• 제목/요약/키워드: 계정

Search Result 447, Processing Time 0.029 seconds

Class, Nation, and Sexuality: Discourse of Homosexuality in Eighteenth-Century Britain (계급, 민족, 섹슈얼리티 -18세기 영국 동성애 담론)

  • Gye, Joengmeen
    • Journal of English Language & Literature
    • /
    • v.53 no.2
    • /
    • pp.203-218
    • /
    • 2007
  • The early eighteenth century witnessed the birth of homosexuality as an identity and the emergence of a homosexual subculture in Britain. The homosexual subculture revealed itself through identified walkways and parks, gestures by which men might signal their interests to each other, and meeting places called "molly houses" where homosexuals could gather in relative safety. As early as 1703 the homosexuals seem to have overrun London. Homosexuals in eighteenth-century Britain provides a figure on which a variety of social anxieties could be displaced. Homosexuality is partly sexual transgression; mostly, it represents a variety of class, national, political transgressions. The association of British homosexuality with the fashion for Italian tastes was commonplace, and the growth of homosexuality was regarded as the greatest threat to the glorious Britain by destroying all its masculine virtues. Homosexuality was widely believed to be particularly common among the aristocracy and to be symptomatic of the increasing depravity of that class. The radicals in eighteenth-century Britain did not hesitate to exploit the surge in homophobia. They identified aristocratic patronage as one of the aristocratic practices that encouraged homosexuality and thus stigmatized the sort of male bonding that helped sustain aristocratic hegemony.

Gender, Crime, (Woman) Detective: Sexual Politics of Early British and American Detective Fiction (젠더, 범죄, (여성)탐정 -초기 영미 추리소설의 성정치학)

  • Gye, Joengmeen
    • Journal of English Language & Literature
    • /
    • v.56 no.5
    • /
    • pp.931-946
    • /
    • 2010
  • This paper examines the role of gender ideology in early British and American detective fiction focusing on the female detectives. Since a detective's attributes honor and idealize such traditionally masculine qualities as independence, intelligence, heroism, and bravery, the woman detective fiction has potentiality to operate against the established gender norms. The narratives about women in pursuit of justice and order through their criminal investigation can allow women to possess the masculine rationality and power. The subversive possibility inherent in the woman detective fiction is, however, contained by the representation of the female detectives and the negotiation through narratives. A female detective is represented either as unfeminine and thus unattractive and unlikeable or as desperate for survival. Her threatening potentiality is easily dismissed as that of an inadequate woman or a desperate one. The compromise in narratives is effected by the following three ways: first, a female detective is assigned to investigate crimes as an assistant to the male detectives; second, staying within the domestic sphere, she solves crimes by using her expert knowledge of the domestic service; and third, her detective narrative ends with the conventional marriage plot. Confining the female detectives within the conventional feminine roles and domains, the woman detective fiction supports and reestablishes the dominant gender ideology.

Development of a Collection System of Bait Links to Social Media on Dark Web to Track Drug Crimes (마약 범죄 추적을 위한 다크웹 상의 소셜미디어 유인 링크 수집체계 개발)

  • Sol-Kyu Park;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.123-125
    • /
    • 2024
  • 다크웹(Dark Web)은 마약, 불법 촬영물, 해킹, 무기 등 불법 콘텐츠의 공유 및 거래가 이루어지는 인터넷 영역으로서 최근에는 소셜미디어와 연계된 형태로 범죄 양상이 변화하고 있다. 본 논문에서는 최근 국내 외 사회 문제로 대두되고 있는 마약 범죄를 추적하기 위한 다크웹 수사 기술로서 다크웹 사용자를 소셜미디어로 유인하는 마약 정보 수집체계를 개발한다. 먼저 미국 마약단속국에서 공개한 대표적인 마약 용어 3개의 표준어 및 은어를 검색 키워드로 사용하여 마약 관련 다크웹을 수집하고, 수집된 다크웹을 크롤링하여 소셜미디어 계정 링크를 추출한다. 본 논문에서는 다양한 소셜미디어 중, 트위터 및 텔레그램 접속 링크를 수집하였으며 실험 결과, 접속 가능한 총 54개 다크웹 도메인의 9,046개 웹 페이지에서 트위터 유인 링크 567개, 텔레그램 유인 링크 118개를 추출하였다.

  • PDF

A Study on Key Data Decryption and Security Evaluation for Password Management Apps (비밀번호 관리 어플리케이션의 주요 데이터 복호화 연구 및 보안성 평가)

  • Han-gyeol Kim;Sinyoung Lee;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • As users use various services along with the rapid increase in Internet services, it may be difficult to manage accounts. To solve these difficulties, various password management applications are emerging. From a forensic point of view, password management applications can provide clues to obtain criminal evidence. The purpose of this paper is to acquire the data stored by the user in the password management application. To this end, we propose a better way to decrypt the encrypted data through reverse engineering, evaluate the security of the application to be analyzed, and safely store the data.

Factors Affecting on Cancer Prevention Behaviors in Adult Women (성인 여성의 암 예방행위에 미치는 영향 요인)

  • Kim, Il Ok;Yeom, Gye Jeong;Shin, Sun Hwa
    • Korean Journal of Adult Nursing
    • /
    • v.26 no.4
    • /
    • pp.455-465
    • /
    • 2014
  • Purpose: This study was to identify relationships between the levels of perceived stress, cancer-related knowledge, attitude and prevention behaviors, and to explore factors influencing cancer prevention behaviors of adult women in Korea. Methods: This study was a descriptive research, using a cross-sectional survey. A convenience sample of 314 women aged 20 to 64 was selected. A self-administered questionnaire was used to measure perceived stress, cancer-related knowledge, cancer-related attitude, and cancer prevention behaviors. The data were analyzed with the SPSS/WIN 21.0 program. Results: Cancer-related knowledge significantly differed according to age, marital status, education level, and occupation. While correlations between cancer-related knowledge, cancer-related attitude, and cancer prevention behaviors were positive, correlations between perceived stress and cancer prevention behaviors were negative. The hierarchical regression analyses revealed significant positive relations between cancer prevention behaviors and age (${\beta}=.18$, p=.003), perceived health status (${\beta}=.22$, p<.001), periodic checkup (${\beta}=.21$, p=.002), and cancer-related attitude (${\beta}=.25$, p<.001). Perceived stress on the other hand was negatively related to cancer prevention behaviors (${\beta}=-.23$, p<.001). Conclusion: Interventions targeting women, especially young adults should focus on enhancing cancer-related attitude in order to improve cancer prevention behaviors. Thus, there continues to be a need to reduce perceived stress in adult women.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Twitter and Retweet Context: User Characteristics and Message Attributes of Twitter for PR and Marketing (기업의 홍보 마케팅용 트위터의 리트윗 현황 분석: 이용자 특성과 콘텐츠 속성을 중심으로)

  • Cho, Tae-Jong;Yun, Hae-Jung;Lee, Choong-C.
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.21-35
    • /
    • 2012
  • The rapid growth and popularity of Twitter have been one of the most influential phenomena in the era of social network system and the mobile internet, which also opens up opportunities for new business strategies; in particular, PR and marketing area. This study analyzed use of Twitter in terms of user characteristics and message attributes. Actual field data from the Twitter for PR and Marketing of a representative Korean IT company (Company "K") was used for this analysis. Research findings show that overall corporate twitter users show passive attitude in retweet behavior. Also, users who have relatively small network size (less than 1,000) are more active in retweet than power twitterians that have big network size(over than 10,000). It is showed that the rate of retweet is higher in the order of recruiting, promotional event, IT information, and general PR message. In the conclusion section, practical implications based on the research finding are thoroughly discussed.

  • PDF

A Study on the way to use push notification through analysis of push notification system in mobile social network games : focus on Puzzle games (소셜 네트워크 게임 내 푸시알림 시스템 분석을 통한 푸시알림 활용 방안 : 퍼즐게임을 중심으로)

  • Shin, Hyun-Ju;Lee, Dong-Lyeor
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.427-432
    • /
    • 2015
  • Recently, Mobile Social Network Game market has grown rapidly because Smart devices has been spreading to many people and improving performance. Push notification, which is a success factor of the mobile social network game brought about stress to the user. However, there is no study on push notifications in the mobile social network game; it was difficult to understand for the use of push notifications. The Games of Kakao talk platform has various push notification system and provides detailed descriptions. On the other hand, the game linked to Facebook has minimal push notification system. In the future, if game companies develop push notification system by the characteristics of user, mobile social network games be able to derive the user's use continuously.

A Case Study of Password Usage for Domestic Users (국내 사용자의 패스워드 사용 현황 분석)

  • Kim, Seung-Yeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.961-972
    • /
    • 2016
  • For securing password-based authentication, a user must select and manage a strong password that has sufficient length and randomness. Unfortunately, however, it is known that many users are likely to choose easy-to-remember weak passwords and very poorly manage them. In this paper, we study a domestic user case of password selection and management. We conducted a survey on 327 domestic users and analyzed their tendency on password creation and update strategies, and also on the password structure and account management. We then analyzed an effect of a server's password creation rule on a structure of a user-chosen password. Our findings include that there are password structures and special characters that users significantly prefer while the effect of server's password creation rule is insignificant.