• Title/Summary/Keyword: Technology Sharing

Search Result 2,073, Processing Time 0.034 seconds

A Study on the Effectiveness of Secure Responses to Malicious E-mail (악성 이메일에 대한 안전한 대응의 효과성 연구)

  • Lee, Taewoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.26-37
    • /
    • 2021
  • E-mail is one of the important tools for communicating with people in everyday life. With COVID-19 (Coronavirus) increasing non-face-to-face activity, security incidents through e-mail such as spam, phishing, and ransomware are increasing. E-mail security incidents are increasing as social engineering attack using human psychology rather than arising from technological weaknesses that e-mails have. Security incidents using human psychology can be prevented and defended by improving security awareness. This study empirically studies the analysis of changes in response to malicious e-mail due to improved security awareness through malicious e-mail simulations on executives and employees of domestic and foreign company. In this study, the factors of security training, top-down security management, and security issue sharing are found to be effective in safely responding to malicious e-mail. This study presents a new study by conducting empirical analysis of theoretical research on security awareness in relation to malicious e-mail responses, and results obtained from simulations in a practical setting may help security work.

Development of Design thinking-based AI education program (디자인 씽킹 기반 인공지능 교육 프로그램 개발)

  • Lee, Jaeho;Lee, Seunghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.5
    • /
    • pp.723-731
    • /
    • 2021
  • In this study, the AI education program for elementary school students was developed and applied by introducing the design thinking process, which is attracting attention as a creative problem solving process. A design thinking-based AI education program was developed in the stages of Understanding AI, Identifying sympathetic problems, Problem definition, Ideate, Prototype, Test and sharing, and the development program was applied to elementary school students in 4th-6th grade. As a result of pre- and post-testing of students' computational thinking skills to confirm the effectiveness of the program, computational thinking skills increased by grade level, and students experienced a process of collaboration for creative problem solving based on insights gained from sympathetic problem finding. In addition, it was possible to get a glimpse of the attitude of using AI technology to solve problems, and it was confirmed that ideas were generated in the prototype stage and developed through communication between team members. Through this, the design thinking-based AI education program as one of the AI education for elementary school students guarantees the continuity of learning and confirms the possibility of providing an experience of the creative problem-solving process.

Thread Embedding Therapy in Rheumatoid Arthritis: A Systematic Review of Animal Studies (매선요법의 류마티스 관절염 동물모델을 활용한 실험연구: 체계적 문헌고찰)

  • Jun, Purumea;Zhao, HuiYan;Kang, Suk-Yun;Han, Chang-Hyun
    • Korean Journal of Acupuncture
    • /
    • v.38 no.3
    • /
    • pp.122-132
    • /
    • 2021
  • Objectives : This systematic review aims to assess the effectiveness of thread embedding therapy on animal model for rheumatoid arthritis. Methods : Search was conducted in the Cochrane library, MEDLINE (PubMed), EMBASE, the Chinese National Knowledge Infrastructure, Wan-Fang Database, Technology Journal Database, the Korean Studies Information Service System, the Oriental Medicine Advanced Searching Integrated System, the Research Information Sharing Service, the National Digital Science Library, the Korean Traditional Knowledge Portal and the Korea Citation Index. Data were extracted concerning animal model, intervention and rheumatoid arthritis indicator by two independent reviewers. Reporting quality was also evaluated by the ARRIVE (Animal Research: Reporting In Vivo Experiments) guidelines 2.0. Results : One thousand thirty six studies were primarily selected. After screening, 10 studies met the inclusion criteria. 1 study was published 2005, 1 study was published 2010, 1 study was published 2012, 1 study was published 2015, 2 studies were published 2016, 3 studies were published 2017, 1 study was published 2018. The most frequently used acupoints were ST36 and BL23, and were used with an average frequency of 11.8 days. All of these thread embedding therapy studies were effective on behavioral, morphological, immunohistological and hematological indicators to treat of rheumatoid arthritis model. Conclusions : These results demonstrated the effectiveness of thread embedding therapy and suggested the putative mechanism. However, considering the small number of included studies, low reporting quality and differences in study design, further studies with rigorous designs and high reporting quality need to be conducted.

A Study on the Building of Tuna Farming in Floating Offshore Wind Power Generation Field at East Sea (동해 부유식 해상풍력발전단지 내 참다랑어 양식장 조성에 관한 연구)

  • Choi, Gun Hwan;Kim, Mi Jeong;Jang, Ki Ho;Kim, Hyo Seon
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.33 no.5
    • /
    • pp.179-186
    • /
    • 2021
  • We need measures that can come up with alternative about fishery living zone and enhance local acceptance for responding to the increase in the proportion of renewable energy production and construction of 12GW Offshore wind power according to Korea's Renewable Energy 3020 initiative and Korean-version New Deal. In this study, We suggest that differentiation plans of co-location model in connection with offshore wind power generation suitable for the East Sea. The East Sea is an optimal site for building of a floating offshore wind power generation(FOWPG) field. It is expected that economic effects like energy production, aquatic resource development and tourism industrialization by farming bluefin tuna which is high valued fish and suitable for offshore aquaculture on public waters in FOWPG field. And we can confirm that budget reduction, smart management by sharing operation management technology and increase in fishermen income.

The Role of Information Search Cost on Seller's Disclosure of Negative Information (정보 검색 비용이 판매자의 부정적 정보 공개에 미치는 영향에 대한 연구)

  • Huh, Seung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.230-241
    • /
    • 2021
  • This study has attempted to provide an important understanding about the information asymmetry in markets through empirical analysis on how the disclosure of low quality can increase demand even in the short run. More specifically, this study has extended the previous findings from the related literature by considering the effect of information search cost and providing empirical evidences about the effect of voluntary disclosure of low quality, using an experimental method with purchase scenarios. The results from our analysis show that reduced perceived risk have an important effect on sharing negative information, while the effect of information search cost is minimal. We also explain the circumstances whereby the information disclosure of a seller with low-quality product can enhance not only the seller's profitability but also customers' welfare by increasing the market demand and the demand for the seller claiming high quality.

Crystal Structure and Magnetic Properties of Sodium-Iron Phosphates NaFe0.9Mn0.1PO4 Cathode Material

  • Seo, Jae Yeon;Choi, Hyunkyung;Kim, Chul Sung;Lee, Young Bae
    • Journal of the Korean Physical Society
    • /
    • v.73 no.12
    • /
    • pp.1863-1866
    • /
    • 2018
  • The sodium-iron phosphate maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was synthesized using the ball mill method. The crystal structure and magnetic properties of the prepared materials were studied using X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and $M{\ddot{o}}ssbauer$ spectroscopy. Structural refinement of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was analyzed using the FullProf program. From the XRD patterns, the crystal structure of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was found to be orthorhombic with the space group Pmnb. The lattice parameters of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ are as follows: $a_0=6.866{\AA}$, $b_0=8.988{\AA}$, $c_0=5.047{\AA}$, and $V=311.544{\AA}^3$. Maricite-$NaFePO_4$ has an edge-sharing structure that consists of $FeO_6$ octahedral. Under an applied field of 100 Oe, the temperature dependences of zero-field-cooled (ZFC) and field-cooled (FC) curves were measured from 4.2 to 295 K. $M{\ddot{o}}ssbauer$ spectra were also recorded at various temperatures ranging from 4.2 to 295 K. We thus confirmed that the $N{\acute{e}}el$ temperature of $NaFe_{0.9}Mn_{0.1}PO_4$ ($T_N=14K$) was lower than that of maricite-$NaFePO_4$ ($T_N=15K$).

Fixing Security Flaws of URSA Ad hoc Signature Scheme (URSA 애드혹 서명 알고리즘의 오류 수정)

  • Yi, Jeong-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2007
  • Ad hoc networks enable efficient resource aggregation in decentralized manner, and are inherently scalable and fault-tolerant since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Moreover, the dynamic topology change in which network nodes frequently join and leave adds a further complication in designing effective and efficient security mechanism. Security services for ad hoc networks need to be provided in a scalable and fault-tolerant manner while allowing for membership change of network nodes. In this paper, we investigate distributed certification mechanisms using a threshold cryptography in a way that the functions of a CA(Certification Authority) are distributed into the network nodes themselves and certain number of nodes jointly issue public key certificates to future joining nodes. In the process, we summarize one interesting report [5] in which the recently proposed RSA-based ad hoc signature scheme, called URSA, contains unfortunate yet serious security flaws. We then propose new scheme by fixing their security flaws.

Design of an Efficient AES-ARIA Processor using Resource Sharing Technique (자원 공유기법을 이용한 AES-ARIA 연산기의 효율적인 설계)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.39-49
    • /
    • 2008
  • AEA and ARIA are next generation standard block cipher of US and Korea, respectively, and these algorithms are used in various fields including smart cards, electronic passport, and etc. This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library. We designed shared S-boxes based on composite filed arithmetic for both algorithms, and also extracted common terms of the permutation matrices of both algorithms. With the $0.25-{\mu}m$ CMOS technology, our processor occupies 19,056 gate counts which is 32% decreased size from discrete implementations, and it uses 11 clock cycles and 16 cycles for AES and ARIA encryption, which shows 720 and 1,047 Mbps, respectively.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.