• Title/Summary/Keyword: Sorority

Search Result 23, Processing Time 0.023 seconds

Materialism, Fashion Clothing Involvement, Proximity of Clothing to Self, and US Sorority Member Selection Based On Clothing and Appearance (의복과 외모를 근거로 한 미국여대생 클럽회원 선택결정과 물질주의성향, 패션의복관여도, 의복의 자아근접성에 관한 연구)

  • Miller, Jennifer Rebecca;Kim, So-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.12
    • /
    • pp.1857-1865
    • /
    • 2008
  • The purpose of this study was to examine the importance of personal attributes as they related to developing first impressions and managing group acceptance in the context of sorority recruitment process. Specifically, we examined how certain personal characteristics of a sorority member were related to her use of a potential member's clothing and appearance as non-verbal cues during the member selection process. The characteristics identified through the literature review were materialism, fashion clothing involvement, and proximity of clothing to self. A questionnaire was distributed to members of two sorority houses at a southeastern university in the United States. A total of 140 US sorority members participated in the study. The results showed that a member's satisfaction with her chapter, her level of participation, and her length of membership in the chapter had no relation with her tendency to base her member selection on clothing and appearance. However, members' use of clothing and appearance as guiding their member selection decisions was related to other individual characteristics selected for the study(materialism, fashion clothing involvement, and proximity of clothing to self). Fashion clothing involvement and proximity of clothing to self(clothing for acceptance) were most significantly related to clothing-based member selection. Partial correlations were also produced to examine the mediating role of clothing-based impression formation.

A Design of Evaluation Tool for Information Security System (정보보호 시스템 평가 도구 설계)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.669-672
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. A lot of hacking events are occurring. As a result, people have a interesting for security in these days. Network security systems have come to be widely used in our networks. But, objective testing method to evaluate network sorority system is not established. Therefore we have difficulties that select a system. In this paper, we investigate evaluation methods for network sorority systems(Firewall, IDS, IPS etc.) and, design a evaluation tool for network security systems.

  • PDF

Analyses of Security Design for Home Gateway in Ubiquitous Surroundings (유비쿼터스 환경하에서의 홈게이트웨어를 위한 보안 설계 분석)

  • Kim Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.761-764
    • /
    • 2006
  • We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file servers, through the internet. With a simple web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall, we analyses the sorority design for home gateway in ubiquitous surroundings.

  • PDF

Design and Implementation of 10 Giga VPN Acceleration Board (10 Giga급 VPN 가속보드 설계 및 구현)

  • 김기현;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.661-664
    • /
    • 2003
  • Trade-off of sorority and speed always exists in the latest network environment. Recently, developed security processors is improved very performance, and sorority connection algorithms of a lot of part were embodied by hardware. This high speed security processor is essential ingredient in string network security solution equipment development that require very big band width. In this paper, we wish to describe about design and implementation of 10 Giga VPN equipments. In this system, embodied 10 Giga to use Cavium company's Nitrox-II processor, and supports two SP14-2 interface and PCI interface. All of the password algorithm that password algorithm that support is used in common use VPN equipment for compatibility with common use VPN equipment are supported and support SEED algorithm developed in domestic. Designed to support IPsec and SSL protocol, and supports all of In-Line structure that is profitable in high speed transaction and the Look-Aside structure that is profitable in practical use degree of NPU(Network Processor Unit).

  • PDF

Study on New Security Device of Telephony Using the Pseudo Random Number Generator (의사난수발생기를 이용한 새로운 유선전화 도청방지장치에 관한 연구)

  • Kim, Soon-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.655-657
    • /
    • 2008
  • We suggest the digital voice encryption module using the pseudo random number generator and design the sorority device of a telephone using the module. The proposed method provides encryption method of the telephone against the third party. This encryption method uses pseudo random number generator which computes the encryption key using the shared secret key and the current time value.

  • PDF

Network Security System for Next Generation Network Environment (차세대 네트워크 보안 시스템)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.795-799
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. Currently, Internet environment can offer voice, multimedia data as well as real-time movie services. But, the number of hacking has increased very much and the damages become serious. In this paper, the change of hacking method and security paradigm is investigated. And, we study in existing network security systems including newly developed security systems. Finally, we describe development directions of network sorority system for next generation network environment.

  • PDF

A Study of Implementation of a Firewall that Using the both Gateway Mode and Bridge Mode (게이트웨이 모드와 브리지 모드를 동시에 지원하는 침입차단시스템 구현에 관한 연구)

  • 박창서
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.967-969
    • /
    • 2003
  • Because of the rapid growth of Internet, the firewall is generally used to protect the network sorority. The firewall on Linux or FreeBSD Kernal, which is widely used, supports either Gateway or Bridge Mode. In this study, we present the firewall which supports simultaneously Gateway and Bridge Mode. For the application service, it is suggested that the firewall which has excellent expandability ran construct a network without another proxy.

  • PDF

The Study on the Security Requirement at Aeronautical Telecommunication Network (항공통신망에서의 보안 요구사항에 관한 연구)

  • Kim, Do-Woo;Lee, Seoung-Hyeon;Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.628-631
    • /
    • 2008
  • The information transfer between the ground facilities and the ground facilities and exchange are necessary for an aircraft and ground facilities so that it is safe, it is economic, an aircraft tan operate an aircraft to the high efficiency until it arrives at the destination location from the stand-by for the fly. Presently, by using the AFTN which is closed network, a communication is made. However, by applying the leading edge communication technology, the aeronautical telecommunication network of the next generation is constructed and it is planning to be managed. Due to this, the ground facilities connected to the foreign network has the security vulnerability by an attack. Therefore, the vulnerability analysis for the safe operational environment build-up at the aeronautical telecommunication network and sorority requirement research are needed.

  • PDF

Study on Online Signature Estimation using 2-D Information of Signature (서명의 2차원 정보를 이용한 온라인 서명 평가에 관한 연구)

  • Hwang, Young-Chul;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.797-800
    • /
    • 2008
  • Online signature verification system is widely used in banking account, credit card and so on, because system for online signature verification is easy to implementation and inexpensive. Therefore there are a lot of study on online signature verification. However there is little research about online signature is safe or not. This paper shows a way of online signature estimation using various information of signature. This paper make a experiment about relation sorority grade of online signature and 2-D information of online signature like the number of strokes and cross points, density of points, standard deviation of direction, velocity and acceleration, lengths of signature and convex hull etc. Finally, this paper presents several features of safe online signature.

  • PDF

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF