• Title/Summary/Keyword: Intentional

Search Result 641, Processing Time 0.021 seconds

Proposal of AI-based Digital Forensic Evidence Collecting System

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.124-129
    • /
    • 2021
  • As the 4th industrial era is in full swing, the public's interest in related technologies such as artificial intelligence, big data, and block chain is increasing. As artificial intelligence technology is used in various industrial fields, the need for research methods incorporating artificial intelligence technology in related fields is also increasing. Evidence collection among digital forensic investigation techniques is a very important procedure in the investigation process that needs to prove a specific person's suspicions. However, there may be cases in which evidence is damaged due to intentional damage to evidence or other physical reasons, and there is a limit to the collection of evidence in this situation. Therefore, this paper we intends to propose an artificial intelligence-based evidence collection system that analyzes numerous image files reported by citizens in real time to visually check the location, user information, and shooting time of the image files. When this system is applied, it is expected that the evidence expected data collected in real time can be actually used as evidence, and it is also expected that the risk area analysis will be possible through big data analysis.

Work-Family Conflict and Counterproductive Behavior of Employees in Workplaces in China: Polynomial Regression and Response Surface Analysis

  • JIANG, Daokui;CHEN, Qian;NING, Lei;LIU, Qian
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.6
    • /
    • pp.95-104
    • /
    • 2022
  • This study investigates the complex mechanism of work-family conflict affecting counterproductive behavior of employees based on resource conservation theory and 417 valid samples by using polynomial regression and response surface analysis. Counterproductive work behavior refers to any intentional behavior of an individual that has potential harm to the legitimate interests of the organization or its stakeholders. Results show that first, work-to-family conflict (WFC) and family-to-work conflict (FWC) had four matching types. Compared with "high WFC-low FWC," "low WFC-high FWC" and "low WFC-low FWC" matching conditions, the employee self-control resource depletion and counterproductive work behavior (CWB) are at their highest under "high WFC-high FWC" congruence matching condition. Second, the joint effect of WFC and FWC has a U-shaped relationship with counterproductive behavior. Compared with the "high WFC-low FWC" match state, the level of CWB in the "low WFC-high FWC" match state is higher. Third, the depletion of self-control resources played a mediating role in the effect of WFC on counterproductive behavior. Fourth, emotional intelligence moderated the relationship between the congruence of WFC and FWC and self-control resource depletion. Emotional intelligence was higher, and the positive relationship between the congruence of WFC and FWC and self-control resource depletion was weaker.

Development of a method for securing the operator's situation awareness from manipulation attacks on NPP process data

  • Lee, Chanyoung;Song, Jae Gu;Lee, Cheol Kwon;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2011-2022
    • /
    • 2022
  • According to the defense-in-depth concept, not only a preventive strategy but also an integrated cyberattack response strategy for NPPs should be established. However, there are limitations in terms of responding to penetrations, and the existing EOPs are insufficient for responding to intentional disruptions. In this study, we focus on manipulative attacks on process data. Based on an analysis of the related attack vectors and possible attack scenarios, we adopt the Kalman filter to detect process anomalies that can be caused by manipulations of process data. To compensate for these manipulations and secure MCR operators' situational awareness, we modify the Kalman filter such that it can filter out the effects of the manipulations adaptively. A case study was conducted using a hardware-in-the-loop system. The results indicated that the developed method can be used to verify whether the displayed safety-related state data are reliable and to implement the required safety response actions.

Secrecy Performance of Multi-Antenna Satellite-Terrestrial Relay Networks with Jamming in the Presence of Spatial Eavesdroppers

  • Wang, Xiaoqi;Hou, Zheng;Zhang, Hanwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3152-3171
    • /
    • 2022
  • This work investigates the physical layer secrecy of a multi-antenna hybrid satellite-terrestrial relay networks (HSTRN) with jamming, in which a satellite aims to make communication with a destination user by means of a relay, along with spatially random eavesdroppers. In order to weaken the signals of eavesdroppers, the conventional relay can also generate intentional interference, besides forwarding the received signal. Shadowed-Rician fading is adopted in satellite link, while Rayleigh fading is adopted in terrestrial link, eavesdropper link and jamming link. The analytical and asymptotic formulas for the system secrecy outage probability (SOP) are characterized. Practical insights on the diversity order of the network are revealed according to the asymptotic behavior of SOP at high signal-to-noise ratio (SNR) regime. Then, analysis of the system throughput is examined to assess the secrecy performance. In the end, numerical simulation results are presented to validate the theoretical analysis and point out: (1) The secrecy performance of the considered network is affected by the channel fading scenario, the system configuration; (2) Decrease of the relay coverage airspace can provide better SOP performance; (3) Jamming from the relay can improve secrecy performance without additional network resources.

Frame Rearrangement Method by Time Information Remarked on Recovered Image (복원된 영상에 표기된 시간 정보에 의한 프레임 재정렬 기법)

  • Kim, Yong Jin;Lee, Jung Hwan;Byun, Jun Seok;Park, Nam In
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1641-1652
    • /
    • 2021
  • To analyze the crime scene, the role of digital evidence such as CCTV and black box is very important. Such digital evidence is often damaged due to device defects or intentional deletion. In this case, the deleted video can be restored by well-known techniques like the frame-based recovery method. Especially, the data such as the video can be generally fragmented and saved in the case of the memory used almost fully. If the fragmented video were recovered in units of images, the sequence of the recovered images may not be continuous. In this paper, we proposed a new video restoration method to match the sequence of recovered images. First, the images are recovered through a frame-based recovery technique. Then, after analyzing the time information marked on the images, the time information was extracted and recognized via optical character recognition (OCR). Finally, the recovered images are rearranged based on the time information obtained by OCR. For performance evaluation, we evaluate the recovery rate of our proposed video restoration method. As a result, it was shown that the recovery rate for the fragmented video was recovered from a minimum of about 47% to a maximum of 98%.

Cyber risk measurement via loss distribution approach and GARCH model

  • Sanghee Kim;Seongjoo Song
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.1
    • /
    • pp.75-94
    • /
    • 2023
  • The growing trend of cyber risk has put forward the importance of cyber risk management. Cyber risk is defined as an accidental or intentional risk related to information and technology assets. Although cyber risk is a subset of operational risk, it is reported to be handled differently from operational risk due to its different features of the loss distribution. In this study, we aim to detect the characteristics of cyber loss and find a suitable model by measuring value at risk (VaR). We use the loss distribution approach (LDA) and the time series model to describe cyber losses of financial and non-financial business sectors, provided in SAS® OpRisk Global Data. Peaks over threshold (POT) method is also incorporated to improve the risk measurement. For the financial sector, the LDA and GARCH model with POT perform better than those without POT, respectively. The same result is obtained for the non-financial sector, although the differences are not significant. We also build a two-dimensional model reflecting the dependence structure between financial and non-financial sectors through a bivariate copula and check the model adequacy through VaR.

Experimental demonstration of uncompressed 4K video transmission over directly modulated distributed feedback laser-based terahertz wireless link

  • Eon-Sang Kim;Sang-Rok Moon;Minkyu Sung;Joon Ki Lee;Seung-Hyun Cho
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.193-202
    • /
    • 2023
  • We demonstrate the transmission of uncompressed 4K videos over the photonics-based terahertz (THz) wireless link using a directly modulated distributed feedback laser diode (DFB-LD). For optical heterodyne mixing and data modulation, a DFB-LD was employed and directly modulated with a 5.94-Gb/s non-return-to-zero signal, which is related to a 6G-serial digital interface standard to support ultra-high-definition video resolution. We derived the optimal frequency of the THz carrier by varying the wavelength difference between DFB-LD output and Tunable LD output in the THz signal transmitter to obtain the best transmission performances of the uncompressed 4K video signals. Furthermore, we exploited the negative laser-to-filter detuning for the adiabatic chirp management of the DFB-LD by the intentional discrepancy between the center wavelength of the optical band-pass filter and the output wavelength of the DFB-LD. With the help of the abovementioned methods, we successfully transmitted uncompressed 4K video signals over the 2.3-m wireless transmission distance without black frames induced by time synchronization error.

Mobilizing Informal Economic Sector to Uphold Urban Institutional Resilience: A Case Study of Rawalpindi, Pakistan

  • RIAZ, Tayyaba;WAHEED, Abdul;ALVI, Shahzad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.397-407
    • /
    • 2022
  • The informal economy is a large part of the urban economy. The informal economy accounts for about half of Pakistan's GDP. This research examined nine different areas of Rawalpindi's Central Business District's business sector (CBD). A survey of 404 respondents from 16 CBD marketplaces enables a comprehensive examination of who works in the informal and formal economic sectors, how much they earn, their goals, perception of their job, and their degree of similarity to the rest of the working population. Furthermore, the statistics illustrate the pro-cyclical connections between the informal economic sector and the formal economy. The Multinomial Logistic Regression (MLR) technique is used for the analysis. The MLR results indicated the informal economic sector holds positive relation with earning members in a family, business expertise, average business sale, and negative relation with education level, satisfaction with government tax policies, household expense, and average investment in the business. From a resilience standpoint, governance is considered an intentional collective action to preserve a stable system condition. Hence, the current study recommends tax reforms and government institution reorganization to mobilize the informal sector and make effective institutional governance.

Comparison of Position and Trend of Disease Burden in Korea and Organization for Economic Cooperation and Development Countries (한국과 경제협력개발기구 국가의 질병부담 위치와 추이 비교)

  • Yun Hwa Jung;Hye Jin Joo;Eun-Cheol Park
    • Health Policy and Management
    • /
    • v.33 no.2
    • /
    • pp.129-140
    • /
    • 2023
  • Background: This study aims to compare the burden of disease in Korea with other Organization for Economic Cooperation and Development (OECD) countries using the OECD health statistics from 1985 to 2020. Methods: We analyzed potential years of life lost (YLL) per 100,000 population using the Positive value for relative comparison (PARC) index, trend test, and average annual percentage change (AAPC) with logistic regression analysis. Results: The relative disease burden was good for many diseases, but the disease burden was severe for a few diseases in Korea. Diseases with a high relative burden of disease in Korea are as follows; intentional self-harm (YLL2020 575.6, AAPCYLL 2.6%; PARC2020 -1.000, AAPCPARC -15.8%), malignant neoplasms of the liver (YLL2020 136.6, AAPCYLL -3.9%; PARC2020 -1.000, AAPCPARC 0.0%), malignant neoplasms of the stomach (YLL2020 9.0, AAPCYLL 3.2%; PARC2020 -0.556, AAPCPARC -22.9%), Parkinson's disease (YLL2020 575.6, AAPCYLL 2.6%; PARC2020 -1.000, AAPCPARC -15.8%). Conclusion: Diseases with a high burden of disease are needed to be prioritized in the planning and execution of healthcare policies that can contribute to the efficient use of healthcare resources.

Diagnosis of Abusive Head Trauma : Neurosurgical Perspective

  • Kwak, Young Ho
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.3
    • /
    • pp.370-379
    • /
    • 2022
  • Abusive head trauma (AHT) is the most severe form of physical abuse in children. Such injury involves traumatic damage to the head and/or spine of infants and young children. The term AHT was introduced to include a wider range of injury mechanisms, such as intentional direct blow, throw, and even penetrating trauma by perpetuator(s). Currently, it is recommended to replace the former term, shaken baby syndrome, which implicates shaking as the only mechanism, with AHT to include diverse clinical and radiological manifestations. The consequences of AHT cause devastating medical, social and financial burdens on families, communities, and victims. The potential harm of AHT to the developing brain and spinal cord of the victims is tremendous. Many studies have reported that the adverse effects of AHT are various and serious, such as blindness, mental retardation, physical limitation of daily activities and even psychological problems. Therefore, appropriate vigilance for the early recognition and diagnosis of AHT is highly recommended to stop and prevent further injuries. The aim of this review is to summarize the relevant evidence concerning the early recognition and diagnosis of AHT. To recognize this severe type of child abuse early, all health care providers maintain a high index of suspicion and vigilance. Such suspicion can be initiated with careful and thorough history taking and physical examinations. Previously developed clinical prediction rules can be helpful for decision-making regarding starting an investigation when considering meaningful findings. Even the combination of biochemical markers may be useful to predict AHT. For a more confirmative evaluation, neuroradiological imaging is required to find AHT-specific findings. Moreover, timely consultation with ophthalmologists is needed to find a very specific finding, retinal hemorrhage.