• Title/Summary/Keyword: 자동차 공격

Search Result 72, Processing Time 0.016 seconds

Evaluation of Domestic Small SUV Design Image Using ZMET (ZMET을 이용한 국내 소형 SUV 디자인 이미지 평가)

  • Kang, Hyunjin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.291-299
    • /
    • 2021
  • In 2019, SUV sales surpassed sedans in the domestic sales market with phenomenal domestic sales. The strength of SUVs around the world is expected to continue in the future. South Korea's K-company aggressively launched small SUVs in the SUV market. Its simple lineup is recognized as a brand image, not as a SUV. It is time to evaluate this. Therefore, it influences the purchasing decisions of potential customers and buyers of small SUVs through the evaluation of design images of small SUVs in Korea. Rather than the functional properties of the SUV model, it is purchased by emotional characteristics, brand symbolism, and image. Subconsciousness of the purchasing psychology of the end consumer was used by metaphor extraction techniques. Customers wanted to study the evaluation of small SUV design images that fit their needs. We wanted to see if consumers who intend to purchase or purchase small SUVs in Korea had a connection with the image of design of small SUVs in Korea. The conclusion of the study was extracted through ZMET, a metaphor extraction technique, with the latent consciousness of the primary ambiguous message from the consumer's feeling and representation of the image. Therefore, based on the results of this study, we hope that the images presented in SUVs in the future will be used as a design guide in the development of small SUVs to influence customer thinking and behavior.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.