• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.033 seconds

A study of the educational effects in SNS-utilized instruction (소셜 네트워크 서비스 활용 수업에서의 교육적 효과 고찰)

  • Kwon, Myung-Soon;Kan, Jin-Sook;Kim, Jin-Whan
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.135-146
    • /
    • 2014
  • The study has compared the effects in SNS-utilized instruction that each of self centric activities and social interaction added social activities affected self initiative, attitudes and self efficacy to information technology respectively. The research methods utilized the pre experimental design as nonequivalent experimental group. The data was analyzed by paired t-test and content analysis. The results showed that the SNS class utilized self-centric activities were effective in self-initiative and attitudes toward information technology, while social interaction added social activities were effective in not only self-initiative and the attitudes of information technology but also self efficacy of information technology. And content analysis of the effects of the education showed that information sharing, instancy and accessibility were advantageous but information security and privacy issues were problematic. That is, it was confirmed that when self-centric activities and social interaction activities were practised simultaneously in SNS-utilized instruction, the self initiative which learners planed and executed by themselves, the attitudes and self efficacy of information technology which were able to enhance learning ability and to show satisfaction to individual learning were improved.

  • PDF

Risk Assessment with the Development of CAES (Compressed Air Energy Storage) Underground Storage Cavern (CAES(Compresses Air Energy Storage) 지하 저장 공동 개발에 따른 리스크 사정)

  • Yoon, Yong-Kyun;Seo, Saem-Mul;Choi, Byung-Hee
    • Tunnel and Underground Space
    • /
    • v.23 no.4
    • /
    • pp.319-325
    • /
    • 2013
  • The objective of this study is to assess risks which might occur in connection with the storage of the highly compressed air in underground opening. Risk factors were selected throughout literature survey and analysis for the characteristic of CAES. Large risk factors were categorized in three components; planning and design phase, construction phase, and operation & maintenance phases. Large category was composed of 8 medium risk groups and 24 sub-risks. AHP technique was applied in order to analyze the questionnaires answered by experts and high-risk factors were selected by evaluating the relative importance of risks. AHP analysis showed that the operation & maintenance phases are the highest risk group among three components of large category and the highest risk group of eight medium risk groups is risk associated with the quality and safety. Risk having the highest risk level in 24 sub-risks is evaluated to be a failure of tightness security of inner containment storing compressed air.

Design of VHF Band Meander Sleeve Monopole Antenna for Satellite Communications (위성통신용 VHF대역 미앤더 슬리브 모노폴 안테나 설계)

  • Lee, Yun-Min;Shin, Jin-Seob
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we proposed a meander sleeve monopole antenna for low earth orbit satellite communications. The antenna has broadband property with the planar monopole and ground of meander sleeve. Monopole and ground conductors of the antenna are on the same plane, and exited through coaxial cable feeding. In order to confirm the property of antenna parameters, it was used a commercial software, HFSS, For the antenna fabrication, a FR4 dielectric substrate has a dielectric constant of 4.4 was used. The size of the antenna was $600mm{\times}20mm{\times}1.6mm$. Frequency band of the fabricated antenna was 130MHz~151MHz, and the bandwidth was 20MHz. Measurement results of the fabricated antenna, the return loss is more than -10dB return loss in the band could be obtained. Radiation pattern has a maximum gain of 2.64dBi value.

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

Design of Low-Complexity 128-Bit AES-CCM* IP for IEEE 802.15.4-Compatible WPAN Devices (IEEE 802.15.4 호환 WPAN 기기를 위한 낮은 복잡도를 갖는128-bit AES-CCM* IP 설계)

  • Choi, Injun;Lee, Jong-Yeol;Kim, Ji-Hoon
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2015
  • Recently, as WPAN (Wireless Personal Area Network) becomes the necessary feature in IoT (Internet of Things) devices, the importance of data security also hugely increases. In this paper, we present the low-complexity 128-bit AES-$CCM^*$ hardware IP for IEEE 802.15.4 standard. For low-cost and low-power implementation which is essentially required in IoT devices, we propose two optimization methods. First, the folded AES(Advanced Encryption Standard) processing core with 8-bit datapath is presented where composite field arithmetic is adopted for reduced hardware complexity. In addition, to support $CCM^*$ mode defined in IEEE 802.15.4, we propose the mode-toggling architecture which requires less hardware resources and processing time. With the proposed methods, the gate count of the proposed AES-$CCM^*$ IP can be lowered up to 57% compared to the conventional architecture.

Cathodic Protection of Buried Gas Pipelines Using Common Anode Beds (공용양극을 이용한 가스배관의 전기방식)

  • Ha, Y.C.;Kim, D.K.;Bae, J.H.;Ha, T.H.;Lee, H.G.
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.1
    • /
    • pp.19-24
    • /
    • 2008
  • Due to industrialization and urbanization, underground metallic utilities with different owners have been rapidly increased and cathodic protection (CP) methods, especially impressed current CP systems, have been widely adopted to protect their utilities from corrosion with expanded recognition of this method. The stray current interference problem as well as the difficulty in spatial security for system installation, however, came to a ramification of which each owner couldn't resolve for himself. In this respect, this paper illustrates a field-diagnosed example for mutual interference due to separately operated CP systems and suggests an alternative method to overcome the interference situation by design and field-assessment of a common anode bed cathodic protection system.

  • PDF

Design and Implementation of Wireless Multicommunication Circuit Based On USN (USN 기반의 무선 멀티 커뮤니케이션 회로 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.33-42
    • /
    • 2011
  • In this paper we designed and implemented a wireless communication circuit which can control the remote devices integrating RFID and ZigBee. This system unifies transmit part and receive part. And this system recognizes RFID tag data, then the recognized information is controlled by MCU, and transmitted to a remote device through the ZigBee. This is operated on TinyOS. If this system is applied to a entrance security system, it can permit/deny one's entrance as well as control the personal computer or other electronic devices. Our experiment shows the result of the recognized data transmission is very different according to a opened playground and a closed place. The data transmission time is stable in the indoor and the data transmission distance is long in the outdoor. We anticipate that our system be applied the various office oriented domains by connecting to the Wired LAN or the WLAN of IEEE 802.11x category.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

Effects of National Pride and National Attachment on Consumer Ethnocentrism (국가 자부심, 국가 애착이 소비자 자민족주의에 미치는 영향)

  • Choy, Jung-Hyuck;Choi, Soon-Hwa
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.89-97
    • /
    • 2016
  • Purpose - In the major global markets, such as US and China, consumer ethnocentrism has been strengtened and there is a growing need for related study. This research aims to investigate the effects of national pride and national attachment on consumer ethnocentrism, using a nationally representative dataset from 2013 Korean General Social Survey. Based on the reviews of literature in social and political sciences, two dimensions of national pride were considered: national society pride which is based on positive evaluations on the nation's democracy condition or social security system, and national achievement pride which is based on positive evaluations regarding the country's achievements in the areas of technology, art, sports, and so on. Research design, data, and methodology - The authors developed a structural model in which two types of national pride, national society and achievement pride, are proposed to affect national attachment, thus influencing consumer ethnocentrism. 1,294 surveys were used for empirical analysis. The hypotheses were tested by utilizing SPSS 22.0 and AMOS 21.0. The unidimensionality of each construct and the nomological validity were supported from the results of factor analyses and correlation analysis. Results - It was found that both national society pride and national achievement pride have significant and positive effects on national attachment. Consumers who show stronger pride on the social systems or the global achievements of Korea are more likely to remain being a citizen of the country and support the country even in wrong. Also, there was a significant and positive relationship between national attachment and consumer ethnocentrism. Korean consumers who have stronger attachment to Korea tend to express higher ethnocentrism to protect Korean labor market and to promote economic development of the country. Conclusions - The findings of this study showed that companies and government need to emphasize the country's advanced social environments or global competitiveness in technology, sports, art, and so on, to boost national attachment. With a deeper understanding on the relationships among national pride, national attachment, and consumer ethnocentrism, the authors expect that both local and foreign companies in Korea will be able to develop more effective marketing strategies and to achieve sustainable competitive advantage.

A Study on the Smart Tourism Awareness through Bigdata Analysis

  • LEE, Song-Yi;LEE, Hwan-Soo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.5
    • /
    • pp.45-52
    • /
    • 2020
  • Purpose: In the 4th industrial revolution, services that incorporate various smart technologies in the tourism sector have begun to gain popularity. Accordingly, academic discussions on smart tourism have also started to become active in various fields. Despite recent research, the definition of smart tourism is still ambiguous, and it is not easy to differentiate its scope or characteristics from traditional tourism concepts. Thus, this study aims to analyze the perception of smart tourism exposed online to identify the current point of smart tourism in Korea and present the research direction for conceptualizing smart tourism suitable for the domestic situation. Research design, data, and methodology: This study analyzes the perception of smart tourism exposed online based on 20,198 news data from portal sites over the past six years. Data on words used with smart tourism were collected from the leading portal sites Naver, Daum, and Google. Text mining techniques were applied to identify the social awareness status of smart tourism. Network analysis was used to visualize the results between words related to smart tourism, and CONCOR analysis was conducted to derive clusters formed by words having similarity. Results: As a result of keyword analysis, the frequency of words related to the development and construction of smart tourism areas was high. The analysis of the centrality of the connection between words showed that the frequency of keywords was similar, and that the words "smartphones" and "China" had relatively high connection centrality. The results of network analysis and CONCOR indicated that words were formed into eight groups including related technologies, promotion, globalization, service introduction, innovation, regional society, activation, and utilization guide. The overall results of data analysis showed that the development of smart tourism cities was a noticeable issue. Conclusions: This study is meaningful in that it clearly reflects the differences in the perception of smart tourism between online and research trends despite various efforts to develop smart tourism in Korea. In addition, this study highlights the need to understand smart tourism concepts and enhance academic discussions. It is expected that such academic discussions will contribute to improving the competitiveness of smart tourism research in Korea.