• Title/Summary/Keyword: Information vulnerable group

Search Result 90, Processing Time 0.026 seconds

The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack (연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석)

  • Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.185-190
    • /
    • 2009
  • As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.

A Study on Analyzing the Impact Factors of Cell Broadcast Service Considering Socially Vulnerable Groups - Focus on Comparative Analysis between the Elderly and the General Population (사회적 취약계층을 고려한 재난방송문자 서비스 영향 요인 분석 - 고령자와 일반인 그룹의 비교분석을 중심으로)

  • Keunoh Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.383-394
    • /
    • 2023
  • Purpose : This study focuses on improvements in cell broadcast service(CBS) with consideration of socially vulnerable groups, and identifies service factors necessary for elderly people in particular. Method : Multiple regression analysis was applied to test overall satisfaction with cell broadcast service as the dependent variable and each of the service factors as the independent variable. Result : The results showed that fast delivery had the greatest effect on overall satisfaction with cell broadcast service in both groups, followed by the delivery of sufficient content for the elderly group and system quality for the non-elderly group. The results demonstrated that the elderly group cared more about information content, while the non-elderly group considered functions such as system quality and text message transmission criteria more important. Conclusion : Elderly people consider the delivery of sufficient information important as well as fast delivery, which suggests that it is necessary when sending cell broadcast service to give consideration to the characteristics of elderly people, as they tend to have weaker understanding and thinking abilities than the non-elderly.

Estimating need for Home Visiting Nurse from Public Health Centers (보건소 방문건강관리사업을 위한 간호사 인력의 적정 수요 추정)

  • Bae, Hyun-Ji;Kim, Jinhyun
    • Perspectives in Nursing Science
    • /
    • v.12 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • Purpose: This study attempted to estimate the need for home visiting nurse at public health centers. Methods: A model was generated to estimate a community's home visiting health service needs in 16 regions and a workload analysis was adopted to estimate the number of required Nurses. Data were collected from 16 public health centers using the South Korean government's open-information systems. Subjects were divided into three groups: vulnerable social group, bottom 10% income group, and bottom 20% income group. Results: The analysis revealed that 2,158 and 6,667 nurses were needed to provide home visiting health service for the bottom 10% and 20% income groups, respectively. It was estimated that for the vulnerable social group, 10,336 nurses were needed to provide home visiting health service, implying that the need-based demand for nurses is well over 5 times the number currently employed. Conclusion: The results indicate that the number of currently employed nurses is insufficient for the health management of vulnerable social groups. The government should consider active employment policies to encourage nurses to apply for home visiting health service.

2014 Korea Working Conditions Survey Data Analysis (2014년 근로환경조사 데이터 분석)

  • Kim, Youngsun;Lee, Jaehee;Baik, Jaiwook
    • Journal of Applied Reliability
    • /
    • v.15 no.3
    • /
    • pp.181-191
    • /
    • 2015
  • Change in labor time is affecting occupational safety and health. Recently reduction in labor time brought innovational operation method, investment in plant and equipment, and flexible labor time in some companies, thereby affecting working conditions for labourers. However, working conditions for some vulnerable social groups have deteriorated. As a result, they are becoming more exposed to risk factors such as injury and emotional stress. In this study we use 2014 KWCS data in order to find the social and demographic characteristics in Korean working conditions. To this end, we use exploratory data analysis approach to find the relationship between some of the important variables in the KWCS data. We also use Press-State-Response model to find which group of people are vulnerable to Press and State. We find that women, people over age 50 and business owners are more vulnerable to Press and State than men, people below age 50 and wage workers.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

An Exploratory Study on the Career Competencies among the Middle-aged Employment Vulnerable Groups (중장년 고용취약계층의 경력역량 탐색 연구)

  • Jiwon Park;Kibum Kwon;Jiyoung Han;Heajung Woo
    • Journal of Practical Engineering Education
    • /
    • v.15 no.2
    • /
    • pp.285-297
    • /
    • 2023
  • This study was conducted to explore the career competencies among the middle-aged employment vulnerable groups and to provide the basis for systematic career development and human resource development for the middle-aged and employment vulnerable groups. Interviews and expert advice for the middle-aged (40-64 years old) employment vulnerable groups were conducted. The main research results as follows. First, middle-aged employment vulnerable groups have different career requirements depending on their characteristics. Second, the career competencies of the middle-aged employment vulnerable group were composed five factors and 21 sub-detailed competencies including career cognitive competencies, career skill competencies, career attitude competencies, career transition competencies, and career resource management competencies. Third, as a result of the priority analysis of Borich and Locus for Focus, career goal setting, career implementation competency, employment and start-up information, job search skills were the top priorities, career identity, digital literacy, job market knowledge, and infrastructure utilization were the second priority.

A Study on the Changes in Digital Perception of Information Vulnerable Class After COVID-19 (코로나이후 정보취약계층의 디지털인식변화에 관한연구)

  • Kim, So-Young;Jung, Jin-Teak
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.531-539
    • /
    • 2021
  • Given the rapid development of information and communication technology (ICT) and the deepening of the information gap phenomenon in the context of the COVID-19 pandemic, researchers and practitioners need to understand the changing perceptions of new phenomena such as COVID-19 information gap on the existing information-vulnerable population. In this study, an empirical analysis was performed with the digital information gap survey data in 2020 to understand the potential impact of COVID-19 on the information gap according to the information-vulnerable class. This study is to verify the effect of information gap, marginalized groups, gender, and major factors of information services (contents, social relations, life services, information production, networking, social participation, non-face-to-face services) on the change in perception of digital information technology after Corona. Hierarchical regression analysis was performed. As a result of the analysis, it was found that the higher the content, social relationship, life service, networking, and digital non-face-to-face service, the higher the change in perception of digital information technology after Corona. Therefore, in light of the evolving phenomenon of COVID-19, it is considered that the government needs to provide education and training to strengthen the capabilities of the information-vulnerable class in order to resolve the digital information gap.

Phthalate Exposure Levels and Related Factors in the Urban Low-Income Group: Focus on a Residential Disadvantaged Community (도시 저소득층의 프탈레이트 노출수준과 관련 요인: 거주 취약집단을 중심으로)

  • Dahee, Han;Jiyun, Kang;Seohui, Han;Su Hyeon, Kim;Hohyun, Jin;Chahun, Kim;Hosub, Im;Ki-Tae, Kim;Yong Min, Cho
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.6
    • /
    • pp.315-323
    • /
    • 2022
  • Background: Socioeconomical disadvantaged communities are more vulnerable to environmental chemical exposure and associated health effects. However, there is limited information on chemical exposure among vulnerable populations in Korea. Objectives: This study investigated chemical exposure among underprivileged populations. We measured urinary metabolites of phthalates in urban disadvantaged communities and investigated their correlations with residential environment factors and relative socioeconomic vulnerability. Methods: Urine samples were collected from 64 residents in a disadvantaged community in Seoul. A total of eight phthalate metabolites were analyzed by liquid chromatography-mass spectroscopy. Analytical method used by the Korean National Environmental Health Survey (KoNEHS) was employed. Covariate variance analysis and general linear regression adjusted with age, sex and smoking were performed. Results: Several phthalate metabolites, namely monomethyl phthalate (MMP), monoethyl phthalate (MEP), mono-(2-ethyl-5-hydroxyhexyl) phthalate (MEHHP), and mono-n-butyl phthalate (MnBP) had higher levels than those reported in the adults of 4th KoNEHS. Notably, the MnBP level was higher in the lower socioeconomic group (geometric mean [GM]=47.3 ㎍/g creatinine) compared to non-recipients (GM=31.9 ㎍/g creatinine) and the national reference level (GM=22.0, 28.2 and 32.2 ㎍/g creatinine for adults, 60's and 70's, respectively.). When age, sex and smoking were adjusted, MEP and MnBP were significantly increased the lower socioeconomic group than non-recipients (p=0.014, p=0.023). The lower socioeconomic group's age of flooring were higher than non-recipients, not statistically significant. Conclusions: These results suggest that a relatively low income and aged flooring could be considered as risk factors for increased levels of phthalate metabolites in socioeconomic vulnerable populations.

A Study on the Low-Floor Bus Route Selection Considering a Residential Distribution and Traffic Characteristics of the Transportation Vulnerable - A Case of Busan - (교통약자의 거주 분포와 통행특성을 고려한 저상버스 노선 선정 - 부산시를 사례로 -)

  • PARK, Ji-Ho;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.161-173
    • /
    • 2015
  • The guarantee of transportation for elderly and handicapped people is increasingly necessary owing to their growing social and economic activity. In March of 2013, a partial amendment to the law for transportation of the vulnerable was made by the government, to make more convenient transport a legal requirement. The amendment describes standards for the installation of transport facilities, and its support available. However, the adjustment of low-floor bus routes is not included. Therefore, low-floor buses are operating without consideration for the handicapped. This study evaluates the current low-floor bus system user experience by considering the residential distribution of vulnerable customers and analyzing their reasons for using public transport. As a result of this work, adjustments to current bus routes are proposed. The residential distribution of vulnerable people has been assessed using the supporting materials of the urban renewal project in Busan City, and their reasons for using public transport have been collected by a survey of the target user groups. The results show that group A, which has good accessibility, was in high demand, but provided the most limited service. Whereas group C, which also has good accessibility but was in low demand, provided its service most frequently. The data show the supply and demand inconsistencies of low-floor buses, and the inefficiency of bus route allocation. Therefore, this study proposes improvements to current methods for the effective operation of low-floor buses.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.