• Title/Summary/Keyword: 계정

Search Result 447, Processing Time 0.023 seconds

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

A Study on User Preference Test for Development of Guidelines on Standardized Modes (항해장비 표준화모드 지침 개발을 위한 사용자 선호도 조사에 관한 연구)

  • Ahn, Young-Joong;Jeon, Gye-Jeong;Jung, Jae-Hoon;Kang, Nam-Seon
    • Journal of Navigation and Port Research
    • /
    • v.42 no.6
    • /
    • pp.371-377
    • /
    • 2018
  • Navigational equipment standardization mode is a function which is used to standardize key functions, screen display and operation method of major navigation equipment. This is aimed towards to quickly and accurately checking information relevant for safe navigation. Currently, the International Maritime Organization is working on the development of guidelines for the application of navigational equipment in the standardized mode to the task of NCSR Sub-Committee. This study was conducted to investigate users' opinions and preferences in the application of standardization modes and to reflect them in the development of guidelines. In addition, the test program was designed to investigate user preferences for ECDIS among the navigational equipment, such as the types of information and functions that are necessary or preferentially required to perform navigational duties, and the screen configuration. In the study, 333 preference surveys were conducted in 35 countries using a web - based test program. ECDIS users confirmed the content and screen layout of their preferred ECDIS information when conducting navigation duty. The results of the study are significant as they contribute to the development of effective guidelines by presenting user requirements to be considered in the standardization mode.

2018 Current Health Expenditures and National Health Accounts in Korea (2018년 경상의료비 및 국민보건계정)

  • Jeong, Hyoung-Sun;Shin, Jeong-Woo;Moon, Sung-Woong;Choi, Ji-Sook;Kim, Heenyun
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.206-219
    • /
    • 2019
  • This paper aims to demonstrate current health expenditure (CHE) and National Health Accounts of the years 2018 constructed according to the SHA2011, which is a manual for System of Health Accounts (SHA) that was published jointly by the Organization for Economic Cooperation and Development (OECD), Eurostat, and World Health Organization in 2011. Comparison is made with international trends by collecting and analyzing health accounts of OECD member countries. Particularly, scale and trends of the total CHE financing as well as public-private mix are parsed in depth. In the case of private financing, estimation of total expenditures for (revenues by) provider groups (HP) is made from both survey on the benefit coverage rate of National Health Insurance (by National Health Insurance Service) and Economic Census and Service Industry Census (by National Statistical Office); and other pieces of information from Korean Health Panel Study, etc. are supplementarily used to allocate those totals into functional classifications. CHE was 144.4 trillion won in 2018, which accounts for 8.1% of Korea's gross domestic product (GDP). It was a big increase of 12.8 trillion won, or 9.7%, from the previous year. GDP share of Korean CHE has already been close to the average of OECD member countries. Government and compulsory schemes' share (or public share), 59.8% of the CHE in 2018, is much lower than the OECD average of 73.6%. 'Transfers from government domestic revenue' share of total revenue of health financing was 16.9% in Korea, lower than the other social insurance countries. When it comes to 'compulsory contributory health financing schemes,' 'transfers from government domestic revenue' share of 13.5% was again much lower compared to Japan (43.0%) and Belgium (30.1%) with social insurance scheme.

Perceptions and Practices of Employees Regarding Email Records Management in Universities: A Case Study of D University (대학의 이메일 기록관리 실태와 조직구성원들의 인식: D대학을 사례로)

  • Park, Yu Jin;Jung, Young Mi
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.2
    • /
    • pp.193-211
    • /
    • 2019
  • With the increasing number of business email, there is a growing need to manage email records. Before the development of email records management measures, this study aimed to investigate the status of email records management in universities and determine employees' perceptions of email records management. Surveys and interviews were conducted with professors, staff, and assistants who use groupware accounts at D University, and their overall perceptions of email records management and the status of email record management, such as email production, deletion, archival, and backup of university members were gathered. A total of 185 people responded to the survey, and 12 of them were interviewed. According to the analysis, the public utilization of email was frequent, and the management of emails, such as backup and retention, was not performed well compared to deletion and storage. In addition, email is still perceived as private, and users recognize the need for email records management, but they still perceive that they are responsible for records management. The results of this study will be useful in setting the policy for email records management of universities and will help provide email record management awareness.

A Study on the Structure of Soshaewon Landscape Garden Featuring Borrowed Scenery - Focusing on the Soshaewon Sisun and the Thirty Poems of Soshaewon - (차경(借景)을 통해 본 소쇄원 원림의 구조 - 「소쇄원시선(瀟灑園詩選)」과 「소쇄원30영」을 중심으로 -)

  • So, Hyun-Su
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.4
    • /
    • pp.59-69
    • /
    • 2011
  • In this study I examined the status of the borrowed scenery of Soshaewon and analyzed the structure of Byeolseo Gardenusing "Soshaewon Sisun(瀟灑園詩選)", which consists of a collection of poems written by people who visited Soshaewon during Joseon Dynasty with bibliographical explanations and "the Thirty Poems of Soshaewon", written by Yang, Gyeong Ji who was the fifth generation from Yang, San Bo. This study expanded the concept of borrowed scenery to include visual, synaesthetic, temporary and ideal features based on the theory of borrowed scenery in "Won Ya(園冶)", which emphasized the time feature and change, and explained that a landscape garden could be perfected by the presence of borrowed scenery beyond the previous borrowed landscape which was recognized through visual value. It would be correct to understand that the visitors to Soshaewon accomplished imaginary scenery(意境) through recreating Soshaewon into a space that stimulated poetic sentiment and aesthetic sensitivity by creating four types of borrowed scenery of a landscape garden composed of both real and fictitious scenery. At present the scope of Soshaewon tends to be limited to its inner garden covering the stream garden. However, in this study I took a new approach in defining the scope of Soshaewon, providing three types of Byeolseo Garden area ; more specifically, the expanded scope of Soshaewon covers the outer garden that secured the outlook of visual, temporary and synaesthetic objects for borrowed scenery and the right to use by purchasing more area by the descendants and the ideological garden that was composed of the ideal borrowed scenery created by the Confucian friends and colleagues who praised the Jeungamcheon Stream area and various famous mountains longing for the immortal world.

Zkimi : Integrated Security Analysis Tool for UNIX Systems (지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.23-40
    • /
    • 1997
  • There are a lot of security tools for the investigation and improvement of UNIX systems. However, most of them fail to provide a consistent and usable user interface. In addition, they concentrate on a specific aspect of a system, not the whole one. For the overall management, system administrators cannot help using several uncomfortable tools. This paper introduces an integrated security analysis tool, named "Zkimi", which provides a convenient user interface and investigates the various aspects of UNIX systems such as account security, system security, network security, and file system integrity. The Zkimi supports user-friendly WWW based interface, so administrators can examine the various aspects of system more easily. We tried the tool for a system of a moderate size, and were confirmed that the tool is very efficient for investigating various security aspects of a system. a system.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

The Analysis of Profit Adjustment and Business Performance Using Deferred Corporate Taxes Information (이연법인세 정보를 이용한 이익조정 및 사업성과 분석)

  • Yun, Han-Kuk;Kim, Jin-Seop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.602-609
    • /
    • 2021
  • Under accrual basic accounting, financial statements may be less reliable compared to cash basis accounting. The purpose of this study is to conduct an empirical analysis to determine the possibility of profit adjustment through the increase and decrease of deferred tax accounts. For our empirical analysis, a dummy variable of '1' was used as a dependent variable when the deferred tax net assets increased from the previous year and '0' when the deferred tax net assets decreased. Meanwhile, the variables of interest were discretionary accruals and ROA variation compared to the previous year. Logistic regression analysis was performed to establish the relevance between variables. Results found larger discretionary accruals related to lower net deferred tax assets compared to the previous year. In addition, there was a correlation between ROA and net deferred tax assets only if the ROA increased and net profit was greater than '0'. Study results will enable deferred tax information to be used in investment decision-making, and supervisory institutions can establish policies to prevent profit adjustments and enhance reporting standards.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

Effect of Propeller Eccentric Thrust Change on Propusion Shafting System (프로펠러 편심추력변동이 축계안정성에 미치는 영향 연구)

  • Lee, Ji-woong;Lee, Jae-ung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1082-1087
    • /
    • 2021
  • The propeller shaft has different pattern of behaviors at each static, dynamic, and transient condition to a ship shaft system due to the effects of propeller weight and eccentric thrust, which increases the potential risk of bearing failure by causing local load variations. To prevent this, the various research of the shafting system has been conducted with the emphasis on optimizing the relative slope and oil film retention between propeller shaft and stern tube bearing at quasi-static condition, mainly with respect to the Rules for the Classification of Steel Ships. However, to guarantee a stability of the shafting system, it is necessary to consider the dynamic condition including the transient state due to the sudden change in the stern wakefield during rudder turn. In this context, this study cross-validated the ef ect of propeller shaft behavior on the stern tube bearing during port turn operation, which is a typical transient condition, by using the strain gauge method and displacement sensor for 50,000 DWT medium class tanker. And it was confirmed that the propeller eccentric thrust change showing relief the load of the stern tube bearing.