• Title/Summary/Keyword: 지식보호

Search Result 550, Processing Time 0.027 seconds

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.

A Method of Detection of Deepfake Using Bidirectional Convolutional LSTM (Bidirectional Convolutional LSTM을 이용한 Deepfake 탐지 방법)

  • Lee, Dae-hyeon;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1053-1065
    • /
    • 2020
  • With the recent development of hardware performance and artificial intelligence technology, sophisticated fake videos that are difficult to distinguish with the human's eye are increasing. Face synthesis technology using artificial intelligence is called Deepfake, and anyone with a little programming skill and deep learning knowledge can produce sophisticated fake videos using Deepfake. A number of indiscriminate fake videos has been increased significantly, which may lead to problems such as privacy violations, fake news and fraud. Therefore, it is necessary to detect fake video clips that cannot be discriminated by a human eyes. Thus, in this paper, we propose a deep-fake detection model applied with Bidirectional Convolution LSTM and Attention Module. Unlike LSTM, which considers only the forward sequential procedure, the model proposed in this paper uses the reverse order procedure. The Attention Module is used with a Convolutional neural network model to use the characteristics of each frame for extraction. Experiments have shown that the model proposed has 93.5% accuracy and AUC is up to 50% higher than the results of pre-existing studies.

Study on the comparison result of Machine code Program (실행코드 비교 감정에서 주변장치 분석의 유효성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.37-44
    • /
    • 2020
  • The similarity of the software is extracted by the verification of comparing with the source code. The source code is the intellectual copyright of the developer written in the programming language. And the source code written in text format contains the contents of the developer's expertise and ideas. The verification for judging the illegal use of software copyright is performed by comparing the structure and contents of files with the source code of the original and the illegal copy. However, there is hard to do the one-to-one comparison in practice. Cause the suspected source code do not submitted Intentionally or unconsciously. It is now increasing practically. In this case, the comparative evaluation with execution code should be performed, and indirect methods such as reverse assembling method, reverse engineering technique, and sequence analysis of function execution are applied. In this paper, we analyzed the effectiveness of indirect comparison results by practical evaluation . It also proposes a method to utilize to the system and executable code files as a verification results.

Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling (다양한 데이터 전처리 기법과 데이터 오버샘플링을 적용한 GRU 모델 기반 이상 탐지 성능 비교)

  • Yoo, Seung-Tae;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.201-211
    • /
    • 2022
  • According to the recent change in the cybersecurity paradigm, research on anomaly detection methods using machine learning and deep learning techniques, which are AI implementation technologies, is increasing. In this study, a comparative study on data preprocessing techniques that can improve the anomaly detection performance of a GRU (Gated Recurrent Unit) neural network-based intrusion detection model using NGIDS-DS (Next Generation IDS Dataset), an open dataset, was conducted. In addition, in order to solve the class imbalance problem according to the ratio of normal data and attack data, the detection performance according to the oversampling ratio was compared and analyzed using the oversampling technique applied with DCGAN (Deep Convolutional Generative Adversarial Networks). As a result of the experiment, the method preprocessed using the Doc2Vec algorithm for system call feature and process execution path feature showed good performance, and in the case of oversampling performance, when DCGAN was used, improved detection performance was shown.

A study of Chinese fashion design copyright protection cases - Highlighting infringement cases involving the intellectual property rights of Bai Yi Bei in 2023 - (중국 패션디자인 저작권 보호 판례 고찰 - 2023년 백일배(百一杯) 지식재산권 판례를 중심으로 -)

  • Yueding Zhou;Hyunzin Ko
    • The Research Journal of the Costume Culture
    • /
    • v.32 no.2
    • /
    • pp.287-298
    • /
    • 2024
  • Clothing is intimately intertwined with daily lives as every individual relies on it. The pervasive issue of plagiarism in the fashion industry has led to an increased demand to protect intellectual property rights. Currently, studies on the protection of fashion design intellectual property rights in China remain in the exploratory stage and warrant further investigation. This paper addresses the issue in two parts. The first part contains an analysis of the theoretical foundation for the protection of fashion design copyrights. It is further divided into three subsections. The first subsection primarily examines the concept of copyrights and laws. The second subsection focuses on the concept of fashion design copyrights and laws. The third subsection analyzes copyright laws concerning fashion designs in China. The second section offers an analysis of infringement cases involving fashion designs published during the Baiyi Cup Intellectual Property Case Summary Writing Competition held in China in 2023. It outlines the shortcomings of the current Chinese copyright laws regarding the protection of fashion designs, and proposes measures for improvement. This study argues that the institutional framework for intellectual property rights in the Chinese fashion industry should align with practical considerations and explores suitable legal regulations and how they relate to specific circumstances in China. Besides refining the legal framework, fashion designers and enterprises must take measures to entablish the intellectual property rights of their clothing brands.

Care workers' practices in oral healthcare for the elderly : mediating role of elderly oral healthcare education and behavioral needs (요양보호사의 노인 구강건강관리 실천도 연구 : 노인 구강건강관리 교육과 행위 필요도의 매개효과)

  • Sang-Eun Moon;Jin-Ju Yang;You-Jin Choi
    • Journal of Korean society of Dental Hygiene
    • /
    • v.24 no.1
    • /
    • pp.57-67
    • /
    • 2024
  • Objectives: This study aimed to assess the impact of care workers' knowledge of elderly oral health, education on elderly oral healthcare and behavioral needs, awareness of elderly oral healthcare, and actual practices in elderly oral healthcare. Furthermore, it explores the mediating effects of elderly oral healthcare education and behavioral needs on the relationship between awareness and practice. Methods: Data were collected from October 11 to December 29, 2023, from 172 certified care workers employed in nursing hospitals and other workplaces. For analyzing the data, t-test, one-way ANOVA, Pearson's correlation, and hierarchical regression were conducted using SPSS Statistics 21.0. Results: Elderly oral health knowledge, education and behavioral needs, awareness, and practice were significantly higher among: those aged 51 years and older, female, primarily working in nursing hospitals, with a total career span of 10 years, higher job satisfaction, in organizations prioritizing elderly oral healthcare, and with superior education in elderly oral health. Elderly oral healthcare education and behavioral needs had partial mediating effects on the relationship between care workers' awareness and practice of elderly oral healthcare. Conclusions: The current practices and challenges in care workers' oral healthcare for the elderly will be analyzed, and recommendations and strategies for improving practices will be formulated.

A Study on the Current Status of Domestic and International Cybersecurity Education and the Importance of Regular Cybersecurity Education for Teenagers according to the Development of AI (국내외 정보보안 교육의 현황 및 인공지능의 발전에 따른 청소년 정보보안 정규교육의 중요성에 대한 연구)

  • Dahye Jeong;Sanghoon Jeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.527-536
    • /
    • 2024
  • In the digital age, the growth of AI and digital technologies brings opportunities and cybersecurity risks. At the forefront of this change are teenagers, referred to as 'digital natives'. However, they may have difficulty using technology safely without proper information security knowledge. This paper highlights the need for information security education for teenagers in South Korea by referring to cases in the UK, Australia, and the US. These countries are already providing education that prepares young people for cyber threats and future societal needs. Reflecting this trend, South Korea should also establish comprehensive information security education for teenagers to equip them for the digital age.

Recast of the EU patent law system and its Lessons (유럽연합 특허시스템의 대대적 변혁과 그 교훈)

  • Kim, Yong-Jin
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.303-343
    • /
    • 2018
  • In 2013 a new era for EU patent law system was launched. The creation of the EU patent with unitary effect and the establishment of the Unified Patent Court established a new legal framework on substantive patent protection and patent litigation in Europe. This year the EU Patent Package would become a reality. It includes a regulation on a unitary patent, a regulation on the translation regime and an international Agreement on the Unitary Patent Court. In contrast to the classical European patent, the post-grant life of unitary patent will be governed by the newly created unified patent court and it will have unitary effect. In this article, I highlight the effect of the unitary patent and the jurisdiction of the unified patent court over unitary patents (and 'traditional' patents granted under the EPC that are not opted-out) for actions in relation to patent infringement or to revocation of a European patent and to licences of right. This article explores on the one hand the relation between national patent, the classical European patent and EU patent with unitary effect and on the other hand the relation of unified patent court to the Brussels $I^{bis}$ Regulation. Particular attention is paid to the institutional changes created by the unitary patent package abd the new supplementary forum that enables the UPC to hear disputes involving defendants from third States that relate to an infringement of a European patent and give rise to damage inside as well as outside the Union. Furthermore on the perspective North-east Asia this essay examines the lessons from the experiences of EU patent package.

Correlation between knowledge, attitudes and preventive behaviors regarding the MERS of a student in the Department of Emergency Medical Technology (응급구조(학)과 학생의 메르스에 관한 지식, 태도 및 예방행위와의 관계)

  • Kim, Sung-Lyoung;Yoo, Young-Gun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.401-408
    • /
    • 2020
  • This study was undertaken among students majoring in Emergency Medical Technology, to comprehend the knowledge, attitudes and preventive behaviors associated with MERS. This study further provides basic data for education related to MERS prevention. A total of 167 students were enrolled in the study. Evaluation of MERS education revealed a higher number of inexperienced subjects: 74 experienced(44.3%) vs. 93 inexperienced(55.7%). Assessing the attitude items for MERS revealed that "have to wear personal protective equipment when dealing with MERS patients" ranked highest (average, 4.54 ± 0.87), whereas "washed my hands more often than usual" ranked highest (average, 3.82 ± 1.06) in the prevention items for MERS. Analyzing the correlation between attitude towards MERS and preventive behavior revealed that "canceled or delayed meeting with friends, eating out, watching sports, shopping, etc." showed that, although negatively correlated, a greater attitude showed a higher level of prevention (r=-0.63, p<0.004). Taken together, results of this study indicate the necessity to develop an education program that improves the level of education and knowledge about MERS, and to impart this education systematically and repeatedly.

Development of Tuberculosis Education Model for Junior Health Care Professionals (예비보건의료인을 위한 결핵 교육 모형 구축)

  • Baek, Seolhyang;Lee, Ji-Soo;Lee, Hyun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.432-445
    • /
    • 2018
  • For health care professionals(HCPs) who have relatively higher possibility of exposing tuberculosis(Tb), it is important for them to equip with proper levels of knowledge and prevention activities. In terms of establishment of Tb education model for junior HCPs, therefore, literature review was done alongside 129 junior HCPs and 14 HCPs were asked to answer questionnaires and telephone survey. The results are follows.; Firstly, six educational themes such as epidermiology of Tb, Tb transmission and patho-physiology, test and diagnosis, latent Tb, Tb treatment, and Tb prevention were identified, based on the literature review. Secondly, the junior HCPs showed lower levels of knowledge regarding epidermiology, transmission and patho-physiology and latent Tb, compared to the other themes. When education courses are planned, longer period of time should be given to the lower level of knowledge areas. Thirdly, the HCPs emphasized that definition and type of Tb should be well integrated into the education in particular epidermiology education. They also responded that hospital infection and infection cycle of Tb need to be addressed during educational session about transmission and patho-physiology. in addition, they said that specific and detailed contents about diagnosis and group examination should be carefully delivered during the education, along with diagnosis, test and application of personal protective devices during education of latent Tb. They also answered that patient education and adverse effect of Tb medication should be taught during Tb treatment session, as well as self activities of health promotion for junior HCPs and systematic TB education as key way of Tb prevention. As the findings were from limited numbers of respondents and contained the sampling bias, the result has to be carefully interpretated prior to generalization. Therefore, further survey with larger study population is required in terms of development of Tb education model.