• Title/Summary/Keyword: 인지된 보안

Search Result 345, Processing Time 0.025 seconds

Development of sound location visualization intelligent control system for using PM hearing impaired users (청각 장애인 PM 이용자를 위한 소리 위치 시각화 지능형 제어 시스템 개발)

  • Yong-Hyeon Jo;Jin Young Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.105-114
    • /
    • 2022
  • This paper is presents an intelligent control system that visualizes the direction of arrival for hearing impaired using personal mobility, and aims to recognize and prevent dangerous situations caused by sound such as alarm sounds and crack sounds on roads. The position estimation method of sound source uses a machine learning classification model characterized by generalized correlated phase transformation based on time difference of arrival. In the experimental environment reproducing the road situations, four classification models learned after extracting learning data according to wind speeds 0km/h, 5.8km/h, 14.2km/h, and 26.4km/h were compared with grid search cross validation, and the Muti-Layer Perceptron(MLP) model with the best performance was applied as the optimal algorithm. When wind occurred, the proposed algorithm showed an average performance improvement of 7.6-11.5% compared to the previous studies.

A Scheme Reconfiguration of Whitelisting and Hyperledger Fabric for Cryptocurrency Integrity Transactions (암호화폐 무결성 거래를 위한 Whitelisting과 Hyperledger Fabric 재구성 기법)

  • Su-An Jang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • To trade cryptocurrency, traders require a personal cryptocurrency wallet. Cryptocurrency itself using blockchain technology is guaranteed excellent security and reliability, so the threat of blockchain hacking is almost impossible, but the exchange environment used by traders for transactions is most subject to hacking threats. Even if transactions are made safely through blockchain during the transaction process, if the trader's wallet information itself is hacked, security cannot be secured in these processes. Exchange hacking is mainly done by stealing a trader's wallet information, giving the hacker access to the victim's wallet assets. In this paper, to prevent this, we would like to reconstruct the existing Hyperledger Fabric structure and propose a system that verifies the identity integrity of traders during the transaction process using whitelisting. The advantage is that through this process, damage to cryptocurrency assets caused by hackers can be prevented and recognized. In addition, we aim to point out and correct problems in the transaction process that may occur if the victim's wallet information is stolen from the existing Hyperledger Fabric.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Biometrics Based on Multi-View Features of Teeth Using Principal Component Analysis (주성분분석을 이용한 치아의 다면 특징 기반 생체식별)

  • Chang, Chan-Wuk;Kim, Myung-Su;Shin, Young-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2007
  • We present a new biometric identification system based on multi-view features of teeth using principal components analysis(PCA). The multi-view features of teeth consist of the frontal view, the left side view and the right side view. In this paper, we try to stan the foundations of a dental biometrics for secure access in real life environment. We took the pictures of the three views teeth in the experimental environment designed specially and 42 principal components as the features for individual identification were developed. The classification for individual identification based on the nearest neighbor(NN) algorithm is created with the distance between the multi-view teeth and the multi-view teeth rotated. The identification performance after rotating two degree of test data is 95.2% on the left side view teeth and 91.3% on the right side view teeth as the average values.

  • PDF

A Study on Factors Influencing the Intention to Use NFC Payment System for Public Transport - Focused on Ho Chi Minh Citizens in Vietnam (대중 교통을 위한 NFC 결제 시스템 사용의도에 영향을 미치는 요인에 관한 연구 -베트남 호치민 시민을 중심으로)

  • Ly, Xuan-Hoang;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.569-577
    • /
    • 2018
  • Near-Field Communication(NFC) is a useful technology that is receiving worldwide attention. NFC mobile payment systems are being developed by many technology companies including financial institutions especially for the public transportation. In this research we find several factors for the intention to adopt NFC payment system. We surveyed 355 respondents who live in Ho Chi Minh city, Vietnam which became more interested by Korean as a post China country to test our research hypothesis. Using Technology Acceptance Model(TAM) we find that the factors of Social influence, Trust, Security, and Users' Convenience play the significant role to the factor of Intention to Use of NFC payment system.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

An Examination of Factors Influencing Continuous Participation Intention of Online Childrearing Community : Focusing on Moderating Effect of Self-Monitoring (온라인 육아 커뮤니티의 지속적 참여 의향에 영향을 미치는 요인 분석: 자기감시성의 조절 효과를 중심으로)

  • Lee, Sungjoon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.526-536
    • /
    • 2021
  • This study looked at what factors lead to continuous participatory intention of online childrearing community. Trust, reciprocity and perceived security from the perspectives of community attributes and reputation motivation, information motivation, enjoyment motivation and self-monitoring from the users' perspectives were conceived as determinants that might have influences on continuous participatory intention of online childrearing community. It were also empirically tested whether they affect continuous participatory intention of online childrearing community. The moderating effect of self-monitoring was examined, too. In order to collect data, online questionnaires were conducted to women whose ages were 20-49 years old and joined online childrearing community. Their responses were analyzed with a regression analysis. The findings showed that trust, reciprocity and information motivation have influences on continuous participatory intention of online childrearing community. The moderating effect of self-monitoring between reciprocity and continuous participatory intention was also found.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

Consumer Purchase Decision in a Mobile Shopping Mall: An Integrative View of Trust and Theory of Planned Behavior (모바일 쇼핑몰 고객들의 구매 의사 결정에 관한 연구: TPB와 신뢰의 통합적 관점에서)

  • Hong, Seil;Li, Bin;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.151-171
    • /
    • 2016
  • With the widespread adoption of mobile devices, such as smart phones and smart pads, as well as the rapid growth of mobile technologies, consumer shopping patterns are changing. This study investigates key factors of consumer purchasing intention in a mobile shopping mall context by incorporating trust belief into the theory of planned behavior. We posit perceived usefulness, perceived enjoyment, perceived ease of use, and trust belief as antecedents of behavioral attitude toward mobile shopping malls. Moreover, social influence and security are identified as key enablers of trust belief on mobile shopping malls. Data collected from 154 consumers with purchasing experience in mobile shopping malls are empirically tested against a research model using partial least squares. Analysis results show that behavioral attitude and perceived behavioral control significantly influence purchasing intention. Moreover, this study reveals the significant effects of perceived usefulness and perceived enjoyment on behavioral attitude. Trust belief indirectly influences purchasing intention through behavioral attitude and is significantly affected by social influence. Understanding consumer purchasing decision-making processes in mobile shopping malls can help service providers to develop effective marketing and operation strategies and campaigns.