• Title/Summary/Keyword: 허위 정보

Search Result 139, Processing Time 0.028 seconds

An Efficient Second-hand transaction meta-services (효율적인 중고거래 메타서비스)

  • Sewoong Hwang;Min-Taek LIm;Hyun-Ki Hong;Hun-Tae Hwang;Sung-Hyun Park;Young-Kyu Choi;Suk-Hyung Hwang;Soo-Hwan Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.469-471
    • /
    • 2023
  • 본 논문에서는 기존 중고거래 플랫폼들의 불편한 점들을 해소하고 사용자들이 효율적이고 편리한 중고거래를 할 수 있도록 도와주는 플랫폼을 개발했다. 조사를 통해 기존 중고거래 플랫폼은 허위 매물, 시세 파악의 어려움, 사기 피해 등의 문제점이 존재한다는 사실을 인식했다. 문제 해결을 위해 파이썬을 활용하여 주요 중고거래 플랫폼의 상품 데이터를 수집했다. 이에 IQR을 적용하여 가격의 이상치를 판별했다. 가격 비교와 허위 매물 판별이 용이하게 되는 장점이 있다. 또한 이상치를 제거한 상품들의 시세를 계산하여 데이터를 차트로 시각화했다. 플랫폼과 지역마다 상이한 중고 상품의 신뢰성 있는 시세를 파악할 수 있고 중고거래 사기 피해를 방지할 수 있도록 사용자에게 주요 사기 수법, 뉴스 등의 정보를 제공한다.

  • PDF

21세기의 사이버 군대와 대리전쟁

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.7 s.257
    • /
    • pp.38-43
    • /
    • 2000
  • 전문가들은 예측하기를 미래의 전장은 적을 육안으로 거의 보지 못하고 싸우게 될 것이라 한다. 그리고 군사적으로 주요 요충지마다 로봇 병사가 지키게 될 것이다. 미래전쟁체계는 컴퓨터를 기반으로 하는 체계들로 구성되어 있기 때문에 컴퓨터 체계자체를 지키는 보안 및 안정성이 중요한 무기로 등장할 것이다. 적군의 컴퓨터 해커가 상대의 컴퓨터를 마비시키는 바이러스, 칩변조, 소프트웨어 변조, 시한폭탄 소프트웨어 바이러스, 허위정보 등을 투입할 수도 있다

  • PDF

Design and Evaluation of AMIDA Algorithm for MIC Sensor Signal Processing in USN (감시정찰용 소리 센서를 위한 AMIDA 알고리즘 설계 및 성능평가)

  • Park, Hong-Jae;Lee, Seung-Je;Ha, Gong-Yong;Kim, Li-Hyung;Kim, Young-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.796-799
    • /
    • 2008
  • 최근 유비쿼터스 컴퓨팅과 유비쿼터스 네트워크를 활용하여 새로운 서비스들을 개발하려는 노력이 진행 중이며, 이와 관련된 기술의 중요성도 급증하고 있다. 특히 감시정찰 센서네트워크의 핵심 구성요소인 저가의 경량 센서노드에서 측정한 미가공 데이터(raw data)를 사용하여 침입 물체의 실시간 탐지, 식별, 추적 및 예측하기 위한 디지털 신호처리 기술은 주요 기술 중 하나이다. 본 논문에서는 감시정찰 센서네트워크의 핵심 구성요소인 소리센서 노드에서 측정한 소리 미가공 데이터를 사용하여 차량을 탐지할 수 있는 소리센서 디지털 신호처리 알고리즘을 설계 및 구현 한다. 알고리즘의 주 목표는 감시정찰용 센서노드의 탐지 신뢰성을 높이기 위한 높은 침입물체 탐지 성공률(success rate)과 낮은 허위신고(false alarm) 횟수를 가지는 것이다. 성능평가 결과에 의하면 제안한 AMIDA 알고리즘은 90% 이상의 탐지 성공률과 2 회 이하의 허위신고 횟수를 가지는 것을 확인할 수 있었다.

Fuzzy Logic based Next Hop Node Selection Method for Energy Efficient PVFS in WSN (무선 센서 네트워크에서 확률적 투표 기반 여과 기법의 에너지 효율성을 위한 퍼지 로직 시스템 기반의 다음 이웃 노드 선택 기법)

  • Lee, Jae Kwan;Nam, Su Man;Cho, Tae Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • Sensor nodes are easily compromised by attacker when which are divided in open environment. The attacker may inject false report and false vote attack through compromised sensor node. These attacks interrupt to transmission legitimate report or the energy of sensor node is exhausted. PVFS are proposed by Li and Wu for countermeasure in two attacks. The scheme use inefficiency to energy of sensor node as fixed report threshold and verification node. In this paper, our propose the next neighbor node selection scheme based on fuzzy logic system for energy improvement of PVFS. The parameter of fuzzy logic system are energy, hops, verification success count, CH select high the next neighbor node among neighbor nodes of two as deduction based on fuzzy logic system. In the experimental, our proposed scheme was improvement to energy of about 9% compare to PVFS.

Reversible DNA Information Hiding based on Circular Histogram Shifting (순환형 히스토그램 쉬프팅 기반 가역성 DNA 정보은닉 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.67-75
    • /
    • 2016
  • DNA computing technology makes the interests on DNA storage and DNA watermarking / steganography that use the DNA information as a newly medium. DNA watermarking that embeds the external watermark into DNA information without the biological mutation needs the reversibility for the perfect recovery of host DNA, the continuous embedding and detecting processing, and the mutation analysis by the watermark. In this paper, we propose a reversible DNA watermarking based on circular histogram shifting of DNA code values with the prevention of false start codon, the preservation of DNA sequence length, and the high watermark capacity, and the blind detection. Our method has the following features. The first is to encode nucleotide bases of 4-character variable to integer code values by code order. It makes the signal processing of DNA sequence easy. The second is to embed the multiple bits of watermark into -order coded value by using circular histogram shifting. The third is to check the possibility of false start codon in the inter or intra code values. Experimental results verified the our method has higher watermark capacity 0.11~0.50 bpn than conventional methods and also the false start codon has not happened in our method.

Whether to put on Criminal convictions on the medical examination records prepared by medical personnels - Sentenced by November 24, 2005, by The Supreme Court, Precedent case no. 2002DO4758 - (의료인의 진료기록부 등 허위작성시 형사처벌 가부 - 대법원 2005. 11. 24. 선고 2002도4758 판결 -)

  • Park, Kyong-Chun
    • The Korean Society of Law and Medicine
    • /
    • v.8 no.1
    • /
    • pp.107-135
    • /
    • 2007
  • In preparation of the medical examination records, the failure to correctly write the taken medical behaviors on the medical examination records, is subject to criminal conviction due to the breach of the Article 21-1. The false or overstated writings on the medical examination records is subject to the same punishment due to the Article 21-1, which $\underline{additionally}$ may lead to the administrative measures such as the suspension of license according to Article 53-1. The interpretation is considered as proper in light of the function of the medical examination records, hazard to the patients, and the doctors' ethics. In light of the attitude of The Supreme Court for the preparation obligation of the medical examination records specified in the medical law Article 21-1(Purport : The doctors may continue to use their opinions on the patient's status and treatment process on the medical examination records, may provide the proper information to other medical staff, and ought to specify the details enough to decide the appropriateness of such medical behaviors after the recent treatment.), the false writings of the doctors on the medical examination records of the non-treated patient as faithfully treated one during the entire period before the present hospitalization, will be regarded as the fulfillment obligation of the preparation of the medical examination records in the medical law Article 21-1.

  • PDF

Constructing trustworthy real estate market based on blockchain (블록체인 기반 부동산 공정 시장 기술)

  • Oh, Seoyoung;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.303-304
    • /
    • 2016
  • 비트코인이 제안된 후 금융권에 응용하고자 하는 연구는 다양하게 진행되어왔으며 다양한 분야로 그 응용범위가 확장되어왔다. 본 논문에서는 블록체인 기술의 응용범위를 부동산 시장으로 확장하였다. 부동산 시장은 허위 매물로 신뢰도가 높지 않은 문제점이 있었기에 이러한 문제를 해결하기 위한 방안으로 블록체인을 응용한 기술을 제안하고자 한다.

An Improvement Model of Escrow Service Using Ethereum (이더리움을 이용한 에스크로 서비스 개선 모델)

  • Jeong, Han-jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.35-36
    • /
    • 2018
  • 에스크로는 개인 간의 물품 거래를 중개하여 허위 물품 등록 및 대금 횡령과 같은 사기를 방지하는 안전 결제 서비스이다. 그러나 신뢰할 수 없는 에스크로 서비스 사로 인한 사기 발생 및 에스크로의 서비스 구조와 같은 태생적인 한계로 인한 이용률 저하와 같은 한계점들은 건전한 사용자들의 이용률을 저하시킨다. 본 논문에서는 이런 문제점들을 극복하기 위해 블록체인 플랫폼중 하나인 이더리움을 이용하여 개선된 에스크로 서비스 모델을 제시하고자 한다.

  • PDF

Through SNS and freedom of election Publicized criminal misrepresentation (SNS를 통한 선거의 자유와 허위사실공표죄)

  • Lee, Ju-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.149-156
    • /
    • 2013
  • In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. Moreover, in the mean time the campaign and which in the course of the election campaign through the SNS, the infinite potential of the growing point than any point spread from the SNS and freedom of election campaign through public election law with regard to the limitation of the diffusion of false facts, awards, a number of problems are likely to occur. You've been in this business and disseminate false guilt disparage precandidacy for true-false, as well. He should be able to reach a specific goal you want to defeat through the dissemination of information which is specified as a crime for this strictly for the fact that disseminate false, rather than to interpret it is the judgment of the Court in that judgment against have been made. Therefore, this strict interpretation of the law and the need to revise or delete before I would like to discuss about. The legislation would repeal the cull of Ron sang first of all point out the issue through analytics. First, the purpose of the data protection Act provides limited interpretation to fit in this world of sin. Secondly, this sin is committed for the purpose of prevention, since the purpose of the objective in this case of sin and the need to interpret strictly. Why I am the Internet space in the case of so-called tweets from followers, this means in some cases done without a lot of the stars because of this, there will be a limit to the punishment of sin, this is obvious. And, in the long-awaited Constitutional Court ensures the freedom of election campaign through SNS and free election in the country, even in the limited sense interpretation opens the chapter of communication is needed. This ensured the freedom of expression will be highly this is a mature civil society that will be imperative.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.