• Title/Summary/Keyword: human-centered threats

Search Result 6, Processing Time 0.02 seconds

A Study on the Deployment Strategy of Zero Trust Security Model Based on Human-Centered Security Design (인간중심보안설계 기반 제로 트러스트 보안모델 전개방안에 관한 연구)

  • Jin-Yong Lee;Byoung-Hoon Choi;Sujin Jang;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.1-7
    • /
    • 2024
  • Traditional security model design presents two primary issues. First, these models have been developed and implemented with a technology-centered approach rather than considering human factors. Such structures can be undermined by cognitive vulnerabilities like psychological resistance within organizations and user errors. Second, these models are typically designed based on network perimeter security. This design is unsuitable for the boundary-less remote work environments rapidly becoming prevalent due to the Fourth Industrial Revolution and the COVID-19 pandemic. This paper proposes an approach to address these limitations by integrating human-centered threats within the Zero Trust security model, a state-of-the-art boundary-less security framework. By doing so, we suggest a robust security model design that can protect against both technical and human-centered threats.

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

Reliability and Validity of Objective Diagnosis Tools According to the Emotional State of Companion Canine (반려견 정서상태에 따른 객관적 진단 도구의 신뢰도와 타당도 연구)

  • In-Hag Choi;Young-In Park;Tae-Ho Chung
    • Journal of Environmental Science International
    • /
    • v.33 no.4
    • /
    • pp.279-282
    • /
    • 2024
  • This study aimed to verify the results of emotional analysis with respect to canine behavior as reported in the existing animal behavior field based on the dog vestibular emotional reflex (VER) principle, and to evaluate humans and animals based on empathy gained through true communication rather than human-centered interpretation. A total of 200 canines were divided into non-daily and daily situation groups (n=100 each). To assess the psychological and emotional state of each group, these changes were applied to the principle of VER, and six measurement values were selected: positive emotion (balance and energy), negative emotion (tension/anxiety and stress), and body condition (inhibition and neuroticism). The results showed a statistically significant difference (p<0.05) in positive emotions, negative emotions, and body conditions between the two groups. In addition, balance, energy, tension/anxiety, inhibition, and neuroticism were higher in the non-daily situation group than in the daily situation group, with an exception for stress. Compared with the canine daily situation groups, canine in the non-daily situation groups instinctively observed their surroundings to cope with possible threats, had decreased concentration, and elevated vitals due to high-intensity anxiety. This can be perceived as a state of immediate reaction to possible situations/threats. In conclusion, it was confirmed through Vibra Image technology that canine instability mainly affects three factors: positive emotion, negative emotion, and physical condition.

Perspectives on Fashion Technology during the Pandemic Era - A Mixed Methods Approach Using Text Mining and Content Analysis - (팬데믹 시기의 패션 테크놀로지에 관한 시각 - 텍스트 마이닝과 내용 분석을 중심으로 -)

  • Kim, Mikyung;Yim, Eunhyuk
    • Fashion & Textile Research Journal
    • /
    • v.24 no.5
    • /
    • pp.545-556
    • /
    • 2022
  • To overcome the pandemic, a new strategy for innovation is in demand throughout the value chains of the fashion industry that emphasize the importance of fashion technology. Accordingly, as various viewpoints and fields of debate are unfolding to consider the direction of change led by fashion technology, it is necessary to make an active value judgment precedent by understanding the differences between various opinions. This study aims to derive keywords from fashion technology used during the pandemic, to infer the characteristics of each type of perspective and to understand their characteristics. For the research, this study combines text mining analysis and content analysis. Text mining analysis is used to find statistical patterns by collecting keywords from big data from online media, and content analysis is used to interpret the data qualitatively. After analyzing the results of this study, the following observations are made. First, the perspective of positive acceptance seeks to maximize the perception and sensory action of fashion through technology; this amplifies experience, an opportunity for innovation and efficiency. Second, critical vigilance highlights the side effects of radical changes in fashion technology, characterized by concerns about capital-centered polarization, threats to human rights, and infringement of creative thinking. Lastly, the perspective of gradual adoption is the gradual convergence of technologies, characterized by the pursuit of an appropriate balance.

Fashion Image Expression on Video Conferencing Platforms -Focusing on Korean Female Office Workers in Their 20s and 30s- (비대면 화상 플랫폼에서의 패션 이미지 표현 특성 -20~30대 한국 직장인 여성을 중심으로-)

  • Sujin Lim;Jisoo Ha
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.48 no.1
    • /
    • pp.20-36
    • /
    • 2024
  • Over the past three years, even amidst viral threats, a notable shift towards online interactions has been observed. This trend persists the presence of significant viral concerns. Our study centered on female office workers in their twenties and thirties in Korea, seeking to comprehend how they enhance and present their external image in the digital era. We explored the use of digital devices and fashion choices that enable them to amplify their self-expression in video conferences. Using a mix of surveys and in-depth interviews, we employed snowball sampling to recruit twelve participants. These women were given the opportunity to shape their digital persona either to uphold their current image or to adapt it for interactions where they weren't face-to-face. Their desired images fell into three distinct categories: an authoritative professional image, a clean modern image, and a natural image. Depending on the context, the participants aimed to convey these images independently or in various combinations. Our findings suggest the need to develop strategies for acknowledging and projecting individual fashion identities in non-face-to-face interactions. Such strategies would empower individuals to better align their online personas with their desired self-image, whether it's professional, modern, clean, natural, or a combination thereof.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.