• Title/Summary/Keyword: Internet personal broadcasting

Search Result 201, Processing Time 0.021 seconds

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

An Analysis of Various Types of Social Movement Through the New Media -Focusing on the 2008 Candle Rally- (뉴미디어를 활용한 다양한 사회운동방식에 대한 고찰 -2008년 촛불집회를 중심으로-)

  • Lee, Chang-Ho;Bae, Ae-Jin
    • Korean journal of communication and information
    • /
    • v.44
    • /
    • pp.44-75
    • /
    • 2008
  • The candle rally against the import of American beef which lasted for a long time was full of various types of social movement. That is, new media including mobile phone, Internet, Internet cafes played an important role in mobilizing people around the rally. Thus, this research focuses on the meaning and effect of these kinds of movement. In particular, it analyzed the possibility of real time broadcasting through the Internet as civic journalism, which received much attention in the rally. For this, this research used case study and interview as main research method. Case study focused on Internet cafes based on the media coverage of the rally. Interviews were conducted with workers at OhmyTV, Color TV, and 615TV. These workers at progressive media emphasized on the scene coverage as the advantage of real time delivery. Transmitting many citizens' voices was another advantage. It is expected that personal media and progressive media which try to show the scent as it is will play an important role in the future journalism with the expansion of Wibro.

  • PDF

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

A Structural Relationship between Perfectionism, Dance Commitment, Career Decision Self-Efficacy, and Dance Achievement of Middle and High School Students Majoring in Dance

  • Min, Yun-Mi
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.172-180
    • /
    • 2021
  • The purpose of this study is to analyze the structural relationship among perfectionism and dance achievement of middle and high school students majoring in dance. Specifically, this study aims to investigate the effects of perfectionism on dance achievement through the medium of dance commitment and career decision-making self-efficacy. For this purpose, a structural equation model based on the previous studies was constructed with perfectionism as an exogenous variable and dance commitment, career decision-making self-efficacy, and dance achievement as endogenous variables. The final subjects of this study were 279 middle and high school students majoring in dance. The data were processed by frequency analysis to find out personal characteristics using SPSS 23 and exploratory factor analysis and reliability analysis were conducted on the research tools. In addition, AMOS 21 was used for confirmatory factor analysis, correlation analysis and structural equation model analysis. As a result of data processing on the research model. First, the sub-dimensions of perfectionism tendency 'worry about mistakes', 'personal standard', and 'doubt about behavior' had a statistically significant effect on dance commitment. Second, the sub-dimensions of perfectionism 'worry about mistakes', 'personal standard', and 'doubt about behavior' had statistically significant effects on career decision-making self-efficacy. Third, dance commitment did not have a statistically significant effect on dance achievement, but career decision-making self-efficacy had a statistically significant effect on dance achievement. These results provide implications.

The Development of Exercise Accuracy Measurement Algorithm Supporting Personal Training's Exercise Amount Improvement

  • Oh, Seung-Taek;Kim, Hyeong-Seok;Lim, Jae-Hyun
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.57-67
    • /
    • 2022
  • The demand for personal training (PT), through which high exercise effects can be achieved within short-term, has recently increased. PT can achieve an exercise amount improvement effect, only if accurate postures are maintained upon performing PT, and exercise with inaccurate postures can cause injuries. However, research is insufficient on exercise amount comparisons and judging exercise accuracy on PT. This study proposes an exercise accuracy measurement algorithm and compares differences in exercise amounts according to exercise postures through experiments using a respiratory gas analyzer. The exercise accuracy measurement algorithm acquires Euler anglesfrom major body parts operated upon exercise through a motion device, based on which the joint angles are calculated. By comparing the calculated joint angles with each reference angle in each exercise step, the status of exercise accuracy is judged. The calculated results of exercise accuracy on squats, lunges, and push-ups showed 0.02% difference in comparison with actually measured results through a goniometer. As a result of the exercise amount comparison experiment according to accurate posture through a respiratory gas analyzer, the exercise amount was higher by 45.19% on average in accurate postures. Through this, it was confirmed that maintaining accurate postures contributes to exercise amount improvement.

A Study on the Information Effluence State and Measure by Peer-to-Peer Programs in Korea and Japan (P2P프로그램을 통한 한국과 일본의 정보유출 현황 및 대책 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.67-74
    • /
    • 2009
  • Information Effluence leaks are caused by the wide use of the P2P program in Japan and Korea lead by the increase of internet use and network infrastructure expansion. This research confirms the seriousness of the data collected from the P2P leaks of the two countries and furthers its study by researching how countermeasures are applied. The effectiveness is verified by collecting data according to countermeasure applied periods. Both countries had information leaks, but in the case of Japan, not only personal information leaks but corporation, administrative agency, military, and others in a wide range as well. As a countermeasure against information effluence, Korea is enforcing counter plans mainly against the P2P service businesses and for Japan, various plans are taken such as business guides for each agency, organization management, SW development and supply, HW supply, and ect. The leaks in Japan were more severe than the ones in Korea but they had well planned countermeasures that were applied. Therefore if the Japanese countermeasure on information effluence of P2P programs is taken as a lesson, Korea can prevent the problem of leaks beforehand.

  • PDF

Function Analysis for SNS and Shopping Mall Integration (SNS와 쇼핑몰 통합을 위한 기능분석)

  • Gim, Misu;Woo, Wonseok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.239-244
    • /
    • 2015
  • We can build regular relationships with customers by integrating SNS (Social Networking Service) and internet shopping mall functions. For example of direct dealing of agricultural products, consumers can find news of regular sellers (seeding, farming, harvesting and new products) in the timeline at their SNS home. Then, they can purchase the necessary products by one click motion. The sellers provide news and discount information for building regular customers. Besides these SNS personal connection building, our system provides shopping mall functions to consumer's SNS home pages with auto classified catalog of products. Then, consumes easily find necessary products and these purchase may lead to regular relationships with sellers. Consumers may redistribute recommendations and reviews and it enables direct communications between consumers who are unknown to each other.

People Re-identification: A Multidisciplinary Challenge (사람 재식별: 학제간 연구 과제)

  • Cheng, Dong-Seon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.135-139
    • /
    • 2012
  • The wide diffusion of internet and the overall increased reliance on technology for information communication, dissemination and gathering have created an unparalleled mass of data. Sifting through this data is defining and will define in the foreseeable future a big part of contemporary computer science. Within this data, a growing proportion is given by personal information, which represents a unique opportunity to study human activities extensively and live. One important recurring challenge in many disciplines is the problem of people re-identification. In its broadest definition, re-identification is the problem of newly recognizing previously identified people, such as following an unknown person while he walks through many different surveillance cameras in different locations. Our goals is to review how several diverse disciplines define and meet this challenge, from person re-identification in video-surveillance to authorship attribution in text samples to distinguishing users based on their preferences of pictures. We further envision a situation where multidisciplinary solutions might be beneficial.

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

Development of Location Sharing App with Encryption (암호화를 적용한 위치 공유 앱 개발)

  • Do Eun Kim;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.27-32
    • /
    • 2023
  • Location sharing through apps is increasing, such as finding a friend's location or sharing delivery status on the Internet. However, location information is important personal information, and in some cases can be misused for crimes, and so encryption of location information is essential when developing such apps. This paper develops an app that encrypts and shares location information between friends for purposes such as finding friends and deciding meeting locations. To improve encryption performance, the symmetric key was encrypted and transmitted using an asymmetric key, and for location sharing, only the symmetric key was used to encrypt it. The proposed app was developed on iOS, and performance measurements showed that encryption of location information was at least 5,000 times faster when using a symmetric key than when using an asymmetric key.