• Title/Summary/Keyword: Personal Key

Search Result 606, Processing Time 0.026 seconds

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Personal Credit Evaluation System through Telephone Voice Analysis: By Support Vector Machine

  • Park, Hyungwoo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.63-72
    • /
    • 2018
  • The human voice is one of the easiest methods for the information transmission between human beings. The characteristics of voice can vary from person to person and include the speed of speech, the form and function of the vocal organ, the pitch tone, speech habits, and gender. The human voice is a key element of human communication. In the days of the Fourth Industrial Revolution, voices are also a major means of communication between humans and humans, between humans and machines, machines and machines. And for that reason, people are trying to communicate their intentions to others clearly. And in the process, it contains various additional information along with the linguistic information. The Information such as emotional status, health status, part of trust, presence of a lie, change due to drinking, etc. These linguistic and non-linguistic information can be used as a device for evaluating the individual's credit worthiness by appearing in various parameters through voice analysis. Especially, it can be obtained by analyzing the relationship between the characteristics of the fundamental frequency(basic tonality) of the vocal cords, and the characteristics of the resonance frequency of the vocal track.In the previous research, the necessity of various methods of credit evaluation and the characteristic change of the voice according to the change of credit status were studied. In this study, we propose a personal credit discriminator by machine learning through parameters extracted through voice.

An Analysis of the Determinants of the Bolsonaro Administration's Pro-U.S. and Anti-China Diplomacy: Focusing on Political Leader's Personal Characteristics (브라질 보우소나루 정부의 친미·반중 외교노선 결정요인 분석: 정치지도자의 개인적 특성을 중심으로)

  • Jung, Ho-Yoon
    • Iberoamérica
    • /
    • v.23 no.2
    • /
    • pp.93-134
    • /
    • 2021
  • With the inauguration of the Bolsonaro administration in 2019, Brazil experienced a noticeable transformation in its policy lines at home and abroad. Limiting this change to diplomacy, it can be pointed out that pro-U.S. and anti-China diplomacy, which is clearly distinguished from the previous regimes, has begun in earnest. Nevertheless, the existing literature on this topic is limited, and it is mainly poetic reporting through the media. This paper aims to derive the main determinant of Bolsonaru's pro-U.S. and anti-China diplomatic lines by postulating the individual level of the political leader as a key variable. This study argues that his personal experience and beliefs and world views formed by his life history, and Bolsonaro's political calculation that would strengthen his domestic political support through linking between his domestic politics and diplomatic lines, ultimately influenced the dependent variable. This study is thought to be meaningful in that it enhanced the theoretical implications of not only the theory of foreign policy determinants but also the understanding of Brazil's foreign policy by explaining the factors of Brazil's pro-U.S. and anti-China diplomacy through focusing on an individual level.

Concept Mapping Analyzing on Counselors' Vicarious Trauma Experience from Working with Victims of Sexual Violence (성폭력 상담자 대리외상 경험에 대한 개념도 연구)

  • Heo, Chan-hee;Lee, Jee-yon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.457-471
    • /
    • 2020
  • The purpose of this study is to explore the in-depth content of vicarious trauma experience of sexual violence counselors and to develop intervention strategy. To this end, depth interviews were conducted with twelve sexual violence counselors working at the sexual violence counseling site for more than three years. In addition, using the concept mapping method, the content exploration of the experience of vicarious trauma of sexual violence counselors was confirmed, and its conceptual structure was identified. As a result, 60 key sentences regarding the experience of vicarious trauma of sexual violence counselors were extracted. Then, multi-dimensional scale and cluster analysis were conducted after making nineteen appraisal participants who are under the same condition as depth interview participants to categorize and assess key sentences. As a result of analysis, the x-axis of negative perception, psychological and emotional dimension, and the y-axis of personal inner and behavioral dimension appeared, and five clusters emerged: immersion and skepticism about work, experience of emotional assimilation, hypersensitivity to sex, increased vigilance against men, and threat of safety. This provided basic data that could categorize and identify the contents of vicarious trauma of sexual violence counselors experience by sexual violence counselors.

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

The Plans for Core Personnel Management to Prevent Industrial Technology Leakage (산업기술 유출방지를 위한 핵심인력 관리방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.109-130
    • /
    • 2010
  • As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.

  • PDF

A Study on the Factors to Increase the Usage of e-Learning Systems in Class-based Education: Social, Technological, and Personal Factors (대학의 교실수업에서 이러닝시스템 이용의 활성화에 관한 연구: 사회적, 기술적, 개인적 특성)

  • Choi, Su-Jeong
    • The Journal of Information Systems
    • /
    • v.17 no.4
    • /
    • pp.233-260
    • /
    • 2008
  • Universities have recognized e-Learning Systems as the critical IT resources which contribute to improving the competitiveness of the universities as well as the quality of the traditional class-based lectures. Instructors deliver the main contents in the class. Other supplementary activities like online discussions, sharing of teaching-learning materials, submission of homeworks, communication among the learners and between the instructors and the learners, and so on can be efficiently facilitated using e-Learning Systems. In other words, e-Learning Systems enable a blended learning combined class-based lectures and e-learning in a variety of ways. Nonetheless, compared to the level of implementation of e-Learning Systems, the usage of both the instructors and the learners is not high. Accordingly, this study examines the determinants to affect on the usage of e-Learning Systems from the learners perspective. To draw the key determinants, we review the IS literatures related to adoption or use of the IS like Media Richness Theory (MRT), Technology Acceptance Model (TAM), Social Influence Model (SIM), and Self-efficacy Model. The variables are drawn out to be expected on the usage of e-Learning like Media Richness, Ease of Use from MRT, TAM and Instructor's Influence, Co-learner's Influence from SIM, and Self-efficacy. To test our model and hypotheses, we have collected data in the class-based lectures using e-Learning System complementary. The results of the test with 192 data are as follows: Firstly, it shows that the Instructor's Influence and the Media Richness are the influential determinants to affect on the Perception of Usefulness of e-Learning Systems. Additionally, the Co-learner's Influence and Ease of Use in order is significant to the Perception of Usefulness. Secondly, as to the degree of use of the e-Learning Systems, the Co-leaner's Influence, the Media Richness, and the Ease of Use are, in that order, the significant determinants. The Perception of Usefulness, also, founded a key factor on increasing the use of e-Learning Systems. On the other hand, the Instructor's Influence is not significant to the use of e-Learning Systems. Finally, it has been found that Self-efficacy is significant to the Perception of Media Richness, Ease of Use, but not significant to the Perception of Usefulness.

A Study on Magnetic Cure System Depending on Dominant Direction of Meridian using Yangdorak Diagnosis Machine with 24 Channels (24채널의 양도락진단기를 이용한 경락의 우세방향에 따른 자기치료시스템에 관한 연구)

  • Kim, Byoung-Hwa;Lee, Woo-Cheol;Han, Gueon-Sang;Sagong, Seok-Jin;Ahn, Hyun-Sik;Kim, Do-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.34-43
    • /
    • 2002
  • In this paper, with the reference of the pulse wave acquired by the pulse-checking device, it is measured the impedance on the key measuring points of the 12 kyungmaks of the human body's left and right by using 24-channels Yangdorak machine. Then, based on the Fuzzy theory, this study diagnosed the each meridian's strength and weakness. After that, both the strengthening and weakening stimulus of magnetic fields are applied to the dominant direction to find out how the degree of strength and weakness of the meridian changed. Ultimately, the magnetic therapy that can stimulate the magnetic field at the time of diagnosis and thereby balancing the interactive of five-system(O-hang) have been materialized. For the stimulation of magnetic fields, a stimulating device which can change the direction and time on a specific part of the key measuring points of the limbs of 24 kyungmaks have been developed and used. The therapeutic methods are as follows. First, the strength and weakness of the meridian have been determined. Second, both the extremely weak meridian of Yin(Shade) and Yang(Shine), and the extremely strong meridian of Yin and Yang were adjusted by applying appropriate ascending and descending stimuli respectively. All these adjusting processes can now be carried out automatically on a personal computer(PC). 

Experiences of Korean Homestay Guardians of Early Study Abroad Students in the U.S. (미국 한인 조기유학생 홈스테이 가디언의 경험)

  • Kim, Hyun-Joo
    • Korean Journal of Comparative Education
    • /
    • v.24 no.3
    • /
    • pp.199-226
    • /
    • 2014
  • The aim of this study was to determine key experiences of homestay guardians of unaccompanied minor Korean adolescents studying abroad in the United States through qualitative research method of grounded theory methodology. This study identified guardianship experiences and the process of adjustment to life with homestay students through in-depth interviews with 12 subjects who are Korean guardians in the United States. The results of this study classified "started with concern" as a category that leads guardians to start providing homestay accommodation, and "other's recommendation," "need for financial support," and "unexpectedly" as subcategories. This study identified "act as a mediator to resolve differences" as a key experience of guardians, and classified subcategories are "parental role" and "calculation of gains and losses" on a personal level; and "feel sorry for own children," "limited leeway of the family," and "formation of relationship between own children and homestay students" on a family level. Developed subcategories are "thirsty for attention," "vulnerability," "task on freedom and control," and "regrettable feeling in the absence of communication" with respect to relationship with students; "grade expectations," "one-way communication," "trapped between parents' and students' demands" in regard to relationship with parents; and "advice from school" in the aspect of school. "Cultural difference," "preparedness of students and parents," "age differences between guardian's children and students," "family support," "similar personalities," "guardian's motivation," and "parent's attitude" are subcategories that affect central phenomenon of guardians.