• Title/Summary/Keyword: 허위 정보

Search Result 139, Processing Time 0.03 seconds

Stduy on Tracking Station of 112 Wired and Wireless, Letters Complainant's Location (112 유선·무선·문자 신고자의 위치 역추적 연구)

  • Moon, Soon-ho;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.244-247
    • /
    • 2015
  • People who live in the Republic of Korea the world's leading information technology, all use a smartphone. When all the people calling 112 to report an emergency many use smartphone. Accordingly, this paper is not to be put on the emergency police report arguing for a second location backtrack through the 112 complainant to report a smartphone and not wasted also Identifying a false declaration to become beneficial to all citizens.

  • PDF

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

System Implementation for Automatic Inspection of Wind Pressure Sensor Based on Reliability Improvement (신뢰성 향상 기반의 풍압센서 자동검사 시스템구현)

  • Do, Nam Soo;Ryu, Conan K.R.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.775-778
    • /
    • 2017
  • This research describes system implementation for automatic inspection on wind pressure sensor production based on reliability improvement. The reliability is minimized by the automatic inspection system on the wind pressure sensor against the manual system. The system consists of the control system and monitoring system to be scanning the inspection processing. The inspection system for reliability is evaluated in Gage Repeatability and Reproducibility. The experimental results are improved about 2 times speed, measured error ${\pm}0.02V$, effectiveness 15%, missing probability 17% and false alarm 12% respectively. The system will be also improved by database and the product barcodes for the total quality control system based on the effective reliability in the future.

  • PDF

Stability Analysis of Missiles with Strapdown Seeker (스트랩다운 탐색기를 탑재한 유도탄의 안정성 해석)

  • Kim, Tae-Hun;Park, Bong-Gyun;Kwon, Hyuck-Hoon;Kim, Yoon-Hwan;Tahk, Min-Jea
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.4
    • /
    • pp.332-340
    • /
    • 2011
  • A missile with a strapdown seeker should properly estimate line-of-sight(LOS) rate using its attitude information and the look angle of the seeker because LOS rate information in an inertial coordinate system, which is used for a proportional navigation(PN) homing guidance, can not be obtained directly. However, an unnecessary feedback loop(Parasite Loop) is formed in the guidance and control loop, and it may cause the guidance performance degradation or even the unstability of the system(Parasite Effect). This paper presents estimation methods for the LOS rate information and effective ways to minimize the parasite effect using Routh-Hurwitz stability criterion. Various numerical simulations are also included to verify the proposed methods.

An Exploratory Study on the Establishment and Provision of Universal Literacy for Sustainable Development in the Era of Fake News (가짜뉴스의 시대, 지속가능한 발전을 위한 보편적 리터러시의 구축 및 제공에 대한 실험적 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.85-106
    • /
    • 2021
  • The purpose of this study is to examine the concept and definition of fake news focusing on misinformation/false information and is to examine the ways in which our society can respond to the distortion of social reality and damage to democracy caused by information distortion such as fake news. To do this, the concept of fake news was examined based on the level of facticity and intention to device, and our social environment in which fake news was created and spread was examined from the perspective of datafication. In this environment, the library community, which plays a pivotal role in human access to and use of information, argued that it should strive to establish and provide universal literacy education in order to realize the Sustainable Development Goals of the UN 2030 agenda. The core of universal literacy education is to understand the society by investigating and analyzing data communication types according to the degree of datafication and the political, economic, social, and cultural background of society. For this reason, it was concluded that universal literacy should be implemented flexibly according to the degree of datafiation and users of each society.

Automatic Access Management System Using Beacon (비콘을 활용한 자동화 출입관리 시스템)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.105-107
    • /
    • 2021
  • With the prolonged COVID-19 worldwide, it is essential to create a list of visitors when using various facilities to prevent the spread of COVID-19 and to investigate epidemiology in the event of confirmed cases. In the beginning, there were many problems due to the leakage of personal information and false preparation by making a list of visitors with a handwritten list. To compensate for the problems of handwritten lists, the KI-Pass system based on QR codes is mainly managed. However, KI-Pass systems have the disadvantages of issuing QR codes and abusing personal information. In this paper, we propose an access management system using beacon. Beacon is an close-range wireless communication device and visitors when they are near the facility and automatically registers their personal information on the cloud server for access management. It is expected that this will be effective in preventing and responding to the spread of new infectious diseases in the future.

  • PDF

The Effect of Cultural Predictors on Perceived Ethicality of Negotiation Behavior A Comparison of 'Chemyon' and Hofstede's Cultural Dimensions (문화 변수가 협상 윤리에 미치는 영향 '체면'과 홉스테드 변수의 비교)

  • Kim, Yung-Wook;Yang, Jung-Eun
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.212-244
    • /
    • 2009
  • This study examined the effects of cultural factors and demographic factors on the perceived appropriateness and likelihood of using five categories of inappropriate negotiation strategies. Five categories of inappropriate negotiation strategies consist of traditional competitive bargaining, attacking opponent's network, false promises, misrepresentation of information and inappropriate information gathering. Two kinds of cultural variables, Hofstede's cultural dimensions and 'Chemyon' dimensions were used as universal, etic variables versus indigenous, emic variables. Survey result shows age and gender had significant effects only for traditional competitive bargaining, but gender and personal negotiation style did not have any effects for the inappropriate strategies. Hofstede's dimensions as well as Chemyon dimensions had significant effect for perceived inappropriateness and likelihood of using inappropriate strategies. While both Chemyon and Hofstede's dimensions were significant, Chemyon accounted for more variance than Hofstede dimensions in most cases. This suggests Chemyon's vital role in explaining Korean negotiators' perception and attitude towards inappropriate negotiation strategies. Implications of the results and future research are discussed.

  • PDF

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

The Relationship between Cyberbullying Victimized Experience and Emotional Behavior of Middle School Students (중학생의 사이버불링 피해 경험과 정서행동과의 관계)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.207-215
    • /
    • 2013
  • The general opinion about the notion of cyberbullying hasn't existed yet, but in related laws it is defined as the entire behavior causing the counterpart to suffer the pain by continuously and repeatedly psychologic offending toward specific students with information and telecommunication products such as the Internet and mobile phones, and spreading the private information or false facts related with specific students. Recently a number of accidents related with abuse of cyberbullying are being broadcast on a variety of mass media, and the argument about the severity and countermeasures against cyberbullying is moving onward. This study has a purpose as suggesting the practical alternatives to prevent cyberbullying victim of middle school students by arguing cyberbullying of middle school students and analyzing the relationship between the general features such as victimized experience and frequency and the emotional behaviors according to victimized experience. As the result of this study, cyberbullying victimized experience has a significant effect on the emotional behavior such as depression, aggression, and academic stress. As political implication, this study suggests the practical alternatives to prevent cyberbullying of middle school students based on the analysis result.

A Study on Timeliness Advance Increment of Certificate Verification Using an Observer (Observer를 이용한 인증서 검증의 적시성 증대에 관한 연구)

  • 권오인;김진철;오영환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.25-37
    • /
    • 2004
  • A certificate is expected to use for its entire validity period. However, a false information record of user and compromise of private key may cause a certificate to become invalid prior to the expiration of the validity period. The CA needs to revoke the certificate. The CA periodically updates a signed data structure called a certificate revocation list(CRL) at directory server. but as CA updates a new CRL at directory server. the user can use a revoked certificate. Not only does this paper analyzes a structure of CRL and a characteristic of certificate status conviction, OCSP method but also it proposes a new certificate status verification method adding an observer information in handshake process between user and server.