• Title/Summary/Keyword: 인지된 취약성

Search Result 159, Processing Time 0.024 seconds

지역아동센터 아동의 매체를 활용한 사회성집단프로그램이 사회성, 정서적안녕감, 자아탄력성에 미치는 효과

  • Choe, Eun-Jeong;Byeon, Sang-Hae
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2021.04a
    • /
    • pp.109-115
    • /
    • 2021
  • 아동은 자아성장의 결정적인 시기로 기초적인 인지적 기술과 사회적 기술을 함께 습득하게 된다. 아동은 전반적인 삶의 과정에서 공동체의 규칙과 가치를 내면화 시키고 사회적 관계의 일원으로서 기초적 토대를 만들어 가는 시기이다. 저소득 취약계층인 지역아동센터 아동은 균형 있게 성장발달 할 수 있도록 다양한 활동과 종합적인 아동복지 서비스가 제공되어야 한다. 하지만, 가족의 해체 또는 기능 상실로 도움이 필요한 아동 및 저소득가정 아동은 그렇지 않은 아동에 비해 상대적으로 사회적 행복과 안전에 대해 취약한 상황에 노출되어 있다. 본 연구의 목적은 아동의 대인관계와 사회성 발달과업이 중요한 지역아동센터 아동에게 다양한 매체의 장점을 활용하여 사회성집단프로그램이 사회성, 정서적안녕감, 자아탄력성에 미치는 효과를 검증하는데 그 목적을 두고 있다. 본 연구에서의 목적을 달성하기 위해 연구대상은 경기도 00시 소재의 지역아동센터 이용 아동의 초등학교 3,4,5 학년을 선정 하였다. 연구의 목적과 프로그램의 취지를 설명하고 참가신청서를 받아서 실시하였다. 연구표본 집단구성은 실험집단 30명, 통제집단 30명으로 집단을 구성하여 실시하였다. 연구기간은 2019년 8월부터 2020년 2월까지 실시하였다. 프로그램 운영은 다양한 매체를 활용하여 자유로움과 안전한 분위기를 조성하고 활동을 적극적으로 격려하며 주2회, 6주간, 12회기, 회기당 60분으로 실시하였다. 이를 분석하기 위해 SPSS 25.0 통계 패키지 프로그램을 사용하여 분석하고자 한다.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Digital Watermarking Using Subband Characteristics and Perceptual Weights of Wavelet Transform Image (웨이브릿 변환 영상의 부대역 특성과 인지가중치를 이용한 디지털 워터마킹)

  • Ryu, Kwon-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1254-1259
    • /
    • 2007
  • Watermark insertion methods on low frequency subbands in wavelet transform image are robust in attacks, but become reduction of invisibility. And watermark insertion methods on high frequency subbands have a good visibility, but are weak in attack. In this paper, we propose the method that improve invisibility and robustness of watermarks according as we adaptively control insertion intensity by using subband characteristics and perceptual weights. Experimental result, we show that the proposed method has excellent of invisibility and robustness more than the conventional method, according as it is improved with $1.7dB{\sim}2.6dB$ in invisibility, and is improved with $0.2{\sim}12.9$ in similarity measurement.

A Study on Optimized Emergency Alert Broadcasting Message based Terrestrial UHDTV for Disaster Vulnerable Populations (지상파 UHDTV 기반 취약계층 맞춤형 재난경보 방송메시지 확장 방안 연구)

  • Kim, Nayeon;Bae, Byungjun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.127-128
    • /
    • 2019
  • 우리나라는 현재 지상파 UHDTV 재난경보 방송서비스에 관한 연구를 진행 중에 있다. 한편, 노인, 장애인 등 재난취약계층은 재난 발생 시 최초 상황의 인지와 대응에 어려움을 겪어 일반 대중과의 재난 대응 격차는 커지고 있는 상황이다. 본 논문에서는 연구가 진행중인 지상파 UHDTV 재난경보 방송서비스를 기반으로 재난약자 그룹의 재난 상황 판단, 피난에 도움이 되는 맞춤형 미디어 전달이 가능한 재난메시지 확장 방안을 제안하며, 재난약자의 최적대피 및 대피형평성을 확보하기 위한 연구로 활용될 것을 기대한다.

  • PDF

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Survey and analysis of disaster safety awareness by gender (성별 차이에 따른 재난 안전 인식에 대한 조사 및 분석)

  • Lee, Min Ji;Chung, Gun Hui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.483-483
    • /
    • 2021
  • 전 세계적으로 대형 재난의 발생으로 인해 사회문화적 관습이나 신체조건 등의 차이로 남성보다 여성의 피해가 크다는 사실들이 다양한 사례와 연구를 통해 보고되었고, 개발도상국은 여성의 피해가 큰 반면에 선진국은 여성들의 재난 안전 및 교육 관리에 적극적인 참여를 통해 전반적인 대응 능력을 보일 수 있다는 연구들도 존재한다. 우리나라의 경우에도 빈번하게 자연 재난이 발생하고 있지만, 실제로 재난 안전 인식에 대한 성별 분석을 하기 위한 자료가 부족한 상황이다. 그러므로 본 연구에서는 이와 같은 문제점을 파악하기 위해 한국 국민 남녀 489명을 대상으로 재난위험인식에 대한 설문을 실시하고, 거주지 주변 발생 가능한 재난을 인지하고 있는지, 대피소의 위치를 인지하고 있는지, 안전 관리 교육 경험이 있는지 등의 문항으로 구성하여 실시하였다. 본 연구의 목적은 국민들의 재난 안전의 위험도에 대한 인식 수준이 어떠한지 분석하고, 영향 요인을 탐색 하는 데에 있다. 조사결과 안전취약계층은 스스로 대피 하는 데에 있어 큰 어려움이 있으며, 이중 여성은 남성에 비해 안전교육과 훈련의 접근성이 적음에 따라 위험도가 더 큰 것을 확인 할 수 있었다. 그럼에도 불구하고, 재난 및 안전관리 교육 및 훈련에 참여하고자 하는 의지는 남성과 여성의 차이가 없었다. 본 연구를 기반으로 재난 안전교육의 필요성을 가지고 재난 안전 시뮬레이션 프로그램이 구축되는 필요성이 있다고 사료되어지고, 미래에 자연재해 발생 시 문제점을 파악하고 인명 피해 감소가 될 전망으로 기대가 된다.

  • PDF

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.

A study on the influence of information security in selecting smart-phone (정보보안이 스마트폰 선택에 미치는 영향에 관한 연구)

  • Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.207-214
    • /
    • 2014
  • Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.

Emergy Evaluation of Typhoon Maemi in Busan (태풍 매미가 부산시에 미치는 영향에 대한 에머지 평가)

  • Park, KyungMin;Kim, Dong-Myung;Lee, Suk Mo
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.20 no.1
    • /
    • pp.18-25
    • /
    • 2017
  • Damage of both life and property has been increased by natural disaster under the influence of climate change, thus many natural disaster vulnerability researches have been carried out to make adaptation policy and impact assessment of climate change recently. Their method for assessing vulnerability usually have used proxy variables for making vulnerability indices. However, because their results were too qualitative and relative it tends to be hard to make absolute comparison and establish standard of prevention or adaptation ability. Accordingly, this study aimed at quantifying natural disaster vulnerability using emergy through recognizing disaster as the relations between order and disorder by system approach. As a result, ordering energy (4.66E+22 sej/yr) and ordered structure (1.98E+22 sej) of Busan in 2003 and disordering energy (7.80E+18 sej), disordered parts (4.55E+20 sej) and rebuilding energy (3.87E+20 sej) by typhoon Maemi were analysed. And then, this was compared with Hurricane Andrew in Dade County. Through this comparison, if the prevention ability of Busan increases, disordered parts can be reduced against the more powerful disordering energy. Also, prevention for additional damages by disaster is needed to practical rebuilding action. In conclusion, it was able to figure out the impact of disaster quantitatively by natural systems and urban systems showing as common measure. Based on this study and further research to make effective prevention for how much prevention ability should be increased will contribute to producing the scientific data for disaster management policy in future.