• Title/Summary/Keyword: abusing

Search Result 69, Processing Time 0.026 seconds

Development of system NFC-based medication management for elderly patients (고령 환자를 위한 NFC기반 복약 관리 시스템의 개발)

  • Yoon, Taebok;Lee, Jong-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5303-5309
    • /
    • 2014
  • With entering into an aged society, more people need to pay attention to their health and disease. In particular, it is significant for senior citizens with chronic disease to have a medication system because it is related directly to their lives. This study suggested the NFC-based medication management system for elderly patents. By developing a NFC-based medication bottle cap and smart phone application program, the suggested method can assist elderly patients to take medicines properly without missing or abusing them through guidance and alarm, and maintain their health.

A Study on Cheating Patterns in Online FPS Games and their Countermeasures : By the Case of Point Blank in Indonesia (온라인 FPS 게임의 치팅 유형과 대응 방안에 관한 연구 : 인도네시아 포인트 블랭크 사례를 중심으로)

  • Im, Sung-Jin;Lee, Dae-Hyun
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.81-91
    • /
    • 2011
  • Hacking tools are evolving along the growth of on-line game industry. Those tools allow users with no programming knowledge to hack the game, which causes a lot of problems in on-line game services. Specifically, FPS games based on peer-to-peer networks are vulnerable to hacks. This paper analyzes cheating patterns by the case of Point Blank in Indonesia and prioritize countermeasures, which helps game companies handle hacks efficiently.

Terms of arbitration in Franchise Agreements (프랜차이즈 계약에서의 중재조항)

  • 윤선희
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.321-351
    • /
    • 2004
  • According to increase of Franchise Agreements, troubles related to those agreements and trading acts occur frequently. As Franchise system had come from Western countries, franchise agreement troubles tend to international disputes. In fact, those parties entered into a franchise agreement prefer arbitration to lawsuit as a dispute resolution system because arbitration is easy to risk-management for cost and time. The essential conditions for Franchise agreements are as follows ; for Franchise to grant Intellectual Properties to Franchisee, to give an impression of the same company between Franchise and Franchisee, to control and support Franchisee, for Franchisee to be an independent merchant, and to pay Franchiser license fee. Because Franchise Agreement is also based on liberty of contract, Franchise and Franchisee could enter into any kind of agreement. However, Franchiser can make an unfair agreement abusing a position of advantage. This paper check those unfair terms and conditions in Franchise agreement. Once they enter into an agreement, they should fulfil their contract. In case of trouble on performing the contract, both of them have to discuss to solve that trouble faithfully. But, they enter into either lawsuit or arbitration in accordance with agreement when they can't reach a decision in general. Specially, which is the most popular dispute resolution hands in case of Intellectual Property License agreement. General international Franchise Agreements have arbitration terms, but there is other case such as separate Arbitration Agreement if the want, which is separate from Franchise License agreement, so even though Franchise License agreement is invalidated, Arbitration agreement continues to exist, This paper reviews Franchise system and the terms of arbitration in Franchise agreement.

  • PDF

An Analysis of the Importance among the Items in the Secure Coding used by the AHP Method (AHP기법을 이용한 시큐어 코딩의 항목 간 중요도 분석)

  • Kim, Chi-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.257-262
    • /
    • 2015
  • The ministry of security and public administration provide the secure coding guide that can remove the vulnerability of applications and defend cyber attack from the coding step because cyber attack like the hacking about 75% abusing the vulnerability of applications. In this paper we find the oder of priority and did the criticality analysis used by AHP about 7 items in the secure coding which the ministry of security and public administration provide. The result is decided that 'exception handling' is the most important item. There is no secure coding items in software supervision currently, therefore the result of the research will make good use audit standards in the process of the software development.

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Attack Evolution of 'DNSpionage' and Countermeasures on Survey ('DNS피오나지' 공격의 진화에 따른 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.52-57
    • /
    • 2019
  • DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.

A Study on the Effect of Digital Literacy Education in Personal Information Security Perception (디지털리터러시 교육이 개인 정보 보안 인식에 미치는 영향 연구)

  • Kwon, Jungin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.161-167
    • /
    • 2020
  • Convergence ethics education for digital culture in cyberspace is limited to specific areas such as personal information and copyright. Education on the ability to accept information and provide information in cyberspace in which digital natives communicate, share and exchange is inadequate. As a result, the dysfunction of abusing the personal information of others without recognizing the importance of information security has recently emerged as a social problem. In this study, among digital netizen who communicate and exchange information the most in cyberspace, digital literacy education was conducted for students in the first and second grades of university, and then they investigated the change in information security perception. Based on this, we intend to prepare fundamental measures for systematic cultivation of digital literacy education necessary for the Digital Cultural Society.

Performance Analysis of the Anti-Spoofing Array Antenna with Eigenvector Nulling Algorithm

  • Lee, Kihoon;Song, Min Kyu;Lee, Jang Yong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.3
    • /
    • pp.181-189
    • /
    • 2022
  • The public open signals from Global Navigation Satellite System (GNSS) including Global positioning system (GPS) are used widely by many peoples in the world except for the public regulated restriction signals which are encrypted. Nowadays there are growing concerns about GNSS signal spoofing which can deceive the GNSS receivers by abusing these open services. To counter these spoofing threats, many researches have been studied including array antenna techniques which can detect the direction of arrival by means of Multiple Signal Classification (MUSIC) algorithm. Originally the array antenna techniques were developed to countermeasure the jamming signal in electronic warfare by using the nulling or beamforming algorithm toward a certain direction. In this paper, we study the anti-spoofing techniques using array antenna to overcome the jamming and spoofing issues simultaneously. First, we will present the theoretical analysis results of spoofing signal response of Minimum Variance Distortionless Response (MVDR) algorithm in array antenna. Then the eigenvector algorithm of covariance matrix is suggested and verified to work with the existing anti-jamming method. The modeling and simulation are used to verify the effectiveness of the anti-spoofing algorithm. Also, the field test results show that the array antenna system with the proposed algorithms can perform the anti-spoofing function. This anti-spoofing method using array antenna is very effective in the view point of solving both the jamming and spoofing problems using the same array antenna hardware.

Rapid Discoloration of Aged Beef Muscles after Short-Term/Extreme Temperature Abuse during Retail Display

  • Kim, Hyun-Wook;Setyabrata, Derico;Choi, Yun-Sang;Kim, Yuan H. Brad
    • Food Science of Animal Resources
    • /
    • v.36 no.3
    • /
    • pp.343-351
    • /
    • 2016
  • The objective of this study was to evaluate the effects of a short-term/extreme temperature abuse (STA) on color characteristics and oxidative stability of aged beef muscles during simulated retail display. Two beef muscles (longissimus lumborum, LL and semitendinosus, ST) were aged for 7 (A7), 14 (A14), 21 (A21), and 28 d (A28), and further displayed at 2℃ for 7 d. The STA was induced by placing steak samples at 20℃ for 1 h on the 4th d of display. Instrumental and visual color evaluations, ferric ion reducing capacity (FRC) and 2-thiobarbituric acid reactive substances (TBARS) assay were performed. Initially, redness, yellowness and hue angle of all beef muscles were similar, regardless of aging time before display (p>0.05). An increase in postmortem aging time increased lipid oxidation and caused a rapid discoloration after STA during display (p<0.05). ST muscle was more sharply discolored and oxidized after STA, when compared to LL muscle (p<0.05). The FRC value of beef muscles was decreased after 7 d of display (p<0.05). The results from the current study indicate adverse impacts of postmortem aging on color and oxidative stabilities of beef muscles, particularly under temperature abusing conditions during retail display. Thus, developing a specific post-harvest strategy to control quality attributes in retail levels for different muscle types and aging conditions would be required.