• Title/Summary/Keyword: Media Security

Search Result 729, Processing Time 0.028 seconds

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

A Study on Computer Crime (컴퓨터 범죄의 현황 및 대책 연구)

  • Lim, Moung-Soon
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.279-298
    • /
    • 2001
  • Computers have produced significant benefits to society. Industrialized countries rely on their continuous availability and integrity, Computers have introduced innovations into the business world, communications media, and scientific community. In additions, as computers have developed, new categoris and methods of perpetrating crime have emerged that employ them.

  • PDF

Impact of Internet Media Reports on the COVID-19 Pandemic in the Population Aged 20-35

  • Stytsyuk, Rita Yurievna;Panova, Alexandra Georgievna;Zenin, Sergey;Kvon, Daniil Andreevich;Gorokhova, Anna Evgenievna;Ulyanishchev, Pavel Viktorovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.39-44
    • /
    • 2022
  • The advent, course, and possible consequences of the COVID-19 pandemic are now the focus of global attention. From whichever side the geopolitical centers of influence might view it, the problem of the coronavirus concerns all world leaders and the representatives of all branches of science, especially physicians, economists, and politicians - virtually the entire population of the planet. The uniqueness of the COVID-19 phenomenon lies in the uncertainty of the problem itself, the peculiarities and specifics of the course of the biological processes in modern conditions, as well as the sharp confrontation of the main political players on the world stage. Based on an analysis of scientific research, the article describes the profile of the emotional concept of "anxiety" in Russian linguoculture. Through monitoring the headlines of Russian media reports in the "COVID-19" section of Google News and Mail News news aggregators dated August 4-6, 2021, the study establishes the quantitative and qualitative characteristics of the alarm-generating news products on coronavirus in the Russian segment of the Internet and interprets the specifics of media information about COVID-19. The level of mass media criticism in Russia is determined through a phone survey. It is concluded that coronavirus reports in online media conceptualize anxiety about the SARS virus and the COVID-19 disease as a complex cognitive structure. The media abuse the trick of "magic numbers" and emotionally expressive words in news headlines, which are perceived by mass information consumers first and typically uncritically.

Use form by age-based of Smart phones and Necessity of Security (스마트 폰의 연령별 이용 형태와 보안의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.89-97
    • /
    • 2015
  • The Smart phone is the mobile phone added to mounted equipment miniaturized operating system of PC and wireless phone possible hardware, software modules. This study is examine about Smart phone supply spreading process and characteristic by age. And this study is wish to investigate about age-based features of the media usage attitude via a Smart phone as a reference questionnaire of KISA and KISDI. Smart phone is easy-to-use and excellent portability and mobility like Pocket PC. It is easy to information and data search anytime and anywhere unaffected by time and place. It is to possible a variety of information exchange with several acquaintances and easy to photos and video photography. Wish to improve the life satisfaction with widely using for smart phones at all ages.

Study on Hashing of CD-R Media from the Viewpoint of Digital Forensics (디지털 포렌식 관점에서 CD-R 미디어의 해쉬 값 생성에 관한 연구)

  • Park, Jung-Heum;Kim, Kwon-Youp;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.167-170
    • /
    • 2008
  • 해쉬 알고리즘은 디지털 포렌식 수사에서 디지털 증거의 무결성을 증명하기 위해 널리 사용되고 있다. 디지털 증거의 무결성은 동일한 데이터에서만 같은 해쉬 값이 계산된다는 성질에 의하여 증명된다. 일반적으로 동일한 데이터에 대한 해쉬 값은 서로 다른 포렌식 툴을 이용해서 계산을 해도 항상 같은 값이 출력될 것이라고 인식하고 있다. 하지만, CD-R 미디어의 경우에는 해쉬를 계산하는 포렌식 툴에 따라 값이 다르다는 특성이 있다. 이것은 해쉬 값이 CD 제작 도구에서 CD-R 미디어에 데이터를 기록하는 방식과 각 포렌식 툴 별로 CD-R 미디어를 인식하는 방식에 의해 영향을 받기 때문이다. 이러한 특성은 CD-R 미디어의 무결성 증명 시에 문제가 될 여지가 있기 때문에 디지털 포렌식 수사 절차에서 반드시 고려되어야 한다. 본 논문에서는 CD-R 미디어의 해쉬 값에 영향을 주는 요소에 대해 기술하고, 실험용 CD-R 미디어를 제작하여 대표적인 디지털 포렌식 도구들을 이용해서 확인한다. 이를 통해, 디지털 포렌식 수사 절차에서 CD-R 미디어에 대한 해쉬 값을 계산할 때 고려해야 할 사항을 제안한다.

  • PDF

A Study on Analysis of Requirements in the Smart Societal Security Wireless Network (스마트 사회안전무선통신망 요구사항 분석에 관한 연구)

  • Choi, Jae-Myeong;Woo, Byung-Hoon;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.518-523
    • /
    • 2014
  • The development of Societal and Scientific technologies have increased risk of dysfunction caused by new technologies such as nuclear power, information technology. Also, urbanization and population density is increasing risk to high-rise building fires, traffic accidents, crime and etc. Implementation of wireless communication network on the societal security is very necessary for prevention, preparation and response against these risks. It always consists maintenance, management and the network must be maintained in an emergency. In this paper, we studied the societal security wireless communication network for prevention, preparation and response against complex disasters, and analyzed requirements(essential function, add-ons) for implementation network in the societal security wireless network.

User Sensitive Data Classification for IoT Gateway Security (사물인터넷 게이트웨이 보안을 위한 사용자 민감 데이터 분류)

  • Heo, Mhanwoo;Park, Kicheol;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.17-24
    • /
    • 2019
  • As IoT technology is widely used in industrial environments, its environmental security issues are becoming more important. In such a context, studies utilizing hardware security functions are being actively carried out. However, previous studies did not consider the performance degradation that occurs when using hardware security functions in IoT environment. Gateway devices that are mainly used in IoT environments are often resource-limited. Utilizing hardware security in such an environment can cause serious performance degradation as the number of IoT devices connected to the gateway increases. Therefore, in this paper, we propose a data classification scheme to efficiently utilize hardware security functions in resource limited environment. We implement a platform with the proposed technique using ARM Trustzone. Performance degradation due to the hardware security functions is measured through experiments on the implemented platform and compared with the performance as of when the proposed technique is applied.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

The Impact of Snapchat and YouTube Influencers on the Consumption Behaviour of Saudi Consumers

  • Al-Ajlan, Monirah;Alsadhan, Afnan;Mirza, Abdulrahman
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.423-430
    • /
    • 2022
  • The emergence of social media platforms has changed the culture of business marketing. Their impact has increased considerably since the emergence of social media influencers or content creators. The phenomenon of social media influencers has been adopted as one of the most effective marketing strategies among global and local organizations. Those celebrities attract business owners, who seek to use them as means to reach a large number of potential consumers. Today, the user bases of Snapchat and YouTube in Saudi Arabia are growing fast and becoming very popular, unlike other social media platforms. Consequently, the impact of these applications' influencers on the purchasing habits of individuals cannot be underestimated. This survey paper intends to investigate the impact of Snapchat and YouTube influencers on the consumption behaviour of Saudi consumers. Results suggest that Snapchat is not only more popular but also more rusted and credible. Moreover, influencers' impact on purchasing behaviour is prevalent and powerful; furthermore, its influence is more effective in persuading Saudi consumers to buy certain products, such as food, than other products, like jewelry.

Monitoring People's Emotions and Symptoms after COVID-19 Vaccine

  • Najwa N. Alshahrani;Sara N. Abduljaleel;Ghidaa A. Alnefaiy;Hanan S. Alshanbari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.202-206
    • /
    • 2023
  • Today, social media has become a vital tool. The world communicates and reaches the news and each other's opinions through social media accounts. Recently, considerable research has been done on analyzing social media due to its rich data content. At the same time, since the beginning of the COVID-19 pandemic, which has afflicted so many around the world, the search for a vaccine has been intense. There have been many studies analyzing people's feelings during a crisis. This study aims to understand people's opinions about available Coronavirus vaccines through a learning model that was developed for this purpose. The dataset was collected using Twitter's streaming Application Programming Interface (API) , then combined with another dataset that had already been collected. The final dataset was cleaned, then analyzed using Python. Polarity and subjectivity functions were used to obtain the results. The results showed that most people had positive opinions toward vaccines in general and toward the Pfizer one. Our study should help governments and decision-makers dispel people's fears and discover new symptoms linked to those listed by the World Health Organization.