• Title/Summary/Keyword: 허위 정보

Search Result 139, Processing Time 0.021 seconds

A DID-Based Transaction Model that Guarantees the Reliability of Used Car Data (중고자동차 데이터의 신뢰성을 보장하는 DID기반 거래 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.103-110
    • /
    • 2022
  • Online transactions are more familiar in various fields due to the development of the ICT and the increase in trading platforms. In particular, the amount of transactions is increasing due to the increase in used transaction platforms and users, and reliability is very important due to the nature of used transactions. Among them, the used car market is very active because automobiles are operated over a long period of time. However, used car transactions are a representative market to which information asymmetry is applied. In this paper presents a DID-based transaction model that guarantees reliability to solve problems with false advertisements and false sales in used car transactions. In the used car transaction model, sellers only register data issued by the issuing agency to prevent false sales at the time of initial sales registration. It is authenticated with DID Auth in the issuance process, it is safe from attacks such as sniping and middleman attacks. In the presented transaction model, integrity is verified with VP's Proof item to increase reliability and solve information asymmetry. Also, through direct transactions between buyers and sellers, there is no third-party intervention, which has the effect of reducing fees.

Study on Characteristics and User Reactions of Videos Related to COVID-19 Vaccine (코로나19 백신 관련 영상의 특성 및 이용자 반응에 대한 연구)

  • Lee, Mina;Hong, Juhyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.163-171
    • /
    • 2021
  • This study aimed to investigate the main characteristics of the COVID-19 vaccine-related videos spread on YouTube and differences in user responses in the infodemic situation caused by COVID-19. As a result of content analysis of 579 videos related to the COVID-19 vaccine, it was found that all of the false information was written by individual channels. Institutions, organizations, media companies, and government channels reported spread of false information as well as fact-oriented reporting. The progressive channel had a high percentage of positive sentiment in favor of vaccination, and the conservative channel had a high percentage of negative emotion against vaccination. After the vaccination started, the number of videos on government channels increased, and it was found that the number of videos with positive emotions increased. Results of regression analysis of video characteristics that affect the number of likes indicated that personal expert videos and videos from progressive channels received more likes. Combining the research results, we propose a plan to promote government policies regarding the COVID-19 vaccine using social media.

Target Range Estimation Method using Ghost Target in the Submarine Linear Array Sonar (잠수함 선배열소나의 허위표적 정보를 이용한 표적의 거리추정 기법)

  • Choi, Byungwoong;Kim, Kyubaek
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.532-537
    • /
    • 2015
  • In this paper, we propose target range estimation method using ghost target in the submarine linear array sonar. Usually, when submarine detect target, they use passive sonar detection to avoid self-disclosure by active sonar transmission. But, originally, passive linear array sonar have limitation for target range estimation and additional processing is required to get target range information. For the case of near-field target, typical range estimation method is using multiple information by multipath effect in underwater environment. Acoustic signal generated from target are propagated along with numerous multipath in underwater environment. Since multipath target signals received in the linear array sonar have different conic angles each other, ghost target is appeared at the bearing different with real target bearing and sonar operator can find these information on the operation console. Under several assumption, this geometric properties can be analysed mathematically and we get the target range by derivation of this geometric equations using measured conic angles of real target and ghost target.

BICF : Collaborative Filtering Based on Online Behavior Information (온라인 행동정보를 이용한 협업 필터링)

  • Kwak, Jee-yoon;Kim, Ga-yeong;Hong, Da-young;Kim, Hyon Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.401-404
    • /
    • 2020
  • 현재 전자상거래에서 사용되는 협업 필터링은 고객이 입력한 평점 정보를 이용하여 추천 시스템을 구축한다. 하지만 기존의 평점 정보는 고객이 직접 입력해야 하므로 데이터 희소생의 문제가 있고 허위정보를 가려내지 못한다는 문제점 또한 존재한다. 본 논문에서는 기존 평점 정보 기반의 협업 필터링 추천 시스템의 문제점을 해결하기 위해, 온라인 고객 행동 정보를 활용한 협업 필터링 알고리즘을 제안하였다. 실험 결과 본 연구에서 제안한 Collaborative Filtering based on Online Behavior Information (BICF) 알고리즘이 기존의 평점 기반 협업 필터링 방식보다 우수한 성능을 보임을 보여주었다.

A Static Analyzer for Detecting Memory Leaks based on Procedural Summary (함수 요약에 기반한 메모리 누수 정적 탐지기)

  • Jung, Yung-Bum;Yi, Kwang-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.590-606
    • /
    • 2009
  • We present a static analyzer that detects memory leaks in C programs. It achieves relatively high accuracy at a relatively low cost on SPEC2000 benchmarks and several open-source software packages, demonstrating its practicality and competitive edge against other reported analyzers: for a set of benchmarks totaling 1,777 KLOCs, it found 332 bugs with 47 additional false positives (a 12.4% false-positive ratio), and the average analysis speed was 720 LOC/sec. We separately analyze each procedure's memory behavior into a summary that is used in analyzing its call sites. Each procedural summary is parameterized by the procedure's call context so that it can be instantiated at different call sites. What information to capture in each procedural summary has been carefully tuned so that the summary should not lose any common memory-leak-related behaviors in real-world C program. Because each procedure is summarized by conventional fixpoint iteration over the abstract semantics ('a la abstract interpretation), the analyzer naturally handles arbitrary call cycles from direct or indirect recursive calls.

Least Square Prediction Error Expansion Based Reversible Watermarking for DNA Sequence (최소자승 예측오차 확장 기반 가역성 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.66-78
    • /
    • 2015
  • With the development of bio computing technology, DNA watermarking to do as a medium of DNA information has been researched in the latest time. However, DNA information is very important in biologic function unlikely multimedia data. Therefore, the reversible DNA watermarking is required for the host DNA information to be perfectively recovered. This paper presents a reversible DNA watermarking using least square based prediction error expansion for noncodng DNA sequence. Our method has three features. The first thing is to encode the character string (A,T,C,G) of nucleotide bases in noncoding region to integer code values by grouping n nucleotide bases. The second thing is to expand the prediction error based on least square (LS) as much as the expandable bits. The last thing is to prevent the false start codon using the comparison searching of adjacent watermarked code values. Experimental results verified that our method has more high embedding capacity than conventional methods and mean prediction method and also makes the prevention of false start codon and the preservation of amino acids.

An exploratory study on the Press Arbitration Act, freedom of expression, and regulation of false and manipulated information (언론중재법과 표현의 자유 그리고 허위·조작 정보의 규제에 대한 탐색적 연구)

  • Kim, Jea-young
    • Journal of Arbitration Studies
    • /
    • v.31 no.4
    • /
    • pp.71-97
    • /
    • 2021
  • The meaning of the amendment to the Media Arbitration Act in our society is not limited to media companies. And it's not just a problem for a specific group. It expresses public value because it is an issue that can affect members of society as a whole and furthermore, it becomes a bill that can infringe or strengthen individual freedom guaranteed by the Constitution, but makes different arguments. Freedom of speech is not achieved in a day and should not be easily lost by someone. Although it is not a frequent problem, fatal threats arising from wrong media reports take away an individual's present and future. It is because of this problem that the responsibility is important. Freedom of speech and control are heading in different directions, but they are the same as the front and back of the coin. The freedom pursued is different, but it consists of one body. If freedom and responsibility of speech made up of one body criticize or ignore each other, the results are scattered into a distorted On the other hand, the flexion of responsibility without freedom serves as a speaker that conveys the ideology of some classes or represents the interests of a particular group. The fact that the media should act as the air of society means that it should represent the interests of the majority, make them aware of the rights of unfair or marginalized members, and be their strength.

Survey of Fake News Detection Techniques and Solutions (가짜뉴스 판별 기법 및 해결책 고찰)

  • Lee, HyeJin;Kim, Jinyoung;Paik, Juryon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.37-39
    • /
    • 2020
  • 인터넷 상에서의 허위정보 생산과 유통은 주로 가짜 뉴스를 통하여 이루어진다. 과거에는 신문이나 공중파 TV등 뉴스 기사의 생산과 유통이 매우 제한적이었지만 지금은 인터넷의 발달로 누구나 쉽게 뉴스를 생산하고 유통할 수 있다. 뉴스 생산의 용이성은 정보 공유의 즉각성과 수월성이라는 장점을 제공하지만 반대로 불확실한 뉴스 남발로 인한 정보의 신뢰성 하락과 선량한 피해자를 양산하는 단점 또한 존재한다. 이는 가짜 뉴스가 사회적 문제로 대두되고 있는 이유이다. 에이전트나 스파이더 등의 소프트웨어를 통해 인터넷으로 급속도로 전파되는 가짜 뉴스를 전통 방식인 소수의 전문가가 수동으로 잡아내는 것은 불가능하다. 이에 기술발달로 잡아내기 힘들어진 가짜뉴스에 대해, 역으로 발달된 기술을 활용하여 잡아내려는 시도가 늘어나고 있다. 본 논문에서는 가짜뉴스를 판별하는 다양한 기법들을 탐색하고 해결방안을 제시하고자 한다.

  • PDF

A Study on School Violence Countermeasures of SNS Utilization - Focused on the Cyber bullying - (SNS 활용에 따른 학교폭력 대응방안 연구 -사이버불링(따돌림)을 중심으로-)

  • Shin, Seung-Gyoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.67-68
    • /
    • 2014
  • 스마트기기의 대중화와 SNS의 활용은 우리 사회생활에 많은 변화를 가져왔다. 하지만 이를 활용함으로써 나타는 폐해는 개인의 프라이버시 침해, 사이버폭력, 허위정보의 양산, 각종 범죄 등에 노출되는 부작용을 보이고 있다. 이 연구에서는 국내의 SNS 활용실태와 현재 경찰의 4대악 척결의 하나인 학교폭력을 중심으로 고찰을 시도하고자 한다. 특히 SNS의 급격한 확산으로 인해 발생되는 사이버불링(따돌림)의 실태에 대해 파악하고 그에 대한 제언을 하고자 한다.

  • PDF

차량용 무선통신에서 효율적인 메시지 인증 및 개인 정보 보호 기술 동향

  • Park, Yeong-Hun;Seo, Seung-U
    • Information and Communications Magazine
    • /
    • v.29 no.2
    • /
    • pp.30-38
    • /
    • 2012
  • 차량용 무선 통신이 처음 제안된 이래 다양한 자동차 생산 기업에서 차량에 무선통신 설비를 설치하고자 하고 있으며, 여러 국가에서 차량 무선통신을 위한 인프라 설치를 논의하고 있다. 따라서 수 년 내에 실생활에서 차량용 무선 통신을 이용 가능할 것으로 전망된다. 차량용 무선 통신을 이용하여 차량의 상태를 전송할 수 있고, 각종 교통 정보를 전송 받을 수도 있기 때문에 교통이 보다 안전하고 원활해 질 것이다. 하지만, 차량용 무선 통신에서 전송되는 데이터는 차량의 위치나 상태와 같은 개인 정보를 많이 포함하고 있다. 따라서 전송되는 메시지들의 보안과 그 메시지의 송신자에 대한 익명성이 보장되어야 한다. 그러나 익명성만 보장된 경우, 허위 정보나 악성 코드가 전송되었을 때, 이를 보낸 차량이 어떤 것인지 판별할 수 없게 되는데, 이를 보완하기 위하여 전송되는 메시지의 송신자를 추적할 수 있는 장치가 펼요하다. 그리고 차량용 무선 통신에 참여하는 차량의 수가 늘어날수록 전송되는 데이터도 폭발적으로 증가하는데, 이들을 효율적으로 인증할 수 있는 시스템 역시 갖춰져야 한다. 본 고에서는 차량용 무선통신에서 전송되는 정보에 대하여, 송신자의 익명성 보장과 효율적인 일괄 메시지 인증, 그리고 송신자 추적을 제공하는 차량용 디지털 서명 기술을 소개하고자 한다.