• Title/Summary/Keyword: Key message

Search Result 496, Processing Time 0.033 seconds

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

"There Was No Violence, But...": Study on Coercive Control of Intimate Partner Violence and Reconceptualization of Domestic Violence ("폭력이 있었던 것은 아니지만..." : 친밀한 관계에서의 강압적 통제와 가정폭력 재개념화를 위한 연구)

  • Heo, Min-Sook
    • Issues in Feminism
    • /
    • v.12 no.2
    • /
    • pp.69-103
    • /
    • 2012
  • By reviewing relatively recent theory of coercive control, which considers gender as a key concept to conceptualize domestic violence, this article explores battered women's experiences with police responses and institutional law enforcement. Using data and interviews from Korea Women's Hotline, this article analyzes the effects of state intervention which fails to support battered women and sends a message to the community that domestic violence is not such a serious crime. Specifically, this study found some problematic responses and attitudes of police and legal system: first, police is equating domestic violence with physical attacks or serious harms. Second, police and law enforcement personnel blame victims based on her gender performance or gender roles. Third, by individualizing the problem of domestic violence, state intervention ignores important structural factors that cause and perpetuate it. Finally, police and the justice system disempower and discourage battered women by exacerbating victim's fears and risks. Viewing domestic violence as a liberty crime, this study concludes that enhanced understanding of the nature of domestic violence only can contribute to solving the problem and protecting women's human rights.

The Effect of Corporate SNS Marketing on User Behavior: Focusing on Facebook Fan Page Analytics (기업의 SNS 마케팅 활동이 이용자 행동에 미치는 영향: 페이스북 팬페이지 애널리틱스를 중심으로)

  • Jeon, Hyeong-Jun;Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.75-95
    • /
    • 2020
  • With the growth of social networks, various forms of SNS have emerged. Based on various motivations for use such as interactivity, information exchange, and entertainment, SNS users are also on the fast-growing trend. Facebook is the main SNS channel, and companies have started using Facebook pages as a public relations channel. To this end, in the early stages of operation, companies began to secure a number of fans, and as a result, the number of corporate Facebook fans has recently increased to as many as millions. from a corporate perspective, Facebook is attracting attention because it makes it easier for you to meet the customers you want. Facebook provides an efficient advertising platform based on the numerous data it has. Advertising targeting can be conducted using their demographic characteristics, behavior, or contact information. It is optimized for advertisements that can expose information to a desired target, so that results can be obtained more effectively. it rethink and communicate corporate brand image to customers through contents. The study was conducted through Facebook advertising data, and could be of great help to business people working in the online advertising industry. For this reason, the independent variables used in the research were selected based on the characteristics of the content that the actual business is concerned with. Recently, the company's Facebook page operation goal is to go beyond securing the number of fan pages, branding to promote its brand, and further aiming to communicate with major customers. the main figures for this assessment are Facebook's 'OK', 'Attachment', 'Share', and 'Number of Click' which are the dependent variables of this study. in order to measure the outcome of the target, the consumer's response is set as a key measurable key performance indicator (KPI), and a strategy is set and executed to achieve this. Here, KPI uses Facebook's ad numbers 'reach', 'exposure', 'like', 'share', 'comment', 'clicks', and 'CPC' depending on the situation. in order to achieve the corresponding figures, the consideration of content production must be prior, and in this study, the independent variables were organized by dividing into three considerations for content production into three. The effects of content material, content structure, and message styles on Facebook's user behavior were analyzed using regression analysis. Content materials are related to the content's difficulty, company relevance, and daily involvement. According to existing research, it was very important how the content would attract users' interest. Content could be divided into informative content and interesting content. Informational content is content related to the brand, and information exchange with users is important. Interesting content is defined as posts that are not related to brands related to interesting movies or anecdotes. Based on this, this study started with the assumption that the difficulty, company relevance, and daily involvement have an effect on the dependent variable. In addition, previous studies have found that content types affect Facebook user activity. I think it depends on the combination of photos and text used in the content. Based on this study, the actual photos were used and the hashtag and independent variables were also examined. Finally, we focused on the advertising message. In the previous studies, the effect of advertising messages on users was different depending on whether they were narrative or non-narrative, and furthermore, the influence on message intimacy was different. In this study, we conducted research on the behavior that Facebook users' behavior would be different depending on the language and formality. For dependent variables, 'OK' and 'Full Click Count' are set by every user's action on the content. In this study, we defined each independent variable in the existing study literature and analyzed the effect on the dependent variable, and found that 'good' factors such as 'self association', 'actual use', and 'hidden' are important. Could. Material difficulties', 'actual participation' and 'large scale * difficulties'. In addition, variables such as 'Self Connect', 'Actual Engagement' and 'Sexual Sexual Attention' have been shown to have a significant impact on 'Full Click'. It is expected that through research results, it is possible to contribute to the operation and production strategy of company Facebook operators and content creators by presenting a content strategy optimized for the purpose of the content. In this study, we defined each independent variable in the existing research literature and analyzed its effect on the dependent variable, and we could see that factors on 'good' were significant such as 'self-association', 'reality use', 'concernal material difficulty', 'real-life involvement' and 'massive*difficulty'. In addition, variables such as 'self-connection', 'real-life involvement' and 'formative*attention' were shown to have significant effects for 'full-click'. Through the research results, it is expected that by presenting an optimized content strategy for content purposes, it can contribute to the operation and production strategy of corporate Facebook operators and content producers.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

Case Study on the Distribution of Disaster Risk Information in China (중국의 재난위험 정보유통에 관한 사례 연구)

  • Choi, Choong-Ik;Li, Cheng
    • Journal of Distribution Science
    • /
    • v.14 no.4
    • /
    • pp.55-66
    • /
    • 2016
  • Purpose - This article aims to explore the characteristics of disaster risk distribution information in China. Also, this research attempts to analyze the findings of risk communication using case study in chronological order in terms of social amplification of risk. To achieve the purpose, the paper reviews the trends and issues of risk communication in China, with an emphasis on examining earthquakes by a chronological approach. In these regards, we hope that some relevant findings from this empirical study with cases will be able to enhance national risk communication and provide implications in Korea as well. Research design, data, and methodology - The conceptual framework of this study is theoretically based on the risk amplification model, which describes signals about risk transmitted and processed by individuals and social groups. The social amplification of risk also reflects the interactions of social groups about disaster-related risk issues, which are potential amplifiers or attenuators of communication signals. The key concept of social amplification implies that the risks pertaining to natural disasters interact with social, psychological, institutional, and cultural processes in ways that can affect public perceptions of risk. SMCRE Model is methodologically employed to examine risk communication history of China with the focus on natural disaster. Four earthquakes are selected to figure out the chronological characteristics of risk communication since 1970s. He bei Tang Shan earthquake is selected as an example disaster before 1990's, while the earthquake in Yun Nan Jiang is explored for the case study of 1990's. The earthquake in Si Chuan Wen Chuan is also examined as a example disaster of 2000's. The recent earthquake in Si Chuan Ya An Lu Shan is selected as a case of 2010s. Results - SMCRE model in this case study is operationally defined as a methodology and applied to the four earthquakes occurred in China. SMCRE model describes the exchange of risk information and is also applied to all forms of communication between stake holders. Each factor of risk communication includes source, message, channel, receiver and effect. It is notable that a big progress has been made on disaster risk communication in China for the past 40 years. We also found that highly developed information technology has enabled Chinese society to better cope with natural disaster, leading to enhanced disaster risk communication. It is mainly found from case study that the disaster risk communication of China has been involved with political situation, which derived from the change of government for the past 40 years. Conclusion - From this historical research, it can be inferred that the policies and politics of Chinese leaders have had a more critical role to play in the process of source of risk communication than those of any other countries. The results of this paper also support that the effective risk communication involves not only the improved reliability of local government as a key factor of disaster risk communication, but also is accompanied by international cooperation for substantial collaboration with stake holders.

Analysis of Twitter Post with 'Self-Iinjury' and 'Ssuicide' Using Text Mining (텍스트 마이닝기법을 활용한 '자해' 및 '자살' 관련 트위터 게시물 분석)

  • Yuri Lee;Hoin Kwon
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.1
    • /
    • pp.147-170
    • /
    • 2023
  • This study explored keywords and key topics by collecting posts related to 'self-Iinjury' and 'suicide' through Twitter. The study subjects were selected as posts containing related hashtags related to self-injury and suicide from October 29, 2019 to November 30, 2020. Text mining based on collected posts resulted in a total of 11 key topics: -6 related to 'self-Iinjury' and 5 related to 'suicide'. The main message in the topic is as follows. First, looking at the main messages contained in the topic, they honestly expressed self-harm and suicide experiences that are difficult to express offline online, and used SNS as a channelpath for requesting help requests. Second, there were common and discriminatory characteristics in posts related to 'self-Iinjury' and 'suicide'. Although topics related to 'self-Iinjury' mainly revealed emotional control and interpersonal functions of self-harm, messages related to 'suicide' showed more clearly messages about suicide prevention addressing and social problems. These results are meaningful in that they can understand the opinions of people who have experienced self-harm and suicide accidents and the public voice on self-harm and suicide-related issues could be better understood, and that this study seeks for effective self-harm and suicide prevention and intervention measures for self-harm and suicide issues.

A 2kβ Algorithm for Euler function 𝜙(n) Decryption of RSA (RSA의 오일러 함수 𝜙(n) 해독 2kβ 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.71-76
    • /
    • 2014
  • There is to be virtually impossible to solve the very large digits of prime number p and q from composite number n=pq using integer factorization in typical public-key cryptosystems, RSA. When the public key e and the composite number n are known but the private key d remains unknown in an asymmetric-key RSA, message decryption is carried out by first obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and then using a reverse function of $d=e^{-1}(mod{\phi}(n))$. Integer factorization from n to p,q is most widely used to produce ${\phi}(n)$, which has been regarded as mathematically hard. Among various integer factorization methods, the most popularly used is the congruence of squares of $a^2{\equiv}b^2(mod\;n)$, a=(p+q)/2,b=(q-p)/2 which is more commonly used then n/p=q trial division. Despite the availability of a number of congruence of scares methods, however, many of the RSA numbers remain unfactorable. This paper thus proposes an algorithm that directly and immediately obtains ${\phi}(n)$. The proposed algorithm computes $2^k{\beta}_j{\equiv}2^i(mod\;n)$, $0{\leq}i{\leq}{\gamma}-1$, $k=1,2,{\ldots}$ or $2^k{\beta}_j=2{\beta}_j$ for $2^j{\equiv}{\beta}_j(mod\;n)$, $2^{{\gamma}-1}$ < n < $2^{\gamma}$, $j={\gamma}-1,{\gamma},{\gamma}+1$ to obtain the solution. It has been found to be capable of finding an arbitrarily located ${\phi}(n)$ in a range of $n-10{\lfloor}{\sqrt{n}}{\rfloor}$ < ${\phi}(n){\leq}n-2{\lfloor}{\sqrt{n}}{\rfloor}$ much more efficiently than conventional algorithms.

An Influence of the Source Information of Word Mouth on the Sales of Educational Service (구전의 정보원천이 교육서비스 판매에 미치는 영향)

  • Kang, Gye-Young;Song, In-Am;Hwang, Hee-Joong
    • Journal of Distribution Science
    • /
    • v.9 no.2
    • /
    • pp.73-81
    • /
    • 2011
  • This study is designed to examine the effects of information source effects of the word mouth have on the formed expectations for the private institution and to explore the formed expectations' effects on the actual sales of the educational service. Moreover, its purpose is in analyzing what medication effects the pre-conceived expectation has on selecting the educational service. After testing hypothesis, the results showed that the source effects of the information from word of mouth had a significant effect on the expectation factors, in terms of expertise, similarity, likability and familiarity expectation factors. However, it was found that effect was not significant for the truthfulness. The significant result was found on the expectation factors before visiting the private institution on selecting educational service, indicating a positive effect. As for the influence of source of the word of mouth information on selecting educational service, the results from the mediation effects of the expectation factors on selecting the educational service showed that for expectation factors, expertise had the partial mediation effect, truthfulness, perfect mediating effect, similarity, partial mediation effect, likability, perfect mediating effect, and familiarity, perfect mediating effect. A test of the mediating role of attribute expectations in the influence of WOM message source attributes on educational services choices showed the following: 1) It was proven that attribute expectations played a partial mediating role in the influence of expertise and similarity, respectively, on educational services choices. 2) On the influence of trustworthiness, likability, and familiarity on educational services choices, respectively, attribute expectations had a full mediation effect. This research differs from the previous ones, which focused only on consumer satisfaction with educational services offered by private educational institutions in that it covers not only the influences of both WOM source attributes and key component factors of educational services on both educational services choices and satisfaction with such services but also the influence of WOM source attributes on attribute expectations prior to the first visit to a particular private educational institutions, and in turn the influence of such attribute expectations on educational services choices. Most particularly, the significance of this study lies in the fact that in an effort to more clearly explain the causal relationship between WOM source effects and educational services choices a test of the mediating role of attribute expectations was conducted. Although the research seems simple, some theoretical implications can be drawn as follows: WOM message source effects on educational services choices were positive and moreover these positive impacts are likely to be reinforced by means of the mediating variable of attribute expectations.

  • PDF

The Effect of Brand Storytelling in Brand Reputation (브랜드명성수준에 따른 브랜드 스토리텔링의 효과)

  • Choi, Soow-A;Jung, Hyo-Sun;Hwang, Yoon-Yong
    • Journal of Distribution Science
    • /
    • v.12 no.4
    • /
    • pp.55-63
    • /
    • 2014
  • Purpose - Brands and products often play key roles in enabling consumers to experience a good attitude, resulting in mentally enacting a specific prototype and reliving the experience by retelling a specific story. Brand storytelling can function as an important tool for managing the brand. To successfully apply a firm's brand storytelling, it is important to prove the effectiveness of storytelling. Therefore, by utilizing the research of Escalas (1998) and Fog et al. (2005), a list of measurements for storytelling component quality (SCQ) was applied. In addition, customer attitudes toward brand storytelling were tested. In particular, if customers encounter a dynamic and interesting story, although the brand is not widely known, they can be in communion with the brand and establish an emotional connection (Hill, 2003). Thus, brand reputation was divided into two levels (high vs. low), and the difference in effectiveness between storytelling component quality and consumers' advertisement attitude, brand attitude, and purchasing intention was examined. Research design, data, and methodology - By using the measurement list used in Choi, Na, and Hwang (2013), 12 categories in the level of message quality, conflict quality, character quality, and plot quality were measured. In addition, categories of brand reputation, advertisement attitude, brand attitude, and purchasing intention were measured. The study was based on 181 final survey samples targeting undergraduate and graduate students in Gwangju Metropolitan City. Results - Consumer responses toward storytelling were researched in the context of brand characteristics or product attributes, such as brand reputation, differentiated from extant simple effects of storytelling. Some brands with high reputation enjoy a halo effect due to prior learning, while other brands with comparatively low reputation have trouble generating positive responses despite attempts to enhance the level of reputation or induce favorable attitudes. Although not all due to the component quality of storytelling, the case of brands with low reputation exerted more positive impact on consumer attitudes than did brands with high reputation. As mentioned earlier, consumer evaluation of the component quality of storytelling was categorized into advertising attitudes, brand attitudes, and purchase intention for this study; this provides managerial implications in other ways. The results imply that an effective application of storytelling could be an important emotional tool for the development of both brands with low brand awareness and of well-known brands. Finally, this study serves to increase consumers' understanding and ability in interpreting brand stories that marketers tell about themselves, as well as to highlight differential experiences with products by level of brand hierarchy. Conclusions - This research aimed to provide an objective guideline for storytelling component quality while considering brand awareness. Thus, brand reputation was considered for proving the baseline effectiveness of storytelling, and this study provided directions for strategic establishment of storytelling. Based on this, we conclude that in further studies, it will be necessary to systematically manage brand story by considering other situation variables and various story patterns, and studying their differences.

Broadcast Encryption System Using Secret Sharing and Subset Difference Methods (비밀분산 기법과 Subset Difference 기법을 이용한 브로드캐스트 암호시스템)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.20 no.1
    • /
    • pp.92-109
    • /
    • 2015
  • Broadcast encryption is a cryptographic primitive that allows a sender to securely broadcast a message to a set of receivers. The most influential broadcast encryption system was proposed in 2001 by Naor, Naor, Lotspiech, based on a pseudo-random generator and the Subset Difference (SD) method. In this paper, we suggest a new broadcast encryption system that is based on secret sharing and SD methods. On an efficiency aspect, our system achieves O(r) transmission cost, O($log^2n$) storage cost, and O(1) computational cost for the number n of users and the number r of revoked users. Compared to O(log n) computational cost in the previous SD method, our system has the advantage that it needs only constant-sized computational cost for decryption, regardless of the number n or r. On a security aspect, our system can achieve tighter security reduction than the previous SD method and the gap of security loss is about O(n log n). Moreover, our result shows that it is possible to give the effect of the SD method while using an information-theoretically secure key distribution technique as in the Complete Subtree method.