has its difference depends on crime damage experience in the past, fragility precision of crime damage and interest on crime relating information and processed positive analysis on characteristics of individual and relation of crime fear on individual level before making an attempt of connecting microscopical level and macroscopical level. Therefore, the purpose of this study is on positive verification of how people feel about crime fear depends on individual's characteristic and also how much effect would they receive. As the result of this study, it is shown that first, population statistical characteristics that crime damage experience is statistically meaningful of its difference of each group are age, status of marriage, final education status and residential area and for the fragility precision of crime damage was sex and status of marriage and for the interest about the crime relating information has meaningful difference statistically of each group depends on sex, age, final education status, income of the house and location of residential area. Second, after processing correlation analysis on individual characteristic primary factor and crime fear, the result of 3 primary factor independent variable all shows statistically meaningful correlation with crime fear and especially fragility primary factor on crime damage showed the most high correlation with crime fear. Lastly, fragility of crime damage, interest on crime information and crime damage experience has effected as characteristics of individual and especially fragility of crime damage which the person thought to be the most fragility on crime damage out of these individual characteristic primary factor showed to have the most effecting primary factor.

  • PDF

Design of Broadcasting System for One-man Media Broadcasting (1인 미디어 방송을 고려한 방송시스템 설계)

  • Kim, Jin-Kyung;Woo, Dong-Min;Piao, Ying-Li;Seo, Ji-Won;Lee, Ye-Jin;Lee, Sang-Un
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2017.11a
    • /
    • pp.120-122
    • /
    • 2017
  • 정보통신기술의 발달에 따라 컴퓨터, 스마트폰과 같은 스마트 기기가 대중화됨에 따라 개인 블로그나 SNS 등을 기반으로 하여 개인이 다양한 콘텐츠를 생산하고 공유하는 커뮤니케이션 플랫폼인 1인 미디어가 활성화 되었다. 효율적으로 1인 방송시스템을 구축하기 위해서는 기존 방송 시스템의 체계는 유지하면서 개인의 협소한 공간을 효율적으로 활용할 수 있는 방안을 요구하게 된다. 따라서 본 논문에서는 각각의 방송장비들을 노트북, 어플과 같은 스마트 기기와 연동시켜 효율적이고 편리한 1인 미디어 방송 시스템을 구축하기 위한 방법을 제안하였다.

  • PDF

A Structured Tag Clustering Method using Semantic Similarities for Photo Categorization (사진 콘텐츠의 분류를 위한 의미적 유사도 기반 구조적 태그 클러스터링 기법)

  • Won, Ji-Hyeon;Park, Hee-Min;Lee, Jong-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.427-429
    • /
    • 2012
  • 개인이 사용할 수 있는 스마트 기기가 다양해지면서 여러 기기로 생산된 사진 콘텐츠가 어떤 기준이나 규칙 없이 분산되어 있어 콘텐츠를 관리하고 원하는 콘텐츠를 검색하는 것이 어려워졌다. 따라서 본 논문에서는 개인 사진 콘텐츠를 효과적으로 분류하기 위하여 의미적 유사도를 기반으로 한 태그 클러스터링 기법을 제안한다. 태그들 사이의 유사도를 계산하여 서로 관련이 있다고 판단되는 태그들을 클러스터링 하는데, 태그가 같은 클러스터에 포함되어 있으면 그 태그를 가진 사진들도 유사성을 가진다고 볼 수 있으므로 개인 사진들을 의미에 따라 분류하는데 이용할 수 있다.

An Improved One Round Authenticated Group Key Agreement (개선된 원 라운드 인증 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.3-10
    • /
    • 2013
  • Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols. In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system. The proposed protocol modified Shi et al.'s protocol and He et al.'s protocol. The public and private keys and the signature process of our protocol are simpler than them of their protocols. Our protocol is secure and more efficient than their protocols in communication and computation costs.

오피니언 - 우리 삶 속에 Chemical의 소중함 - 자연자원 효율성 제고 '지속가능 화학' 추구 -

  • Han, Gyu-Tae
    • Life and Agrochemicals
    • /
    • s.255
    • /
    • pp.24-27
    • /
    • 2010
  • '지속가능화학'에서는 사회 구성원이 심리적이고 주관적으로 느끼게 되는 '위험성 인식'(risk perception)이 주요하다. 위험 인식은 단순한 기술적 평가가 아니라 개인의 심리적 요소와 함께 자신이 화학물질의 영향을 어느 정도까지 통제할 수 있는가의 정도에 따라서 달라질 수 있다.

  • PDF

Behavior Improvement of Unethical Information-Sharing by The Ethical Program : Social Capital and Ripple Effect (윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선: 사회적 자본과 잔물결 효과)

  • Jung, Byoung-Ho;Kim, Byung-Cho
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.169-182
    • /
    • 2017
  • The purpose of this study is to empirically examine a behavior improvement of unethical information sharing through the ethics program in organization. An unethical behavior of information sharing on organization members is to be get to private interests through divulgence of company's confidential information. An unethical information-sharing of individual is the opportunist and selfish behavior for an expansion of social capital and shows a negative ripple effect in organization. When conducting the research methods, the analysis order performs the cluster, discriminant, t-test and multiple regressions. According to the study, There are differences the behavior of unethical information sharing between opportunist and non-opportunist. The opportunist member for unethical behavior improvement required the program operation both value and compliance oriented program. Non-opportunist member required only the value-oriented program. The upcoming research needs to explore both ethics program's frequency and action of a punished person.