• Title/Summary/Keyword: Disables

Search Result 33, Processing Time 0.02 seconds

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

A Study on the Deduction of Social Issues Applying Word Embedding: With an Empasis on News Articles related to the Disables (단어 임베딩(Word Embedding) 기법을 적용한 키워드 중심의 사회적 이슈 도출 연구: 장애인 관련 뉴스 기사를 중심으로)

  • Choi, Garam;Choi, Sung-Pil
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.1
    • /
    • pp.231-250
    • /
    • 2018
  • In this paper, we propose a new methodology for extracting and formalizing subjective topics at a specific time using a set of keywords extracted automatically from online news articles. To do this, we first extracted a set of keywords by applying TF-IDF methods selected by a series of comparative experiments on various statistical weighting schemes that can measure the importance of individual words in a large set of texts. In order to effectively calculate the semantic relation between extracted keywords, a set of word embedding vectors was constructed by using about 1,000,000 news articles collected separately. Individual keywords extracted were quantified in the form of numerical vectors and clustered by K-means algorithm. As a result of qualitative in-depth analysis of each keyword cluster finally obtained, we witnessed that most of the clusters were evaluated as appropriate topics with sufficient semantic concentration for us to easily assign labels to them.

Address Auto-Resolution Network System for Neutralizing ARP-Based Attacks (ARP 기반 공격의 무력화를 위한 주소 자동 결정 네트워크 시스템)

  • Jang, RhongHo;Lee, KyungHee;Nyang, DaeHun;Youm, HeungYoul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.203-210
    • /
    • 2017
  • Address resolution protocol (ARP) is used for binding a logical address to a physical address in many network technologies. However, since ARP is an stateless protocol, it always abused for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for improving security of ARP protocol. In this paper, we present an address auto-resoultion (AAR) network system to neutralize the ARP-based attacks. The AAR turns off the communication function of ARP messages(e.g. request and reply), but does not disable the ARP table. In our system, the MAC address of destination was designed to be derived from destination IP address so that the ARP table can be managed statically without prior knowledge (e.g., IP and MAC address pairs). In general, the AAR is safe from the ARP-based attacks since it disables the ARP messages and saves network traffics due to so.

TMDM for Data Integration Management in Cloud Environment (클라우드 환경에서 데이터 통합 관리를 위한 TMDM)

  • Moon, Seok-jae;Shin, Hyo-young;Jeong, Gye-dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.970-973
    • /
    • 2012
  • In cloud environment, enterprises use a number of systems which are not interconnected and save master information in a distributed way in each of them. Master information which is not managed is incorrect and discord each other so that lowers efficiency of business process and disables optimum decision making. It is necessary to do high-qualified management of master information to operate efficient and errorless business process. This paper suggests TMDM as a solution to solve heterogeneous problems occurred between interconnected master information in cloud environment and to manage business process in an efficient method. TMDM is an information storage that is suggested to solve mutual discord problems between master information using Topic Maps that considers correlation between data. Topic Maps can be connected by association between topics in order to access through a topic to all related knowledge information which is described by the topic. This also can be applied to master information between legacy systems within cloud.

  • PDF

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

A Study on the Improvement Direction of the Building Escape Regulation Considering Inconvenient Movers (이동약자를 고려한 건축물 피난규정 개선 방안에 관한 연구)

  • Hwang, Eun-Kyoung
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.32-38
    • /
    • 2009
  • Owing to increase of the large-scaled, high-raised and complexed building construction, the escape design of the building became very important issue to insure the safety of occupant. Specially, it is demanded to have building escape regulation considering for inconvenient movers such as disables elders pregnant women. However, building regulations for inconvenient movers are divided into "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information". But, for the escape security of inconvenient movers, the connection of each regulation are necessary. So this study suggested the improvement direction of the building escape regulation considering inconvenient movers through the compared analysis on the "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information".

A Study on the Sensitivity of Human Rights and the Advocacy Activities of Korean Occupational Therapists (국내 작업치료사의 인권감수성이 옹호활동에 미치는 영향)

  • Kim, Ji-Man;Hong, Ki-Hoon;Lee, Chun-Yeop;Kim, Hee-Jung
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.2
    • /
    • pp.11-24
    • /
    • 2020
  • Objective : The Human Rights constitute one of the basic pillars of every work where persons are involved, such is the case of the occupational therapy field. Methods : In this study we investigate the human rights sensitivity and the advocacy activities of occupational therapists. The differences according to their characteristics, the relationship and the impact of the human rights sensitivity are examined and presented. Making use of online surveys 116 subjects participated in the study. Results : The measured average of human right sensitivity is 69.00 ± 17.67 point, being them distributed according to the following subcategories: to the perception of the situation corresponds 23.25±5.62 points, to the perception of the consequences 22.75±6.54 points and for the perception of the responsibility 23±6.54 points. In all the cases have been taken in account the equal rights, the right to education in disables, the right to pursue the happiness of the elderly, the right of the disables to have personal freedom, the privacy rights and the privacy rights for mental illness people. According to the working area the Human Right sensitiveness is higher in Seoul than in the Gyeongsang province meanwhile the advocacy activities is higher in Seoul and in Gyeonggi province than in Gyeongsang province. Depending of the type of service, general hospitals and rehabilitation/nursing hospitals showed higher human rights sensitivity than other service organizations According to the working field, occupational therapy group focused in elderly showed higher Human Right sensitivity than other fields. Professionals belonging groups of clinical experience from 3 to 5 years and from 6 to 10 years showed higher advocacy activities than professionals with more than 11 years of experience. A positive correlation was showed between the human rights sensitivity and the advocacy activities. For this situation, the human rights sensitiveness was divided in sub-categories in perception of the situation, perception of the consequences and perception of the responsibility. As showed by the result of multiple regression analyses the advocacy activities of human would grow up in accordance with the increase of the human rights sensitiveness of responsibility perception. Conclusion : Due to the actual lack of information, the collection and study of basic data is fundamental for the development of practical human rights educational programs and to emphasize the role of the defense of the human rights.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

An Exploratory Research on Social Workers' Attitude and Related Factors about Indoor Air Quality Management of Social Welfare Facilities (사회복지시설 종사자의 실내공기질 관리에 대한 태도와 관련 요인에 관한 탐색적 연구)

  • Bae, Jin-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.273-284
    • /
    • 2017
  • As these days people spend most of time at inner space, indoor air quality affect human life seriously. Government manage indoor air quality of various facilities based on different laws. Government released that they would try to protect environment for vulnerable people such children and seniors from indoor air pollutants in 2015. But social welfare facilities are exception under current legal systems. Clients of social welfare residential facilities are the disables, the elderly, homeless and children and they usually stay inner space very long time. The purpose of this study is explore workers' attitude and related factors about indoor air quality management of social welfare facilities. 69.5% of respondents agree to government's indoor air quality management, 80.9% of respondents think social welfare facilities must be included in legal system for indoor air quality management. Environmental awareness and law awareness were related with attitude to indoor air quality management. Based on the results of the analysis, I propose the amendment of law on indoor air quality of the Ministry of Environment, cost burden of central or local government and the necessity of education and research on indoor air quality management in social welfare facilities.

A Design of Mobile e-Book Viewer interface for the Reading Disabled People (독서장애인용 모바일 전자책뷰어 인터페이스 설계)

  • Lee, KyungHee;Kim, TaeEun;Lee, Jongwoo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.100-107
    • /
    • 2013
  • As the eBook market grows fast recently, various eBook viewer solutions such as hardware viewers and software readers came out to the market. We can, however, hardly find mobile eBook interfaces for the reading disabled people who have difficulties in reading for their visual impairment or learning disabilities, or dyslexia. An eBook viewer interfaces for the reading disabled people should be carefully and distinctively designed because the reading disabled people cannot use normal versions of eBook viewer. In this paper, we suggest a eBook viewer interface model to make the reading disabled people read eBooks easily. Depending on the type of the reading disabled people: the full blind, the almost blind, the just learning disabled, our model provides an adaptive interface to make them read eBooks effectively. In addition, unlike the existing simple audio books, we also support annotation systems to make the reading disabled people interact with eBook viewer. To show the effectiveness of our model, we implemented an eBook viewer prototype on an android-based mobile device. We are sure that our model and implementation can make the reading disabled people, who is 10% of all the domestic people, read eBooks effectively.