• Title/Summary/Keyword: 전화번호

Search Result 269, Processing Time 0.025 seconds

Privacy Data Leakage Problem and its Solution in the Used Product Trading Markets (중고거래플랫폼에서 나타나는 개인정보 유출 현황 및 제안)

  • Jang, Min-Kyung;Kim, Ji-Won;Park, Hye-won;Lim, Su-Jin;Kim, Myuhng-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.225-228
    • /
    • 2022
  • 중고 거래 플랫폼 사용이 증가함에 따라 각 중고 거래 플랫폼에 많은 사진과 글이 업로드되고 있다. 플랫폼에 올린 사진과 글을 통해 일차적으로 해당 이용자의 나이대, 사는 동네, 가족 관계, 신체 사이즈, 특정 제품 취향을 알 수 있다. 중고 거래 플랫폼에서 전화번호를 얻게 될 경우, 이차적으로 카카오톡을 통해 이용자의 얼굴 사진, 연동된 계정을 알 수 있다. 이때 얻은 얼굴 정보와 이름, 계정을 통해 인스타그램, 카카오스토리, 페이스북 등 SNS 를 통한 해당 이용자의 추가적인 개인정보들을 얻을 수 있다. 이처럼 이용자가 작성한 글을 통해 사적인 정보가 드러남으로써 심각한 개인정보 유출로 이어질 수 있다. 중고 거래 플랫폼 이용자의 직접적인 입력으로 인한 개인정보 노출을 예방하기 위해서는 이용자에게 게시물에 포함된 개인정보와 개인정보 유출의 위험성을 인지시켜 유출 위험성이 높은 개인정보는 게시하지 않도록 해야 한다. 본 논문에서는 중고 거래 판매 게시물 기반 개인정보 유출 워크플로우를 작성하여 중고 거래 플랫폼에서 나타나는 개인정보 유출의 현황을 분석하고 이를 방지하기 위한 방법을 제안했다.

Mobile Digital Identity Wallet (모바일 전자 ID 지갑 시스템)

  • Soo-Hyung Kim;Seung-Hyun Kim;Deok-Jin Kim;Kawn-Soo Jung;Seung-Hun Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1489-1492
    • /
    • 2008
  • 전자 ID 지갑은 일상생활에서 사용하는 지갑처럼 인터넷 상에서 사용되는 사이버 지갑으로, 사용자의 개인정보(주소, 전화번호 등), 인증정보, 지불정보 등과 같은 사용자의 Identity 정보를 보관하고 있다가 필요한 시점에 저장된 정보를 사용자의 통제 하에 자유롭게 이용할 수 있는 서비스 시스템이다. 모바일 전자 ID 지갑 시스템은 전자 ID 지갑 시스템의 구성 요소 중 하나로 개인의 모바일 단말장치에서 운영될 수 있는 소프트웨어로 구현되었으며, 사용자 인터페이스가 빈약한 모바일 단말장치에서도 사용자의 불편 없이 모바일 인터넷을 보다 안전하게 이용할 수 있는 방법들을 제공한다. 논문에서는 안전하고 신뢰할 수 있는 인터넷 환경 구축을 위해 개발된 기술들 중 하나인 모바일 전자 ID 지갑 시스템을 소개하고자 한다.

Customer Retention Strategies of Domestic Wireless Telecommunication Service Providers at the Introduction of MNP (번호 이동성 시행 하에서 국내 이동통신 사업자들의 고객 유지 전략)

  • Yang, Hee-Tae;Choi, Mun-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.157-169
    • /
    • 2003
  • The customer retention is one of major goals for telecommunication service providers as MNP(Mobile Number Portability) would be enforced soon. The purpose of this study is to construct a customer retention model by (1) extracting the statistically significant determinants that influence on the Out-bounding churn and In-bounding churn separately and (2) ranking the importance of sub-factors to minimize Out-bounding churn and to satisfy In-bounding churn. This model applies to domestic wireless telecommunication service providers and customer retention strategies are suggested based on the result.

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

Hand-Gesture Dialing System for Safe Driving (안전성 확보를 위한 손동작 전화 다이얼링 시스템)

  • Jang, Won-Ang;Kim, Jun-Ho;Lee, Do Hoon;Kim, Min-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4801-4806
    • /
    • 2012
  • There are still problems have to solve for safety of driving comparing to the upgraded convenience of advanced vehicle. Most traffic accident is by uncareful driving cause of interface operations which are directive reasons of it in controlling the complicate multimedia device. According to interesting in smart automobile, various approaches for safe driving have been studied. The current multimedia interface embedded in vehicle is lacking the safety due to loss the sense and operation capacity by instantaneous view movement. In this paper, we propose a safe dialing system for safe driving to control dial and search dictionary by hand-gesture. The proposed system improved the user convenience and safety in automobile operation using intuitive gesture and TTS(Text to Speech).

The exploration of the Internet-based web survey as a case study: Australian holiday travellers (인터넷에 기초한 웹조사 방법 사례연구 : 호주관광객)

  • Yong-Ho Hyun;Yoon-Sook Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.455-466
    • /
    • 2003
  • A self-selected web survey was utilised to Investigate the preference of online holiday travellers to the Internet functions applied to the extensive decision-making process by adoptingthe Canberra tourism website as a case study in Australia. The use of web-based surveys is not at a mature stage, compared to other traditional surveys such as mail survey and telephone survey that have already-known home addresses and phone numbers as a frame population. The adopted web survey relies on non-probability sampling without a known frame population thatcan cause serious research errors. Therefore, the results of this study need to be compared to other official published statistics in order toverify reliability or credibility of the self-selected web survey. This study discusses the extent to which the self-selected web survey can be validated by finding the significant difference not only between the demographic results of web survey and those of official statistics released by several articles including the Graphic, Visualizations and Usability Center (GVU) at Georgia Tech research but also between the travel background features and those of ‘ACT Tourism Masterplan 2001-2005’published by the Canberra Tourism & Event Corporation (CTEC) located in Australian Capital Territory (ACT).

  • PDF

A Study on Speech Recognition in a Running Automobile (주행중인 자동차 환경에서의 음성인식 연구)

  • 양진우;김순협
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.5
    • /
    • pp.3-8
    • /
    • 2000
  • In this paper, we studied design and implementation of a robust speech recognition system in noisy car environment. The reference pattern used in the system is DMS(Dynamic Multi-Section). Two separate acoustic models, which are selected automatically depending on the noisy car environment for the speech in a car moving at below 80km/h and over 80km/h are proposed. PLP(Perceptual Linear Predictive) of order 13 is used for the feature vector and OSDP (One-Stage Dynamic Programming) is used for decoding. The system also has the function of editing the phone-book for voice dialing. The system yields a recognition rate of 89.75% for male speakers in SI (speaker independent) mode in a car running on a cemented express way at over 80km/h with a vocabulary of 33 words. The system also yields a recognition rate of 92.29% for male speakers in SI mode in a car running on a paved express way at over 80km/h.

  • PDF

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

Design of Remote Broadcasting System Using LTE Moudule (LTE 모듈을 활용한 원격방송 시스템 설계)

  • Chae, Min-uk;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.389-391
    • /
    • 2019
  • In this study, we design a remote broadcasting system that can output announcement to a remote place using wired/wireless telephone. The designed remote broadcasting system uses the LTE module to amplify the telephone voice received wirelessly through the amplifier and output it. Also, a text message for broadcasting can be sent to a remote broadcasting system through a wired/wireless telephone capable of transmitting a text message, and the remote broadcasting system that receives the broadcasting text message can automatically output the corresponding announcement stored in the voice device. For security reasons, the telephone number of the receiver is analyzed by a comparison algorithm so that only the administrator and registered users can use the system. At this time, the recorded announcement broadcast is outputted through the speaker only when it is confirmed as the registered user. The system designed in this study allows the user to output announcements quickly without being limited by time and place.

  • PDF

A Telephone Survey on the Opinions about Family Doctor (주치의에 대한 인식도 전화 조사)

  • Seo, Hong-Gwan;Kang, Jae-Heon;Kim, Cheol-Hwan;Kim, Seong-Won
    • Journal of Preventive Medicine and Public Health
    • /
    • v.31 no.2 s.61
    • /
    • pp.310-322
    • /
    • 1998
  • In order to reinforce the role of primary care physician and o improve doctor-patient relationship, the Korean government tried to introduce 'Family Doctor Registration Program' into Seocho-Gu in Seoul, Ansung-Gun and Paju city in Kyunggi-Do in Oct. 1996. Community residents and doctors in those area did not show much interest in this project because of low incentives. We have done this study to see how much people know 'Family Doctor Registration Program' and what is people's real needs about 'Family Doctor Registration Program'. We selected 1,800 telephone numbers in Seoul, Chongju city, and Ansung-Gun by multi-stage stratified random sampling. Three trained survey personnels called them and got answers to the premade questionnaire until they completed the questionnaires of 200 persons in each community. The calling time was 7-9 p.m. from Monday to Friday, 3-9 p.m. on Saturday, and 9 a.m. to 9 p.m. on Sunday. We dropped out the persons who did not respond 3 times. The subjects consisted of 222 male and 367 female residents. Their ages ranged from 20 to 78: 24.8% in their 30s, 23.4% in their 20s, 22.5% in their 40s in male, and 35.2% in theirs, 22.5% in their 40s, 18.5% in their 20s in female. 9.9% of male and 13.2 % of female had their Family Doctors. The specialties of their Family Doctors were internists in 56.2%, general surgeons in 11.0%. The persons who did not have their family doctors were asked which doctors they would prefer if they had choices of family doctor. The results were internists in 50.3%, family physicians in 13.0%, pediatricians in 4.8%. Only 16.0% residents knew that government tried to introduce Family Doctor Registration Program. The 'Family Doctor Registration Program' was not well known to people. The results of our study showed that more effective incentives and public notifications are needed to activate this program.

  • PDF