• Title/Summary/Keyword: Social ID

Search Result 76, Processing Time 0.027 seconds

The Special School Teachers' Perception of the Significant Skills Required by Students with Intellectual Disabilities for Gaining and Maintaining Employment (지적장애학생의 취업 및 고용 유지를 위한 주요기술 관련 특수교사 인식)

  • Park, Yung keun;Cho, In Soo;Hosp, John L.
    • 재활복지
    • /
    • v.17 no.4
    • /
    • pp.245-265
    • /
    • 2013
  • The purpose of this study is to investigate 1) the perception of special school teachers on the significant skills required by students with intellectual disabilities(ID) for gaining and maintaining employment. For this study, a mixed method design including quantitative survey method and qualitative in-depth interview were utilized. First, through quantitative survey method, the perception on significant skills of students with ID for gaining and maintaining employment was investigated. At the same time, to overcome the limitation of a quantitative survey study, in-depth interviews with special school teachers were implemented. Through in-depth interviews, difficulties keeping students with ID from maintaining employment and significant skills for gaining & maintaining employment were investigated. Many students with ID have had difficulties in maintaining their employment for reasons such as behavioral problems, lack of social skills, or lack of diligence. Thus, many special teachers perceived the importance of educating the significant skills for maintaining their employment as well as gaining employment. For successful vocational transition, daily living skills, occupational skills, and personnel-social skills are significant. However, students' personal-social skills are more important than daily living skills and occupational skills. Among personal-social skills, students' sincerity, diligence, good-hearted personality, social skills, and ability for following directions of a supervisor are significant characteristics for gaining and maintaining employment.

Framework for Socially Intelligent Agent using Three-Layered Affect Functioning Model (3단계의 사고 작용 모델을 응용한 사회적 감성지능 에이전트 프레임워크)

  • Shin, Hun-Yong;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.522-527
    • /
    • 2008
  • Socially Intelligent agent is the agent not only having the ability to recognize and to process human affect through learning and adaptation, but also having human-like social intelligence. By making human feel familiar with the computer, the agent is expected to enhance human-computer interaction (HCI) by providing users with the personalized services and interfaces. This paper proposes the framework for socially intelligent agents behaving socially according to the emotions recognized by ID3 algorithm and psychological OCC model. Also, the agent could process with the emotion to make socially intelligent response through three layered affect functioning model. Finally, the proposed agent can be applied for the development and application of socially intelligent agent in wide areas as the agent framework having similar affect and cognitive structure with human being.

  • PDF

An Authentication Scheme Using OAuth and Cyber Physical Social System (Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법)

  • Cho, Jeong-woo;Lee, Kuk-young;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.348-351
    • /
    • 2016
  • Recently on IoT environment, there is necessary of protected network, which is only specific user can access it. Applying OAuth protocol on IoT, it can be easier to construct network authentication system, but it is hard to construct protected network authentication system. And there is weakness of OAuth protocol, which is easily attacked by sniffing Token by attacker. So, it is necessary to secondary authentication for OAuth. In ultimate IoT, the fog computing is essential. Fog computing is extension of cloud that enables networking not only in core system but also in edge system and communication node to node. Strength of fog computing is location awareness, support for mobility, and so on. If authentication in fog computing uses this strength, it can be more specialized in Fog Computing. So, in secondary Authentication, using Cyber-Physical-Social System will increase convenience of user than using existing authentication system, such as authentication certificate, id/password and group key, which is inconvenient for user. This study is about authentication based Cyber-Physical-Social System.

  • PDF

A study on Acceptance Intention and Use of Electronic ID: Focusing on Moderating Effects of Promotion Focus, Prevention Focus and Gender (전자신분증에 대한 수용의도에 관한 연구: 향상초점, 예방초점과 성별의 조절효과를 중심으로)

  • Kim, Min Joo;Kim, Min Kyun
    • The Journal of Information Systems
    • /
    • v.30 no.3
    • /
    • pp.137-158
    • /
    • 2021
  • Purpose This study aims to investigate which factors have impact on the acceptance intention of new electronic ID. For the empirical analysis, this study utilized PLS-SEM after collecting 385 survey data, and analyzed relations between each factors. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the Unified Theory of Acceptance and Use of Technology with the factors deducted from the Risk Factors. Findings The results are as follow; First, of the UTAUT factors, Performance Expectancy, Effort Expectancy and Social Influence and has positive impact on Acceptance Intention, but Facilitating Conditions doesn't have meaningful impact on Acceptance Intention. Second, of the Risk factors, Innovation Resistance has negative impact on Acceptance Intention, but Perceived Risk dose not have meaningful impact on Acceptance Intention. Finally, regulatory effect of the Promotion Focus, Prevention Focus and Gender has regulatory impact to Acceptance intention. It is expected that the implications of this study enables government effectively to offer new electronic ID.

Comparative Study of Machine learning Techniques for Spammer Detection in Social Bookmarking Systems (소셜 복마킹 시스템의 스패머 탐지를 위한 기계학습 기술의 성능 비교)

  • Kim, Chan-Ju;Hwang, Kyu-Baek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.345-349
    • /
    • 2009
  • Social bookmarking systems are a typical web 2.0 service based on folksonomy, providing the platform for storing and sharing bookmarking information. Spammers in social bookmarking systems denote the users who abuse the system for their own interests in an improper way. They can make the entire resources in social bookmarking systems useless by posting lots of wrong information. Hence, it is important to detect spammers as early as possible and protect social bookmarking systems from their attack. In this paper, we applied a diverse set of machine learning approaches, i.e., decision tables, decision trees (ID3), $na{\ddot{i}}ve$ Bayes classifiers, TAN (tree-augment $na{\ddot{i}}ve$ Bayes) classifiers, and artificial neural networks to this task. In our experiments, $na{\ddot{i}}ve$ Bayes classifiers performed significantly better than other methods with respect to the AUC (area under the ROC curve) score as veil as the model building time. Plausible explanations for this result are as follows. First, $na{\ddot{i}}ve$> Bayes classifiers art known to usually perform better than decision trees in terms of the AUC score. Second, the spammer detection problem in our experiments is likely to be linearly separable.

Strategic use of social media IDs: critical perspectives on identity and interaction

  • Rizwan, Snobra
    • Cross-Cultural Studies
    • /
    • v.36
    • /
    • pp.5-35
    • /
    • 2014
  • This study attempts to give a review of social media users' choice of a particular name for the sake of signaling identity cues and interaction with the others. The social media names could be classified into different categories such as traditional/cultural anthroponyms, nicknames and fictitious IDs etc. Out of these categories, it is the phenomenon of choice and construction of fictitious social media IDs by Pakistani social media users which has been reviewed and scrutinized in this particular article. This study examined fictitious IDs of Pakistani social media users from Critical Discourse Analysis and System Functional Linguistics perspectives and demonstrates how nationalistic, ethnic and religious identities are negotiated, constructed, deconstructed and reconstructed by the social media users through a particular ID choice.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A study of Location based Air Logistics Systems with Light-ID and RFID on Drone System for Air Cargo Warehouse Case

  • Baik, Nam-Jin;Baik, Nam-Kyu;Lee, Min-Woo;Cha, Jae-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.31-37
    • /
    • 2017
  • Recently Drone technology is emerging as an alternative new way of distribution systems services. Amazon, Google which are global network chain distribution companies are developing an idea of Drone based delivery service and applied for patent for Drone distribution systems in USA. In this paper, we investigate a way to adopt Drone system to Air Cargo logistics, in particular, drone system based on combination of Light ID and RFID technology in the management procedure in stock warehouse. Also we explain the expected impact of Drone systems to customs declaration process. In this paper, we address the investigated limitations of Drone by the Korean Aviation Act as well as suggest the directions of future research for application of Drone to Air logistics industry with investigated limitations.

2-factor authentication using Keygen and Local-Storage in HTML5 on multiple devices (다중 디바이스에서 HTML5의 keygen과 Local-storage 기반의 2-factor 인증)

  • Lee, Gyu-Seok;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.853-856
    • /
    • 2012
  • 모바일 디바이스의 대중화와 SNS(Social Networking Service)의 발전은 각 개인이 데이터와 정보를 생성하는 Web 2.0 의 페러다임을 앞당겼으며 최근 SNS 서비스를 통하여 새로운 형태의 커뮤니케이션 형태가 생성되었다. 이러한 커뮤니케이션 도구를 이용하는 유저는 대부분 ID 와 Password를 기반으로 사용자를 인증하여 서비스를 제공받는다. 이와 같은 서비스에서는 각 사용자의 정보자체보다 사용자의 사회적 위치와 사용자간의 관계를 이용한 보안사고가 우려된다. 근래의 ID/Password로 인증하는 방식의 웹서비스 또는 정보서비스들은 대부분 개인 PC, 스마트폰, 업무 PC 등에서 접근하는 추세이며, 임의적 장소에서 임의의 기기로 해당 서비스에 접근하는 양상은 과거에 비하여 감소하는 추세다. 이 같은 추세에 따라, 주로 사용하는 기기에 HTML5의 keygen과 Web-Storage 기능을 사용하여 암호화된 Key를 생성하고 저장하여 ID 와 Password가 노출되어도 해당 기기가 아니면 인증되지 않는 시스템을 구현 할 수 있으며 타 기기의 경우 일회성을 갖는 인증 방식을 사용하여, 기존 보다 안전한 인증 시스템을 적은 비용으로 구축 할 수 있다.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.