• Title/Summary/Keyword: Security Ethics

Search Result 89, Processing Time 0.02 seconds

Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware (악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발)

  • Park, Jihyeon;Kim, Taeok;Shin, Yulim;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.650-657
    • /
    • 2020
  • The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware and the emergence of malicious code. For this, it is necessary to accurately and quickly detect and classify malware family. In this paper, we analyzed and classified visualization technology, which is a preprocessing technology used for deep learning-based malware classification. The first method is to convert each byte into one pixel of the image to produce a grayscale image. The second method is to convert 2bytes of the binary to create a pair of coordinates. The third method is the method using LSH. We proposed improving the technique of using the entire existing malicious code file for visualization, extracting only the areas where important information is expected to exist and then visualizing it. As a result of experimenting in the method we proposed, it shows that selecting and visualizing important information and then classifying it, rather than containing all the information in malicious code, can produce better learning results.

Ethics for Artificial Intelligence: Focus on the Use of Radiology Images (인공지능 의료윤리: 영상의학 영상데이터 활용 관점의 고찰)

  • Seong Ho Park
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.759-770
    • /
    • 2022
  • The importance of ethics in research and the use of artificial intelligence (AI) is increasingly recognized not only in the field of healthcare but throughout society. This article intends to provide domestic readers with practical points regarding the ethical issues of using radiological images for AI research, focusing on data security and privacy protection and the right to data. Therefore, this article refers to related domestic laws and government policies. Data security and privacy protection is a key ethical principle for AI, in which proper de-identification of data is crucial. Sharing healthcare data to develop AI in a way that minimizes business interests is another ethical point to be highlighted. The need for data sharing makes the data security and privacy protection even more important as data sharing increases the risk of data breach.

Research on the Analysis and Response of Unauthorized Personal Information Collection in Foreign Applications (해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구)

  • Kim, Se-Hwan;Yun, Hyung-Jun;Jung, Da-Hyun;Jang, Seung-Hoon;Han, Cheol-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • The number of foreign applications available in Korea is increasing. Among them, there are many cases where applications having a large number of domestic users collect users' personal information in an unauthorized manner, causing serious problems. Unauthorized collection of personal information conducted through such applications is highly dangerous, because sensitive personal information of users can be used in a malicious way. Further, this is violation of business ethics and may interrupt the creation of the sound information technology ecosystem. This research is purposed to analyze the current status of unauthorized collection of users' personal information by foreign applications available in Korea and to derive countermeasures thereof.

Analysis of information ethics education in the secondary school informatics teacher training programs of several graduate schools of education (교육대학원의 중등 정보교사 양성 과정에서 정보윤리교육 현황 분석)

  • Yang, HyeJi;Ki, JaMee
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.2
    • /
    • pp.23-34
    • /
    • 2017
  • Information ethics, which is closely related to changes that occur in information technology, had been comprised of one unit ever since the curriculum was revised in 2007 from whence 'informatics' was established as the first course, and has remained so even after the curriculum was revised in 2015. The purpose of this study was to analyze the degree of content knowledge required of informatics teachers who will teach information ethics by distinguishing the subject from general ethics, and to grasp the status of information ethics education at graduate schools of education. In order to achieve this, the information ethics questions of the informatics teacher appointment exam from years 2002 to 2015 were analyzed as well as the curriculums of 32 graduate schools of education. The results of the study revealed that, first, questions related to information ethics were included in 10 exams, since the 2004 exam. Second, questions related to dysfunction were mainly addressed from the beginning of administering the exam but since 2010 many items related to copyrights, information security, and various addictions were added. Third, 11(33%) of the 32 graduate schools of education with informatics teacher training provide information ethics courses. This study is meaningful in that it will help to better understand the changes needed to update the information ethics related questions of the informatics teacher appointment exam, and to present a direction for information ethics education at graduate schools of education.

The Effect on Professional Ethic, Organizational Trust and Job Satisfaction among Private Security Guard (민간경비원의 직업윤리의식이 조직신뢰, 직무만족에 미치는 영향)

  • Chung, Hun;Kang, Jin-Hyung
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.7-28
    • /
    • 2013
  • Based on the status of which the research is not active and the analysis is not progressed, the purpose of this study life up pride, value and professional ethic of private security guard. Also, through this research, it offers the effect on professional ethic, organizational trust and job satisfaction. The data collection and survey are taken by the private security business members who work staff member or manager. They are surveyed with convenience sampling that among 500 data, 46 data which are thought to be answered insincerely or lack are excluded, so the total of 454 answered data are included in the final analysis. After coding and input process, the data is analyzed by factor analysis, reliability analysis, correlation analysis and multiple regression analysis using window SPSS 19.0 version. Significance level is 0.05. The conclusion that has been made based on the statistical analysis results are the followings. Professional ethic has a positive impact on organizational trust, job satisfaction. The educational training of the company is connected job satisfaction resultantly. Also the professional ethics education will improve the ability of the individual. Finally, the professional ethics raises a job satisfaction. Also, Organizational trust has a positive impact on job satisfaction. This the while to agree with a research result about the other type of business worker who is researched. In order raising the job satisfaction, the effort for raising a organizational trust is necessary.

  • PDF

A Study on Detection of Malicious Android Apps based on LSTM and Information Gain (LSTM 및 정보이득 기반의 악성 안드로이드 앱 탐지연구)

  • Ahn, Yulim;Hong, Seungah;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.641-649
    • /
    • 2020
  • As the usage of mobile devices extremely increases, malicious mobile apps(applications) that target mobile users are also increasing. It is challenging to detect these malicious apps using traditional malware detection techniques due to intelligence of today's attack mechanisms. Deep learning (DL) is an alternative technique of traditional signature and rule-based anomaly detection techniques and thus have actively been used in numerous recent studies on malware detection. In order to develop DL-based defense mechanisms against intelligent malicious apps, feeding recent datasets into DL models is important. In this paper, we develop a DL-based model for detecting intelligent malicious apps using KU-CISC 2018-Android, the most up-to-date dataset consisting of benign and malicious Android apps. This dataset has hardly been addressed in other studies so far. We extract OPcode sequences from the Android apps and preprocess the OPcode sequences using an N-gram model. We then feed the preprocessed data into LSTM and apply the concept of Information Gain to improve performance of detecting malicious apps. Furthermore, we evaluate our model with numerous scenarios in order to verify the model's design and performance.

A Research on the Development of Information Security Governance Framework (정보보호 거버넌스 프레임워크 개발에 관한 연구)

  • Lee, Seong-Il;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

An empirical study on the relationship of personal optimistic bias and information security awareness and behavior in the activity of information ethics (정보윤리 활동에서 개인의 낙관적 편견과 정보보안 인식 및 정보보안 행위와의 관련성에 관한 실증 연구)

  • Choi, Jong-Geun;Che, Myung-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.538-547
    • /
    • 2016
  • With respect to the factors affecting information security awareness and behavior, the study of the relevance of the concept of optimistic bias is actively used in psychology. In other words, this study examines whether the optimistic bias of individuals affects information security in the field. In this sense, this study attempted to demonstrate the relevance of optimistic bias in information security behavior and awareness. A questionnaire survey was conducted targeting 111 people engaged in domestic private enterprises. The survey results showed that this personalized optimistic bias exists because of empirical factors related to personal security. Optimistic bias affects the security awareness information. The greater the optimistic bias, the lower the awareness and recognition of information security. In other words, optimistic bias affects information security awareness. Reducing the effects of optimistic bias is expected to reduce information security incidents, such as information leakages. However, the variety of information related ethical activities of a company did not have any effect on the information security awareness. Most previous studies have only examined the effect optimistic bias in the field of health. Therefore, this study fills an important gap in research in IT.

A Triple Connected Teaching & Learning Model to Improve the Educational Level of Information and Communication Ethics in Elementary School (초등 정보통신윤리 교육수준 제고를 위한 3중 연계교수학습모형 연구)

  • Lee, Dae-Ho;Cho, Gi-Hwan
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.345-353
    • /
    • 2011
  • Information and communication brings us some degree of convenient but also serious side effects. Especially, information and communication ethics is an important issue for elementary school children who are early stage in moral value. This paper proposes a triple-connected teaching and learning model. which can be applied to the elementary school children. in order to improve the educational level. The model is formed by selecting three discretionary teaching models, and applying independently them into the different classes with linking the contents for each class. A teacher can choose the teaching models based on what he wants to teach. Caring model, Home-Connected model and Simulation model were linked in our experiment. Experiments were conducted in the same condition but different learning models, Then, an educational effect was compared and analyzed in the educational level improvement point of view, between the Triple-connected teaching and learning model and the single teaching and learning model.

  • PDF

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.