• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

Development Paradigm of Repression and Desire Embodied by Body and Clothing (몸·복식에서 억압과 욕망의 패러다임 개발)

  • Jeong, Ki-Sung;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.6
    • /
    • pp.97-112
    • /
    • 2013
  • In this study, physical, social and psychological repression embodied by the body and clothing are referred to instinctual, power and creative desires, respectively, from the point of biological, social and aesthetic views. Desire refers to a behavior to overcome men's imperfections with individual security, sense of belonging and the pursuit of an ideal, which are obtained by living as a social creature. Repression through the body is sub-categorized depending on whether it is temporary or permanent. Repression expressed through clothing is seen through revealing/concealing, contraction/expansion, and deconstruction/ reconstruction. What enables human beings to embrace changes in fashion without fierce resistance or backlash is the changes of formativeness demonstrated by repression through the body and clothing. The aesthetic values drawn from the exhibition of repression and on the body and clothing are categorized into narcissism, fetishism and aestheticism. While narcissism is an instinctive desire grounded on the originality and confidence of the self that results in refusing repression, fetishism is a desire for power that expedites repression in the pursuit of materialistic value or sexual fantasy. Aestheticism is a desire for creativity that symbolizes the body-and-clothing repression in the pursuit of aesthetic idealism. Repression evokes desire, and the pursuit of desire leads to another repression. The aesthetic values of desire for instinct, power and creativity can be substituted with each other for interpretation according to the attitudes of an initiator, a user and a spectator.

A partial factors methodology for structural safety assessment in non-linear analysis

  • Castro, Paula M.R.P.;Delgado, Raimundo M.;Cesar de Sa, Jose M.A.
    • Computers and Concrete
    • /
    • v.2 no.1
    • /
    • pp.31-53
    • /
    • 2005
  • In the present structural codes the safety verification is based on a linear analysis of the structure and the satisfaction of ultimate and serviceability limit states, using a semi-probabilistic security format through the consideration of partial safety factors, which affect the action values and the characteristic values of the material properties. In this context, if a non-linear structural analysis is wanted a difficulty arises, because the global safety coefficient, which could be obtained in a straightforward way from the non-linear analysis, is not directly relatable to the different safety coefficient values usually used for the different materials, as is the case for reinforced concrete structures. The work here presented aims to overcome this difficulty by proposing a methodology that generalises the format of safety verification based on partial safety factors, well established in structural codes within the scope of linear analysis, for cases where non-linear analysis is needed. The methodology preserves the principal assumptions made in the codes as well as a reasonable simplicity in its use, including a realistic definition of the material properties and the structural behaviour, and it is based on the evaluation of a global safety coefficient. Some examples are presented aiming to clarify and synthesise all the options that were taken in the application of the proposed methodology, namely how to transpose the force distributions obtained with a non-linear analysis into design force distributions. One of the most important features of the proposed methodology, the ability for comparing the simplified procedures for second order effects evaluation prescribed in the structural codes, is also presented in a simple and systematic way. The potential of the methodology for the development and assessment of alternative and more accurate procedures to those already established in codes of practice, where non-linear effects must be considered, is also indicated.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

An Analysis of Online Black Market: Using Data Mining and Social Network Analysis (온라인 해킹 불법 시장 분석: 데이터 마이닝과 소셜 네트워크 분석 활용)

  • Kim, Minsu;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.221-242
    • /
    • 2020
  • Purpose This study collects data of the recently activated online black market and analyzes it to present a specific method for preparing for a hacking attack. This study aims to make safe from the cyber attacks, including hacking, from the perspective of individuals and businesses by closely analyzing hacking methods and tools in a situation where they are easily shared. Design/methodology/approach To prepare for the hacking attack through the online black market, this study uses the routine activity theory to identify the opportunity factors of the hacking attack. Based on this, text mining and social network techniques are applied to reveal the most dangerous areas of security. It finds out suitable targets in routine activity theory through text mining techniques and motivated offenders through social network analysis. Lastly, the absence of guardians and the parts required by guardians are extracted using both analysis techniques simultaneously. Findings As a result of text mining, there was a large supply of hacking gift cards, and the demand to attack sites such as Amazon and Netflix was very high. In addition, interest in accounts and combos was in high demand and supply. As a result of social network analysis, users who actively share hacking information and tools can be identified. When these two analyzes were synthesized, it was found that specialized managers are required in the areas of proxy, maker and many managers are required for the buyer network, and skilled managers are required for the seller network.

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

A Scheme of Compensation System for Farmers' Accidents through the Example of Germany (독일의 사례를 통해 본 농업인재해 보장체계 구축 방안)

  • Min, Byeong-Wook;Kim, Hyo-Chel;Lee, Kyung-Suk
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.3
    • /
    • pp.351-384
    • /
    • 2011
  • The purpose of this study is to look at the case of the German compensation system for farmers' accidents and to build a basic scheme in our country's compensation system for farmers' accidents. When you view examples of Germany, the social insurance scheme for farmers accidents in korea should be design as an independent institution from the existing industrial accident insurance, and it comes to relationships with other social insurance system, preferably with complementary personalities. A general rule of the compensation system applies to all farmers in principle but the coverage limits part-time farmers. Financial burden consists of the mix of insurance premium and state aid. The type and level of benefits is similar to the current industrial accident insurance, which give priority to places on economic security for keeping farmworks, such as cost for using temporary farmers, rather than income loss. In terms of financial system, pay-as-you-go system would be better because of immediate payment with the introduction of the compensation system. The compensation system might be managed and administrated by the existing nationwide organization. Of course, for operating of system review and further research on the technical details such as premium issues and funding problems of government support, the exact classification of the target coverage, premiums based on estimated income for the farmers' estimation, the exact statistical data on the accumulation of agricultural disaster is needed.

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

A System Architecture Design for Web-Based Application Systems using Role-Based Access Control (직무기반 접근제어를 사용하는 웹기반 응용 시스템의 시스템 아키텍처 설계)

  • Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.217-225
    • /
    • 2010
  • Among web-based systems being widely used now, there are so many systems which are still using an user-level access control method. By successfully applying role-based access control(RBAC) to web-based application systems, we can expect to have an effective means with reinforced security for Internet-based systems. In order to apply RBAC to web-based application systems, we should come up with a system architecture for it. I proposed a system architecture which is needed to apply RBAC to web-based application systems. The proposed system architecture is largely composed of system composition and system functioning. For details, firstly, a certificate used by RBAC is specified. Secondly, a system architecture using a user-pull method is proposed and overall system components are mentioned with a role server being centered. Then, I showed how the system architecture can work to carry out RBAC on web-based application systems. Lastly, the analyses on the proposed system architecture are described for the purpose of proving its feasibility.

Case Study of Assisted Living Facility (ALF) as a 'Home' (집'으로서의 노인보호주택 사례연구)

  • 김영주
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.137-142
    • /
    • 2002
  • The purpose of this study was to examine the features that make residents feel “at home” in ALFs in Southwest Virginia and to suggest further policy and design guidelines for better Quality of ALFs as a “home.” For this purpose, residents' needs, experiences, and opinions of the physical environment, the social environment, and the organizational environments such as policies and programs of ALFs were identified. As a multi-case study, five ALFs in Southwest Virginia were studied using constant comparative methos of data analysis. In addition to face-to-face interviews with 25 residents and five administrators of five ALFs, observations were conducted with personal journal. Overall, the five sites selected presented homelike features showing the philosophy of assisted living which combines housing and services. Each facility was designed to be a single-family house or multi-family dwelling in outside appearance. As a whole, residents felt isolation and loneliness and they did not have active interaction with other residents because of diverse background among the residents. However, all of them had close relationships with the staff. The staff's attitude and behavior seemed to influence greatly the residents' feeling “at home.” Despite the provision of diverse activities by the facilities, many residents did not participate in the programs. Most of the residents agreed that the rule and regulations were fair. In spite of high satisfaction with the facility, many people did not think of their current dwelling as a real ‘home.’ As the biggest difference between living in their own homes and living in the ALF, people pointed out a lack of independence, freedom, and autonomy. Residents of ALFs may have reordered their priorities in their current life situation so that safety, security, and care were more important to them than feeling “at home.” Among the three factors --physical, social, and organizational-- that affect the residents' perception of ALFs as a “home, ” many emphasized the importance of social factors such as relationships with the staff and residents, and social support from their family or friends.

  • PDF