Processing math: 100%
  • Title/Summary/Keyword: 개인 정보 노출 위험

Search Result 150, Processing Time 0.022 seconds

Factors Associated with Latent Delinquent Classes among Elementary School Students (초등학생들의 잠재적 일탈집단 유형에 영향을 미치는 요인에 관한 연구)

  • Hyun, Anna
    • Korean Journal of Social Welfare Studies
    • /
    • v.40 no.1
    • /
    • pp.197-234
    • /
    • 2009
  • Typological theories of offending postulate that childhood-onset delinquents have a high likelihood of being serious and chronic offenders and that there are a distinct set of risk factors predicting early-onset antisocial behaviors. It is useful to empirically classify children into subgroups based on their deviant behaviors because it helps us to identify unique factors associated with each subgroup. Using the first two waves of the Korean Youth Panel Survey, Elementary School Data, this study aimed(a) to empirically classify 5th graders into latent delinquent subgroups, and (b) to examine the impact of individual, familiar, school, and peer factors on the latent delinquent classes. Latent class analysis yielded three latent classes based on 15 indicators of deviant behaviors - delinquent class, low-level delinquent class, & normative class. The results from multivariate multinomial logistic regression analyses revealed that being male, reporting low self-control, coming from poor family, high association with deviant peers, and being bullied increased the risk of being in the delinquent class. Moreover, low self-control, aggression, domestic violence, low level of attachment to teachers, and deviant peers independently increased the risk of being in the low-level delinquent class compared to the normative class. Based on the study findings, implications for practice as well as future studies were discussed.

The Voice Template based User Authentication Scheme Suitable for Mobile Commerce Platform (모바일 상거래 플랫폼에 적합한 음성 템플릿 기반의 사용자 인증 기법)

  • Yun, Sung-Hyun;Koh, Hoon
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.215-222
    • /
    • 2012
  • A smart phone has functions of both telephone and computer. The wide spread use of smart phones has sharply increased the demand for mobile commerce. The smart phone based mobile services are available anytime, anywhere. In commercial transactions, a digital signature scheme is used to make legally binding signature to prove both integrity of commercial document and verification of the signer. Smart phones are more risky compared with personal computers on the problems of how to protect privacy information. It's also easy to let proxy user to authenticate instead of the smart phone owner. In existing password or token based schemes, the ID is not physically bound to the owner. Thus, those schemes can not solve the problem of proxy authentication. To utilize the smart phone as the platform of mobile commerce, a study on the new type of authentication scheme is needed where the scheme should provide protocol to get legally binding signature and not to authenticate proxy user. In this paper, we create the mobile ID by using both the USIM and voice template of the smart phone owner. We also design and implement the user authentication scheme based on the mobile ID.

Histogram-Based Singular Value Decomposition for Object Identification and Tracking (객체 식별 및 추적을 위한 히스토그램 기반 특이값 분해)

  • Ye-yeon Kang;Jeong-Min Park;HoonJoon Kouh;Kyungyong Chung
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.29-35
    • /
    • 2023
  • CCTV is used for various purposes such as crime prevention, public safety reinforcement, and traffic management. However, as the range and resolution of the camera improve, there is a risk of exposing personal information in the video. Therefore, there is a need for new technologies that can identify individuals while protecting personal information in images. In this paper, we propose histogram-based singular value decomposition for object identification and tracking. The proposed method distinguishes different objects present in the image using color information of the object. For object recognition, YOLO and DeepSORT are used to detect and extract people present in the image. Color values are extracted with a black-and-white histogram using location information of the detected person. Singular value decomposition is used to extract and use only meaningful information among the extracted color values. When using singular value decomposition, the accuracy of object color extraction is increased by using the average of the upper singular value in the result. Color information extracted using singular value decomposition is compared with colors present in other images, and the same person present in different images is detected. Euclidean distance is used for color information comparison, and Top-N is used for accuracy evaluation. As a result of the evaluation, when detecting the same person using a black-and-white histogram and singular value decomposition, it recorded a maximum of 100% to a minimum of 74%.

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

Exposure to Crime News, Multicultural Acceptability, and the Mediation Effects of Perceived Risk (범죄 뉴스 노출과 다문화수용성 위험지각의 매개효과를 중심으로)

  • Heo, Yun-Cheol;Im, Yung-Ho
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.92-123
    • /
    • 2016
  • This paper aims to examine systematically how audiences' exposure to crime news influences their multicultural acceptability. In particular, the analysis has focused on how the variance in the effects of contacts with crime news on foreigners takes place, according to the types of media and communication favored among the audiences. Also, with perceived risk toward crime as a mediating variable, this research scrutinizes the way crime news on foreigners comes to influence multicultural acceptability among the audiences. While various news sources and communication channels are influential in strengthening the perceived possibility of crime on the individual level, the results show, television seems to be particularly more effective with regards to the perceived prevalence of crime on the social level (RQ 1). Also, while contacts with crime news through 'dialogic' media rarely influence multicultural acceptability significantly, 'discursive' media and face-to-face contacts have negative impacts on the multicultural acceptability (RQ 2). Consequently, perceived risk on the social level seems to play the role of full mediation in the process where audiences' contact with crime news through discursive media influences their multicultural acceptability (RQ 3). Based on these findings, both theoretical and practical implications were discussed.

  • PDF

A Study of Adverse Health Symptoms of Spray Painters Using Isocyanates(HDI) (분사페인트에 의한 이소시안화물의 노출이 건강에 미치는 영향에 관한 연구)

  • Lee, So-Gil;Pisaniello, Dino;Lee, Nae-Woo
    • Journal of the Korean Society of Safety
    • /
    • v.23 no.3
    • /
    • pp.79-86
    • /
    • 2008
  • In the manufacturing industries using HDI(hexamethylene diisocyanate) product hardeners, exposure to HDI is common to spray painters in terms of inhalation and dermal or ocular contact. Due to a lack of information for spray painters in automobile and furniture industries, a questionnaire survey was conducted for the prevalence of adverse health symptoms(33 spray painters and an unexposed group n = 91) to assess the importance of personal controls. Despite the small sample size, common health symptoms were reported, such as skin symptoms(dry cracked skin-61% and dermatitis/skin irritation-33%) and respiratory symptoms(phlegm-49%, asthma-21%). In addition, other adverse health symptoms were reported, such as skin rash(12%), cough(39%), shortness of breath with wheezing(30%), chest tightness and difficulty in breathing(30%). No significant eye symptoms were reported. It was founded that the adverse health symptoms reported in this study were related to poor personal work practices and inappropriate PPE use. Therefore, appropriate personal controls like PPE use, work practices, regular training and education are suggested to minimize the risk of health symptoms. In addition, medical examination will also be suggested for individual health effects.

A Study on Personalized Product Demand Manufactured by Smart Factory (스마트팩토리 환경의 개인맞춤형 제품 구매의도의 영향요인에 관한 연구)

  • Woo, Su-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.23-41
    • /
    • 2019
  • Smart Factory is different from existing factory automation in that it aims to produce personalized products with minimum time and cost through ICT. However, previous researches, not from consumers but from product suppliers, have focused on technology trends and technology application methods. In order for Smart Factory to be successful, it must go beyond supplier-focus to meet the needs of consumers. In this study, we surveyed the purchase intention of the personalized product manufactured by smart factory. Influencing factors of purchase intention were drawn as consumers' need for uniqueness, innovativeness, need for touch, and privacy concern, based on previous research. As results of data analysis, it was confirmed that respondents were willing to purchase personalized products, and that consumers' need for uniqueness, innovativeness, and need for touch had a significant impact on purchase intention of personalized products. Our findings can be summarized as follows. First, Consumers' need for uniqueness was found to have positive effects(β=0.168) on purchase intention of personalized products. The desire to differentiate themselves from others will be reflected in their personalized products. Therefore, consumers with a higher desire for uniqueness tend to be more willing to purchase personalized products. Second, consumer innovativeness was found to have positive effects(β=0.233) on purchase intention of personalized products. Personalized shoes suggested in this study is a new type of personalized product that is manufactured by the latest information and communication technologies such as multi-function robots and 3D printing. Therefore, consumers seeking innovative new experiences are more willing to purchase personalized products. Third, need for touch was found to have positive effects(β=0.299) on purchase intention of personalized products. In a smart factory environment, prosuming participation is given to consumers. If consumers participate in the product development process and reflect their requirements on the product, they are expected to increase their purchase intention by virtually satisfying the need for touch. Fourth, privacy concern was found to have no significantly related to purchase intention of personalized products. This is interpreted as a willingness to tolerate the risk of exposing personal information such as home address, telephone number, body size, and preference for consumers who feel highly useful in personalized products.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

Medical Radiation Exposure in Children CT and Dose Reduction (소아 CT 촬영시 방사선 피폭과 저감화 방법)

  • Lee, Jeong-Keun;Jang, Seong-Joo;Jang, Young-Ill
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.1
    • /
    • pp.356-363
    • /
    • 2014
  • Recently pediatric CT has been performed by reduced dose according to tube current modulation이라고, this fact has a possibility more reduce a dose because of strong affect depend on tube current modulation. Almost all MDCT snow show and allow storage of the volume CT dose index (CTDIvol), dose length product (DLP), and effective dose estimations on dose reports, which are essential to assess patient radiation exposure and risks. To decrease these radiation exposure risks, the principles of justification and optimization should be followed. justification means that the examination must be medically indicated and useful. Results is using tube current modulation이라고 tend to the lower kV, the lower effective dose. In case of use a low dose CT protocol, we found a relatively lower effective dose than using tube current modulation. Average effective dose of our studies(brain, chest, abdomen-pelvis) less than 47%, 13.8%, 25.7% of germany reference dose, and 55.7%, 10.2%, 43.6% of UK(United Kingdom) reference dose respectively. when performed examination for reduced dose, we must use tube current modulation and low dose CT protocol including body-weight based tube current adaption.