• Title/Summary/Keyword: Social ID

Search Result 76, Processing Time 0.039 seconds

Design and Implement GPS Based Meal Meeting Application (GPS 기반의 식사 모임 어플리케이션 설계 및 구현)

  • Lee, Won Joo;Kwon, Han Jun;Kim, Jung Woo;Oh, Dae Hyun;Lee, Sol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.153-154
    • /
    • 2018
  • 본 논문에서는 GPS 기능을 활용하여 고독한 현대인들을 위한 함께 식사할 수 있는 모임 어플리케이션을 설계하고 구현한다. 이 어플리케이션 사용은 크게 식사 모임의 주최자가 단체 그룹 방을 개설하고, 위치에 따라 함께 식사할 일반 사용자가 해당 그룹 방에 접속하는 방식이다. 그룹 방 입장 후 참여한 사용자는 주최자가 회원가입 시 입력한 카카오톡 SNS ID를 참고하여 식사를 원할 경우 주최자에게 메신저를 발송한다. 또한 그룹 방내에 참여한 사용자들은 GPS 기능을 활용해 수집된 사용자 위치 정보를 바탕으로 사용자 서로간의 위치 정보를 확인할 수 있다. 또한, 모임이 진행되는 날의 날씨 정보 제공을 위하여 날씨 API 기능도 함께 활용하여 정보를 제공한다. 이 어플리케이션의 구현으로 최근 1인 가구의 증가로 혼자 식사를 해결하는 혼밥족과 식사 상대가 없어 혼자 식사를 해결하는 현대인들의 외로운 식사 고민을 해결하고자 한다.

  • PDF

The emotional characeristics of gifted children: Suggestions for guidance of the gifted children's mental health (영재 아동의 정서적 특성에 관한 임상연구: 정신 건장을 위한 지도)

  • 윤여홍
    • Journal of Gifted/Talented Education
    • /
    • v.6 no.1
    • /
    • pp.53-72
    • /
    • 1996
  • The present study dealt with the emotional characteristics, emotional development of gifted children and emphasized the emotional intelligence as the meta-ability for the development of creativity and intellectual abilities. The emotional vulnerability of gifted children was also hscussed with endogenous and exogeneous problems, internal dyssynchrony, and social context. To find out the real chief problems the gifted children have, the contents of individual counselling with mothers of the gifted in KAGE were categorized based on the Lazarus' BASIC ID and DSM-IV dagnosis. Total 128 cases were analyzed. Among them, 61 cases were from elementary schoolers, however, percentile data showed the most, 34% of infant class aged 30 months - 48 months. Usually, the number of counselling in each person was 1, but 17 cases were done more than 3 times. And, 8 cases had experiences to visit the other counseling center or neuropsychiatric clinic. The categories of chief problems were 10: information about gifted program, behavior, affect, sensation, school and cognitive functions, imagery and self concept, interpersonal relationship, personality, mental illness, and others. Many problems in each category were listed. Finally, the present study suggested the several guidance plan possibly useful in the gifted education center for the purpose of prevention of emotional difficulties and support for the mental health, including professional personnel, child counselling, emotional education, and parent counseling & education.

  • PDF

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.

A Case Study on the Global Technology Cooperation: R&D Collaboration between ETRI and Microsoft ("글로벌 기술협력 성공사례" ETRI와 Microsoft사의 공동연구개발 성공요인분석 - '자기 통제강화형지갑ID시스템개발' 과제를 중심으로 -)

  • Suh, Sang-Hyuk;Lee, Sun-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.4
    • /
    • pp.1050-1072
    • /
    • 2011
  • It is well known that international cooperation is considerably more difficult because of the difference of interests, level of technology of the partners, social and culture as well as various macro-environmental conditions. This case study aims to investigate the success factors of international R&D collaboration between two firms. For it, an in-dept interview was conducted to the Etri-Microsoft Information Security Lab. A comprehensive research on theories, such as resource-based theory, network theory, relationship marketing theory and market power perspective was done as well. The results show clear objectives, communications based on trust, core competence on which the counterpart can rely on, consideration on the government decision process as well as the environment are important for success.

  • PDF

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

Temperature Measurement and Intelligent Access Management System Service Platform Advancement Research using AI Facial Recognition Technology (AI 얼굴정보처리기술을 활용한 체온측정 및 지능형 출입관리 시스템 서비스플랫폼 고도화 연구)

  • Kim, Byung-Wan
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.249-257
    • /
    • 2021
  • Recently, interest and demand for facial information processing technology that can provide non-face-to-face identity authentication and access management service using smart devices, which is an essential environmental improvement for multi-use facilities, is increasing as a way to prevent the spread of infectious diseases worldwide and to cope with social measures. This study defines a multi-use facility classification system and applied service field to establish a continuous access control system, and measures to improve the usability of the service platform considering scalability through a dual access control system and personal/measurement information type analysis, and accordingly We would like to propose a service roadmap. In addition, it aims to improve the physical access management system service platform, which is a multi-use facility application service that requires one-time and multiple-use authentication according to usage. It is expected that the methodology of this study can be applied as a service platform of a logical access control system type in the future.

Temporal Analysis of Opinion Manipulation Tactics in Online Communities (온라인 공간에서 비정상 정보 유포 기법의 시간에 따른 변화 분석)

  • Lee, Sihyung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.29-39
    • /
    • 2020
  • Online communities, such as Internet portal sites and social media, have become popular since they allow users to share opinions and to obtain information anytime, anywhere. Accordingly, an increasing number of opinions are manipulated to the advantage of particular groups or individuals, and these opinions include falsified product reviews and political propaganda. Existing detection systems are built upon the characteristics of manipulated opinions for one particular time period. However, manipulation tactics change over time to evade detection systems and to more efficiently spread information, so detection systems should also evolve according to the changes. We therefore propose a system that helps observe and trace changes in manipulation tactics. This system classifies opinions into clusters that represent different tactics, and changes in these clusters reveal evolving tactics. We evaluated the system with over a million opinions collected during three election campaigns and found various changes in (i) the times when manipulations frequently occur, (ii) the methods to manipulate recommendation counts, and (iii) the use of multiple user IDs. We suggest that the operators of online communities perform regular audits with the proposed system to identify evolutions and to adjust detection systems.

Effect of threats to anonymity on data reliability in internet survey (인터넷 설문조사에서 익명성 훼손이 응답에 미치는 효과)

  • Heo, Sun-Yeong;Chang, Duk-Joon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.4
    • /
    • pp.785-794
    • /
    • 2011
  • The population of internet users are rapidly increasing and the interest of the internet survey is also increasing. Recent years has seen a transition from traditional modes of data collection into internet survey. Some surveys are administered with mixed modes of traditional data collection methods and internet survey, and some surveys are conducted through internet only instead of traditional modes, such as telephone survey, postal survey, face-to-face interviews and so on. However, one of most crucial parts of a survey is the reliability of the collected data and internet survey is no exemption. Changwon National University has been annually conducting a survey of new students and transfer students with almost same contents of questionnaire. The survey is a longitudinal survey and it had been administered by paper-pencil surveys until 2009. In 2010 the survey was administered through internet. Every students has to login with student ID number and the last 7-digit of national identity registration number, and complete the 2010 survey before registration their courses. If they leave any question without being answered, then could not move to the registration site for courses. This study explores the distortion of responses using the new students survey of Changwon National University, which could occur when the survey responses are not confidential. We find that the distortion of responses occurs from the questions with social desirability pressure, pressure of winning favor with the researcher, and pressure of explaining their situations. There are no distortion of responses from the questions which are describing simple opinions or simple facts, for example, the place they plan to live while in school.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.