• Title/Summary/Keyword: IT security

Search Result 11,284, Processing Time 0.043 seconds

A Study on the Perception of Research Data Managers to Establish a Korea Research Data Commons System (국가연구데이터커먼즈 체계 수립을 위한 연구데이터 관리자들의 인식에 관한 연구)

  • Seong-Eun Park;Mikyoung Lee;Minhee Cho;Sa-Kwang Song;Dasol Kim;Hyung-Jun Yim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.465-486
    • /
    • 2024
  • The purpose of this study is to identify the current status of infrastructure and services for analyzing research data for research data managers at government-funded research institutions under the National Research Council for Science and Technology (NST) who will actually use the Korea Research Data Commons (KRDC), which is being developed by the Korea Institute of Science and Technology Information (KISTI) and to investigate the perceptions of research data managers related to the establishment of KRDC system. For the study, we conducted a survey targeting 24 government-funded research institutes, excluding KISTI, and interviewed research data managers from 9 of the 15 institutions surveyed who agreed to follow-up interviews. As a result of the survey, most institutions were providing related services, and their willingness to introduce an integrated analysis framework for the use of research data and provide a system for using externally released analysis software was also high. Meanwhile, when we investigated the external disclosure status of each institution's analysis services through follow-up interviews, only a minimal number of institutions were disclosing them to the outside world. The findings reveal that there is a demand to utilize analysis infrastructure and services when provided through the framework. However, it is difficult to disclose and share the analysis resources held by each organization. In order to establish the KRDC system, it is essential to share research sites' analysis infrastructure and services, and in addition, changes in the perception of research sites and institutional changes are necessary. Furthermore, there is a need to establish policies that consider the system's convenience, security, and compensation system raised in the follow-up interviews.

Comparative Analysis of Freshwater Fish Species in Civilian Control Zone in South Korea: A Comparison between Direct Survey Results and Indirect Assessment via eDNA (우리나라 민간인통제구역 내 수계 어류에 대한 비교분석: 직접조사 결과와 eDNA를 통한 간접조사 결과 비교)

  • Soon-Jae Eum;Naeyoung Kim;Min-A Seol;Ji Young Kim
    • Korean Journal of Ichthyology
    • /
    • v.35 no.4
    • /
    • pp.224-235
    • /
    • 2023
  • South Korea is the only divided nation globally, marked by a military demarcation line establishing demilitarized and civilian control zones, ensuring national security. Consequently, these areas exhibit relatively minimal ecological disruption compared to other regions. However, the threat to safety persists due to the presence of unexploded ordnances and landmines, imposing significant constraints on ecological research. To address this, we conducted a comparative study utilizing eDNA analysis as a supplementary and alternative approach within three points of the "Road of Peace" - Inje, Yanggu, and Hwacheon courses, located within the civilian control zone. Direct surveys and indirect eDNA sampling were carried out in May, July, and September of 2022. Genetic material obtained from the samples underwent amplification, library preparation, MiSeq sequencing, and subsequent ASV generation for indirect analysis. These results were then compared with the findings of direct surveys. Our findings revealed the detection of eDNA for both observed species at the Yanggu-1 point, and for two out of four species at Yanggu-2. Hwacheon-1 displayed the detection of eDNA for one out of one observed species, whereas Hwacheon-2 yielded seven out of twelve, Hwacheon-3 showed four out of six, and all one observed species at Hwacheon-4 exhibited eDNA detection. Consequently, approximately 69% of the fish species identified through direct surveys were confirmed by indirect eDNA analysis. It is necessary to verify if certain fish species, such as the continental trout and catfish, have genetic information registered in the NCBI database. Additionally, it is believed that further marker development research utilizing different genetic sequences is essential. Given the limitations imposed by the hazardous nature of the surveyed civilian control zone, eDNA analysis proves to be a suitable supplement for fish research in the area.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Development of Intelligent Job Classification System based on Job Posting on Job Sites (구인구직사이트의 구인정보 기반 지능형 직무분류체계의 구축)

  • Lee, Jung Seung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.123-139
    • /
    • 2019
  • The job classification system of major job sites differs from site to site and is different from the job classification system of the 'SQF(Sectoral Qualifications Framework)' proposed by the SW field. Therefore, a new job classification system is needed for SW companies, SW job seekers, and job sites to understand. The purpose of this study is to establish a standard job classification system that reflects market demand by analyzing SQF based on job offer information of major job sites and the NCS(National Competency Standards). For this purpose, the association analysis between occupations of major job sites is conducted and the association rule between SQF and occupation is conducted to derive the association rule between occupations. Using this association rule, we proposed an intelligent job classification system based on data mapping the job classification system of major job sites and SQF and job classification system. First, major job sites are selected to obtain information on the job classification system of the SW market. Then We identify ways to collect job information from each site and collect data through open API. Focusing on the relationship between the data, filtering only the job information posted on each job site at the same time, other job information is deleted. Next, we will map the job classification system between job sites using the association rules derived from the association analysis. We will complete the mapping between these market segments, discuss with the experts, further map the SQF, and finally propose a new job classification system. As a result, more than 30,000 job listings were collected in XML format using open API in 'WORKNET,' 'JOBKOREA,' and 'saramin', which are the main job sites in Korea. After filtering out about 900 job postings simultaneously posted on multiple job sites, 800 association rules were derived by applying the Apriori algorithm, which is a frequent pattern mining. Based on 800 related rules, the job classification system of WORKNET, JOBKOREA, and saramin and the SQF job classification system were mapped and classified into 1st and 4th stages. In the new job taxonomy, the first primary class, IT consulting, computer system, network, and security related job system, consisted of three secondary classifications, five tertiary classifications, and five fourth classifications. The second primary classification, the database and the job system related to system operation, consisted of three secondary classifications, three tertiary classifications, and four fourth classifications. The third primary category, Web Planning, Web Programming, Web Design, and Game, was composed of four secondary classifications, nine tertiary classifications, and two fourth classifications. The last primary classification, job systems related to ICT management, computer and communication engineering technology, consisted of three secondary classifications and six tertiary classifications. In particular, the new job classification system has a relatively flexible stage of classification, unlike other existing classification systems. WORKNET divides jobs into third categories, JOBKOREA divides jobs into second categories, and the subdivided jobs into keywords. saramin divided the job into the second classification, and the subdivided the job into keyword form. The newly proposed standard job classification system accepts some keyword-based jobs, and treats some product names as jobs. In the classification system, not only are jobs suspended in the second classification, but there are also jobs that are subdivided into the fourth classification. This reflected the idea that not all jobs could be broken down into the same steps. We also proposed a combination of rules and experts' opinions from market data collected and conducted associative analysis. Therefore, the newly proposed job classification system can be regarded as a data-based intelligent job classification system that reflects the market demand, unlike the existing job classification system. This study is meaningful in that it suggests a new job classification system that reflects market demand by attempting mapping between occupations based on data through the association analysis between occupations rather than intuition of some experts. However, this study has a limitation in that it cannot fully reflect the market demand that changes over time because the data collection point is temporary. As market demands change over time, including seasonal factors and major corporate public recruitment timings, continuous data monitoring and repeated experiments are needed to achieve more accurate matching. The results of this study can be used to suggest the direction of improvement of SQF in the SW industry in the future, and it is expected to be transferred to other industries with the experience of success in the SW industry.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

The Demand and Supply of Nutritionist Workforce in Korea and Policy Recommendations (국민영양관리를 위한 영양사 인력의 적정수급에 관한 연구)

  • Oh, Young-Ho
    • Journal of Nutrition and Health
    • /
    • v.43 no.5
    • /
    • pp.533-542
    • /
    • 2010
  • The objective of this study is to provide basic information and policy implications needed to balance the supply and demand for dietitian by projecting supply and demand for dietitian. The data from the Ministry of Health Welfare and Family on the number of licensed nutritionist, resident registration data of the Ministry of Public Administration and Security, and health insurance qualification data of the National Health Insurance Corporation were used to examine the current status of supply. To project the supply of nutritionist workforce, the in-out moves method and demographic method were used. The ratios of nutritionist to population and GDP, and that of other countries were applied as the demand projection method. According to the study results, the projection on the imbalance of supply and demand for dietitian by year 2021 differs depending on the method used. First, according to the results based on age-adjusted population ratio, there is an oversupply of 1,643 dietitians in year 2010, and 2,076 dietitians in year 2020. Second, although the projection on the imbalance of the supply and demand for dietitian differs depending on whether the GDD is calculated in won(₩) or dollar($). it is expected that there will be an oversupply in general. Third, as to the scenario using the nutritionist ratio in foreign countries, the oversupply of dietitian is likely in Korea, under any scenario, when comparing the nutritionist supply projection with the demand projection based on the nutritionist ratio in the United States. However, the projection of the supply and demand varies in each scenario when the European nutritionist ratio is applied. Under European 'scenario 1', an oversupply is expected, whereas under 'scenario 2', a shortage of supply is expected. A careful approach is required in interpreting the supply and demand projection using criteria of other countries, because dietitian assumes different roles and functions in each country. Although a slight oversupply of nutritionist workforce is projected, it does not cause a major problem as the demand for diet therapy is expected to rise due to aging and the increase of chronic diseases, and as the demand for clinical dietitians in hospitals increases. Accordingly, the demand for dietitians will rise and, in this context, the oversupply of nutritionist will not incur much problem. However, the nutritionist qualification is much too open in Korea, and this has a negative effect on the quality of the nutritionist workforce. Therefore, it is important that the nutritionist qualifications and requirements are reinforced in the future, enhance the quality level of the nutritionist supply, and maintain the balance between the supply and demand.

The Obligation of Return Unjust Enrichment or Compensation for the Use of Flight Safety Zone -Seoul High Court Judgment 2018Na2034474, decided on 2018. 10. 11.- (비행안전구역의 사용에 대한 부당이득반환·손실 보상 의무의 존부 -서울고등법원 2018. 10. 11. 선고 2018나2034474 판결-)

  • Kwon, Chang-Young;Park, Soo-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.63-101
    • /
    • 2020
  • 'Flight safety zone' means a zone that the Minister of National Defense designates under Articles 4 and 6 of the Protection of Military Bases and Installations Act (hereinafter 'PMBIA') for the safety of flight during takeoff and landing of military aircrafts. The purpose of flight safety zone is to contribute to the national security by providing necessary measures for the protection of military bases and installations and smooth conduct of military operations. In this case, when the state set and used the flight safety zone, the landowner claimed restitution of unjust enrichment against the country. This article is an analysis based on the existing legal theory regarding the legitimacy of plaintiff's claim, and the summary of the discussion is as follows. A person who without any legal ground derives a benefit from the property or services of another and thereby causes loss to the latter shall be bound to return such benefit (Article 741 of the Civil Act). Since the subject matter is an infringing profit, the defendant must prove that he has a legitimate right to retain the profit. The State reserves the right to use over the land designated as a flight safety zone in accordance with legitimate procedures established by the PMBIA for the safe takeoff and landing of military aircrafts. Therefore, it cannot be said that the State gained an unjust enrichment equivalent to the rent over the land without legal cause. Expropriation, use or restriction of private property from public necessity and compensation therefor shall be governed by Act: provided, that in such a case, just compensation shall be paid (Article 23 (1) of the Constitution of The Republic of KOREA). Since there is not any provision in the PMBIA for loss compensation for the case where a flight safety zone is set over land as in this case, next question would be whether or not it is unconstitutional. Even if it is designated as a flight safety zone and the use and profits of the land are limited, the justification of the purpose of the flight safety zone system, the appropriateness of the means, the minimization of infringement, and the balance of legal interests are still recognized; thus just not having any loss compensation clause does not make the act unconstitutional. In conclusion, plaintiff's claim for loss compensation based on the 'Act on Acquisition of and Compensation for land, etc. for Public Works Projects', which has no provision for loss compensation due to public limits, is unjust.

A Study on Hoslital Nurses' Preferred Duty Shift and Duty Hours (병원 간호사의 선호근무시간대에 관한 연구)

  • Lee, Gyeong-Sik;Jeong, Geum-Hui
    • The Korean Nurse
    • /
    • v.36 no.1
    • /
    • pp.77-96
    • /
    • 1997
  • The duty shifts of hospital nurses not only affect nurses' physical and mental health but also present various personnel management problems which often result in high turnover rates. In this context a study was carried out from October to November 1995 for a period of two months to find out the status of hospital nurses' duty shift patterns, and preferred duty hours and fixed duty shifts. The study population was 867 RNs working in five general hospitals located in Seoul and its vicinity. The questionnaire developed by the writer was used for data collection. The response rate was 85.9 percent or 745 returns. The SAS program was used for data analysis with the computation of frequencies, percentages and Chi square test. The findings of the study are as follows: 1. General characteristics of the study population: 56 percent of respondents was (25 years group and 76.5 percent were "single": the predominant proportion of respondents was junior nursing college graduates(92.2%) and have less than 5 years nursing experience in hospitals(65.5%). For their future working plan in nursing profession, nearly 50% responded as uncertain The reasons given for their career plan was predominantly 'personal growth and development' rather than financial reasons. 2. The interval for rotations of duty stations was found to be mostly irregular(56.4%) while others reported as weekly(16.1%), monthly(12.9%), and fixed terms(4.6%). 3. The main problems related to duty shifts particularly the evening and night duty nurses reported were "not enough time for the family, " "afraid of security problems after the work when returning home late at night." and "lack of leisure time". "problems in physical and physiological adjustment." "problems in family life." "lack of time for interactions with fellow nurses" etc. 4. The forty percent of respondents reported to have '1-2 times' of duty shift rotations while all others reported that '0 time'. '2-3 times'. 'more than 3 times' etc. which suggest the irregularity in duty shift rotations. 5. The majority(62.8%) of study population found to favor the rotating system of duty stations. The reasons for favoring the rotation system were: the opportunity for "learning new things and personal development." "better human relations are possible. "better understanding in various duty stations." "changes in monotonous routine job" etc. The proportion of those disfavor the rotating 'system was 34.7 percent. giving the reasons of"it impedes development of specialization." "poor job performances." "stress factors" etc. Furthermore. respondents made the following comments in relation to the rotation of duty stations: the nurses should be given the opportunity to participate in the. decision making process: personal interest and aptitudes should be considered: regular intervals for the rotations or it should be planned in advance. etc. 6. For the future career plan. the older. married group with longer nursing experiences appeared to think the nursing as their lifetime career more likely than the younger. single group with shorter nursing experiences ($x^2=61.19.{\;}p=.000;{\;}x^2=41.55.{\;}p=.000$). The reason given for their future career plan regardless of length of future service, was predominantly "personal growth and development" rather than financial reasons. For further analysis, the group those with the shorter career plan appeared to claim "financial reasons" for their future career more readily than the group who consider the nursing job as their lifetime career$(x^2$= 11.73, p=.003) did. This finding suggests the need for careful .considerations in personnel management of nursing administration particularly when dealing with the nurses' career development. The majority of respondents preferred the fixed day shift. However, further analysis of those preferred evening shift by age and civil status, "< 25 years group"(15.1%) and "single group"(13.2) were more likely to favor the fixed evening shift than > 25 years(6.4%) and married(4.8%)groups. This differences were statistically significant ($x^2=14.54, {\;}p=.000;{\;}x^2=8.75, {\;}p=.003$). 7. A great majority of respondents(86.9% or n=647) found to prefer the day shifts. When the four different types of duty shifts(Types A. B. C, D) were presented, 55.0 percent of total respondents preferred the A type or the existing one followed by D type(22.7%). B type(12.4%) and C type(8.2%). 8. When the condition of monetary incentives for the evening(20% of salary) and night shifts(40% of. salary) of the existing duty type was presented. again the day shift appeared to be the most preferred one although the rate was slightly lower(66.4% against 86.9%). In the case of evening shift, with the same incentive, the preference rates for evening and night shifts increased from 11.0 to 22.4 percent and from 0.5 to 3.0 percent respectively. When the age variable was controlled. < 25 yrs group showed higher rates(31.6%. 4.8%) than those of > 25 yrs group(15.5%. 1.3%) respectively preferring the evening and night shifts(p=.000). The civil status also seemed to operate on the preferences of the duty shifts as the single group showed lower rate(69.0%) for day duty against 83. 6% of the married group. and higher rates for evening and night duties(27.2%. 15.1%) respectively against those of the married group(3.8%. 1.8%) while a higher proportion of the married group(83. 6%) preferred the day duties than the single group(69.0%). These differences were found to be statistically all significant(p=.001). 9. The findings on preferences of three different types of fixed duty hours namely, B, C. and D(with additional monetary incentives) are as follows in order of preference: B type(12hrs a day, 3days a wk): day shift(64.1%), evening shift(26.1%). night shift(6.5%) C type(12hrs a day. 4days a wk) : evening shift(49.2%). day shift(32.8%), night shift(11.5%) D type(10hrs a day. 4days a wk): showed the similar trend as B type. The findings of higher preferences on the evening and night duties when the incentives are given. as shown above, suggest the need for the introductions of different patterns of duty hours and incentive measures in order to overcome the difficulties in rostering the nursing duties. However, the interpretation of the above data, particularly the C type, needs cautions as the total number of respondents is very small(n=61). It requires further in-depth study. In conclusion. it seemed to suggest that the patterns of nurses duty hours and shifts in the most hospitals in the country have neither been tried for different duty types nor been flexible. The stereotype rostering system of three shifts and insensitiveness for personal life aspect of nurses seemed to be prevailing. This study seems to support that irregular and frequent rotations of duty shifts may be contributing factors for most nurses' maladjustment problems in physical and mental health. personal and family life which eventually may result in high turnover rates. In order to overcome the increasing problems in personnel management of hospital nurses particularly in rostering of evening and night duty shifts, which may related to eventual high turnover rates, the findings of this study strongly suggest the need for an introduction of new rostering systems including fixed duties and appropriate incentive measures for evenings and nights which the most nurses want to avoid, In considering the nursing care of inpatients is the round-the clock business. the practice of the nursing duty shift system is inevitable. In this context, based on the findings of this study. the following are recommended: 1. The further in-depth studies on duty shifts and hours need to be undertaken for the development of appropriate and effective rostering systems for hospital nurses. 2. An introduction of appropriate incentive measures for evening and night duty shifts along with organizational considerations such as the trials for preferred duty time bands, duty hours, and fixed duty shifts should be considered if good quality of care for the patients be maintained for the round the clock. This may require an initiation of systematic research and development activities in the field of hospital nursing administration as a part of permanent system in the hospital. 3. Planned and regular intervals, orientation and training, and professional and personal growth should be considered for the rotation of different duty stations or units. 4. In considering the higher degree of preferences in the duty type of "10hours a day, 4days a week" shown in this study, it would be worthwhile to undertake the R&D type studies in large hospital settings.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

An Application Status and Consideration of System Improvement on the Sea Area Utilization Conference and Impact Assessment (해역이용협의제도 운용 현황 분석 및 실효성 제고방안)

  • Lee, Dae-In;Kim, Gui-Young;Jeon, Kyeong-Am;Eom, Ki-Hyuk;Yu, Jun;Kim, Yeong-Tae;Moon, Ju-Hoon;Kam, Min-Jae
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.4
    • /
    • pp.239-248
    • /
    • 2011
  • This paper evaluated types and characteristics of development projects occurred in coastal area (Public Water) by analyzing an application status of Sea Area Utilization Conference System that effective protect and manage marine environment and ecosystem from various artificial utilization and development enforced in 2008. Also, system improvement for stable settlement and security of efficiency considering exposed problems during system enforcement were diagnosed. The number of Sea Area Utilization Conference (SAUC) performanced during the period of 2009-2010 was 3,705, which consisted of simple SAUC (87.0%), general SAUC (12.8%), and Sea Area Utilization Impact Assessment (SAUIC; 0.2%). The general SAUC was accomplished for Public Water reclamation (43.4%), seawater supply and drainage (17.5%), dredging sediment (5.5%), installation of port facilities (4.6%) and fishing harbor facilities (2.3%), and others (23.4%). Statements of Environmental Impact Assessment (EIA) were reviewed mainly for construction of port facilities (32.9%), followed by construction of industrial complex, development of tourism and leisure complex, road construction, and development of energy facilities. It would be necessary to strengthen effectiveness of the system, advertisement, and capability of conference and review agency, and to enhance confidence of marine EIA continuously, according to the increase of development projects, and diversity and enlargement of development types.