• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.026 seconds

An Analysis of Trends on the Safety Area Utilizing Big Data : Focused on Fake News (빅데이터를 활용한 안전분야 트렌드 분석 : 가짜뉴스(fake news)를 중심으로)

  • Joo, Seong Bhin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.111-119
    • /
    • 2017
  • As of March 2017, fake news is largely focused on political issues. Outside the country, main issues of the fake news have been a hot topic in the US presidential election in 2016 and emerged as a new political and social problem in countries like Germany and France. In Korea, issues of the fake news are also linked with political issues such as presidential impeachment and prosecution, impeachment quota, early election, etc. This phenomenon has recently led to the production and spread of fake news related to safety and security issues as well as political issues in connection with various methods of generating articles and sharing information. As a result, there is a high possibility that the information will be transformed into information that can cause considerable confusion to the public. Therefore, the recognition of such problems means that it is important at this point to consider the related situation analysis and effective countermeasures. To do this, we tried to make accurate and meaningful analysis for the diagnosis, analysis, forecasting and management of issues utilizing Big Data. As a result, it is found that the fake news is continuously generated in relation to the safety and security issue as well as the political issue in the South Korea, and differs from the general form occurring outside the country.

A Study on Customized Smart Fire and Security System for one person household (1인 가구를 위한 맞춤형 스마트 화재 및 방범 시스템에 대한 연구)

  • Han, Hoonyoung;Kim, Gyunho;Ju, Minsu;Ko, Dongbeom;Kim, Jungjoon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.295-304
    • /
    • 2019
  • This paper introduces a customized Smart Fire and Crime system for one person households. Recently, the number of one person household has skyrocketed due to the increasing number of one person household and the aging population. As a result, the demand for private security companies for one person household is increasing and smart security systems that are applied with rapidly evolving IoT and sensor technologies are also becoming a major issue. However, despite the increasing trend of one person households, the existing system focuses on multiple households, so that there are disadvantages of the one person households to operate in such a big system which operate separately. Therefore, in this paper, we design and implement a system that provides a personalized safety service for one person household that integrates a security system and a fire monitoring system. This will help prevent criminal activity in places where the police can not reach at a lower cost than using existing private companies, and help monitor the situation of the houses in real time.

A Study on Smart Job Matching Platform for Personal Assistant of the Disabled (장애인 활동보조인의 구인·구직을 위한 비대면 플랫폼에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.75-80
    • /
    • 2021
  • This study provided personnel and recruitment information related to job offer and job hunting, and proposed a non-face-to-face platform that can facilitate matching of one-time services as well as periodic services. The existing recruitment and job search method for personal assistant of the disabled is a one-way matching method in which a person in charge of the service providing centers assigns an activity assistant belonging to the institution when a consumer requests an personal assistant service, so the choice of job seekers is very weak. The job matching platform of the activity assistant for the disabled can be logged in separately by dividing users and separating them into the interface of the disabled or the disabled family members (job seekers) and activity assistants for the disabled (job seekers). Search for job offer and job seekers that meet their respective conditions, and real-time bidirectional decision-making through the chat function, and when the activity assistance service is completed, recruiters and job seekers can write service reviews and evaluations from their own point of view. The real-time interactive decision-making matching platform will also help minimize blind spots where it is difficult to provide services when short-term or one-time assistance is needed.

Research on the Effect of Perceived Characteristics of RPA on Intention of Adoption (RPA의 지각된 특성이 수용의도에 미치는 영향에 대한 연구)

  • Song, Sun Jung;Lee, Hyoung-Yong
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.283-301
    • /
    • 2021
  • RPA (Robotic Process Automation) technology has recently been spotlighted to preemptively respond to the 4th industrial revolution without spending a lot of time and money to improve various existing business and IT processes. In this study, variables affecting intention to use RPA technology were representatively identified into three positive factors and three negative factors, and the causal relationship between the effects of these variables on actual RPA acceptance intention was examined. After conducting an email survey for general office workers, structural equation analysis (SEM) was performed using SPSS 27.0 and SmartPLS 3.3.5. The second order factor of a positive perception consisting of security, accuracy, and efficiency, and the second order factor of a negative perception consisting of job security, execution error, and fear of introduction failure. The positive perception affected the intention to use RPA through perceived usefulness and perceived ease. It was confirmed that the negative perception has a mediating effect on the intention to use RPA through acceptance conflict. In addition, it was confirmed that the presence or absence of experience in using RPA interacts with perceived ease and has a moderating effect on intention to use RPA. It can be said that there is practical and theoretical implications from the point of view of knowledge management in that it allows companies to recognize and respond to which factors are important from the point of view of companies that want to use RPA.

Berufsverbot als eine Sicherungsmaßregel in Deutschland (보안처분으로서 독일의 직업금지명령 - 의사의 범죄에 대한 대응을 중심으로 -)

  • Lee, Seok-Bae
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.1
    • /
    • pp.27-55
    • /
    • 2021
  • Bisher wurde kein Beruf zwischen Recht und Berufsethik so diskutiert wie Ärzte. Diskussionen über die Qualifikation(od. Approbation) von Ärzten sind nicht nur eine Frage Koreas, sondern in den meisten zivilisierten Ländern ein wichtiges Diskussionsthema, wenn ein Arzt insbesondere für eine Straftat bestraft wird. Vor kurzem hat sich die koreanische Ärztekammer (the Korean Medical Association) weitgehend gegen das, "Entwurf eines Gesetzes zur Reform des Medizingesetzes" stark ausgesprochen, das die Grunde für den Entzug einer Approbation für ein Verbrechen eines Arztes erweitert. Vor allem wird auf die Gefahr hingewiesen, eine Approbation für Straftaten zu entziehen, die nicht mit beruflichen Pflichten zusammenhängen. Es ist jedoch vernünftig, den Beruf bzw. das Gewerbe zu verbieten, wenn ein Fachmann unter Missbrauch seines Beruf oder grober Pflichtverletzung die Tat begangen hat und die Gefahr bestehet, dass er bei weiterer Ausübung seines Berufs erhebliche rechtswidrige Taten der bezeichneten Art begangen wird. Die Untersagung der Berufsausübung soll die Allgemeinheit gegen die spezifischen Gefahren schützen, die mit der Ausübung eines Berufs oder Gewebes verbunden sind. Da das Berufsverbot nur die Berufsausübung untersagt, die Approbation selbst aber bestehen lässt, kann die Approbationsbehörde in eigener Entscheidungskompetenz die Approbation zurücknehmen, wiederrufen, oder in Ruhen anordnen. Entsprechend dem Verhätnismäßigkeitsgrundsatz ist aber auch das Berufsverbot auf bestimmte Tätigkeiten im Bereich des Berufs zu beschränken, wenn dies zur Erreichung des Maßregelzwecks, dem schutz der Allgemeinheit, ausreichend ist. In diesem Beitrag wurden die Voraussetzunen des Berufsverbots und die tatsächlich an Ärzte bzw. medizinische Personal gerichteten Fälle untersucht.

Optimization of Approximate Modular Multiplier for R-LWE Cryptosystem (R-LWE 암호화를 위한 근사 모듈식 다항식 곱셈기 최적화)

  • Jae-Woo, Lee;Youngmin, Kim
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.736-741
    • /
    • 2022
  • Lattice-based cryptography is the most practical post-quantum cryptography because it enjoys strong worst-case security, relatively efficient implementation, and simplicity. Ring learning with errors (R-LWE) is a public key encryption (PKE) method of lattice-based encryption (LBC), and the most important operation of R-LWE is the modular polynomial multiplication of rings. This paper proposes a method for optimizing modular multipliers based on approximate computing (AC) technology, targeting the medium-security parameter set of the R-LWE cryptosystem. First, as a simple way to implement complex logic, LUT is used to omit some of the approximate multiplication operations, and the 2's complement method is used to calculate the number of bits whose value is 1 when converting the value of the input data to binary. We propose a total of two methods to reduce the number of required adders by minimizing them. The proposed LUT-based modular multiplier reduced both speed and area by 9% compared to the existing R-LWE modular multiplier, and the modular multiplier using the 2's complement method reduced the area by 40% and improved the speed by 2%. appear. Finally, the area of the optimized modular multiplier with both of these methods applied was reduced by up to 43% compared to the previous one, and the speed was reduced by up to 10%.

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

A Study on Influencing Factors of Elderly Consumers' Self-Efficacy in Internet Banking Usage: Exploring Moderating Effect of 60s and 70s (고령 소비자의 인터넷 뱅킹 사용 자기효능감의 영향요인에 관한 연구: 60대와 70대의 비교)

  • Ku, Yoonhye;Yang, Su Jin
    • Journal of Korean Home Economics Education Association
    • /
    • v.34 no.4
    • /
    • pp.77-92
    • /
    • 2022
  • Recently, digital transformation in the financial industry has been accelerated, and it has become an important task to improve the level of utilization of Internet banking by elderly consumers, who are vulnerable to Internet use. Accordingly, this study analyzed 3,101 respondents in their 60s or older from the 11th year of the Media Panel Survey to identify demographic, experiential, and psychological factors that affect the self-efficacy of elderly consumers' usage of Internet banking. The main research findings are as follows. First, gender, education, occupation, and income were identified as demographic variables. Second, the Internet shopping experience was identified as an experiential factor. Also, concerns about information security, digital literacy, and high will for problem-solving were identified as psychological factors. Third, as a result of the moderating effect analysis on whether the experiential and psychological factors have different influences according to the group divided into the 60s and 70s, the effect on self-efficacy in the usage of the Internet was classified by age. The results of this study will be able to enrich the discussions related to the intention to utilize technology among elderly consumers by empirically revealing that there are characteristics that cause differences in financial behavior even within one group called the elderly.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

A Study on Analysis of Problems in Data Collection for Smart Farm Construction (스마트팜 구축을 위한 데이터수집의 문제점 분석 연구)

  • Kim Song Gang;Nam Ki Po
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.69-80
    • /
    • 2022
  • Now that climate change and food resource security are becoming issues around the world, smart farms are emerging as an alternative to solve them. In addition, changes in the production environment in the primary industry are a major concern for people engaged in all primary industries (agriculture, livestock, fishery), and the resulting food shortage problem is an important problem that we all need to solve. In order to solve this problem, in the primary industry, efforts are made to solve the food shortage problem through productivity improvement by introducing smart farms using the 4th industrial revolution such as ICT and BT and IoT big data and artificial intelligence technologies. This is done through the public and private sectors.This paper intends to consider the minimum requirements for the smart farm data collection system for the development and utilization of smart farms, the establishment of a sustainable agricultural management system, the sequential system construction method, and the purposeful, efficient and usable data collection system. In particular, we analyze and improve the problems of the data collection system for building a Korean smart farm standard model, which is facing limitations, based on in-depth investigations in the field of livestock and livestock (pig farming) and analysis of various cases, to establish an efficient and usable big data collection system. The goal is to propose a method for collecting big data.