• Title/Summary/Keyword: network threat

Search Result 435, Processing Time 0.025 seconds

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Chronic pain control in patients with rheumatoid arthritis (만성통증 환자의 통증 조절)

  • Eun, Young
    • Journal of muscle and joint health
    • /
    • v.2 no.1
    • /
    • pp.17-40
    • /
    • 1995
  • Rheumatoid arthritis is the one of the chronic diseases, one of its major symptoms is a chronic pain. Despite developing medical treatment and surgical techniques, it is suggested that to control the pain is the goal of the treatment. But pain is an inner experience and even those closest to the patient cannot truly observe its progress or share in its suffering. The National Academy of Sciences Institute of Medicine's report on Pain and Disability concluded that there is no objective measure of pain-(exactly) no pain thermometer-nor can there ever be one, because the experience of pain is inseparable from personal perception and social influence such as culture. To explore chronic pain experience is to understand the process and property of the patient's perception of pain through the response to pain, the coping with pain, and the adaptation to pain. Therefore a qualitative study was conducted in order to gain an understanding of pain experience of patients with RA in korea. I used naturalistic inquiry as a research methodology, which had 5 axioms, the first is that realities are multiple, constructed, and holistic, the second is that knower and known are interactive, inseparable, the third is only time and context bound working hypotheses(idiographic statements) are possible, the forth is all entities are in a state of mutual simultaneous shaping, so that it is impossible to distinguish causes from effects and the last is that inquiry is value-bound. Purposive sampling was conducted as a sampling. 20 subjects who experienced pain over 10 years, lived in middle-sized city and big city in Korea, and 17 women and 3 men. The subject's age was from 32 to 62 (average 48.8), all were married, living with their spouse and children, except two-one divorced and the other widow before they became ill. I collected data using In depth structured interview. I had interviews two or three times with each subject, and the interviews were conducted at each subject's home. Each interview lasted about two hours an average. A recording was taken with the consent of the subject. I used inductive data analysis-such as unitizing and categorizing. unitizing is a process of coding, whereby raw data are systematically transformed and aggregated into units. Categorizing is a process wherby previously unitized data are organized into categories that provide descriptive or inferential information about the context or setting from which the units were derived. This process is used constant comparative method. The pain controlling process is composed of behavior of pain control. The behaviors of pain control are rearranging of ADL, hiddening role conflict, balancing treatment, and changing social relation. Rearranging of ADL includes diet management, sleep management, and the adjustment of daily life activities. The subjects try to rearrange their daily activities by modified style of motions, rearranging time span & range of activities, using auxillary facilities, and getting help in order to keep on the pace of daily life. Hiddening role conflict means to reduce conflicts between sick role and their role as a family member. In this process, the subjects use two modes, one is to control the pain complaints, and the other is to internalize the value which is to stay home is good for caring her children and being a good mother. To control pain complaints is done by 'enduring', 'understanding' the other family members, or making them undersood in order to reduce pain. Balancing treatment is composed of two aspects. One is to keep the pain within the endurable level, the other is to keep in touch with medical personnel in order to get the information of treatment and emotional support. Changing social relation is made by information seeking and sharing, formation of mutual support relation, and finally simplification of social relationships. The subjects simplify their social relationships by refraining from relations with someone who makes them physically and psychologically strained. In particular the subjects are apt to avoid contact with in-laws, and the change of relation to in-laws results in lessening the family boundary. In the course of this process, they confront the crisis of family confict result in family dissolution. This crisis is related to the threat of self-existence. Findings from this study contribute to understanding the chronic pain experience. To advance this study, we should compare this result with other cases in different cultural contexts. I think to interpret these results, korean cultural background should be considered. Especially the different family concept, more broader family members and kinship network, and the traditional medical knowledge influences patients' behavior.

  • PDF

A Study on the Restructuration of Norm System in the Field of ICT for the Smart Media (Smart미디어시대 정보통신·미디어(ICT) 분야 규범체계의 재구조화에 관한 연구)

  • Ji, Seong-Woo
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.33-62
    • /
    • 2013
  • In this paper, the consolidation of ICT basic legislation and ICT special legislation concerning "Ministry of Science, ICT and Future Planning" and "Korea Communications Commission" which came on the back of governmental reorganization in recent years is discussed in the theoretical and practical aspect. Development of "data communication technology" innovatively changed the method of livelihood of mankind, the emergence of network under global dimension provided financial social benefit and posed a challenge and a threat at the same time. Form digital revolution human kind can expect to receive many important blessings. Nevertheless, there are many advantages of development of technology by digital revolution, cyberspace like online media, internet etc. has realistically many problems that must be solved. To maximum positive aspects like the expansion of freedom of expression and creating plan of economy by the advance of transmission technology is needed. And to minimize side effects of informatization is required more. The First, Special Act on ICT has an adaptation in normative standardization to be fit in media convergence beyond convergence of broadcasting and telecommunications. Henceforth, there must be established a legal basis for the achievement of protection of economic evolution and freedom of speech in digital media, information, communication technology and content development. The second, the government action is to accomplish economic development and freedom of information in structural aspect of norm. Therefore minimizing normative problem by reorganization of organization remains clearly unresolved in politics. The third, Special Act on ICT must be basic law covering info-communications field, pay telecommunication and media contents field. The forth, from a technical point of view, net neutrality, conflict of interest for digital content and so on can be fixed easily. Special Act on ICT must not only pursuit of development of industry. Special Act on ICT and pursuit of enhancing quality of life of people and preparing program to promote democratization. From now on, we need to make powerful nation of information& communications technology and in information human rights protection field got to be one step ahead of others with reference to appear all the various aspects must be brought together in the discussion of legislation process of Special Act on ICT.

A Study on Perception Change in Bicycle users' Outdoor Activity by Particulate Matter: Based on the Social Network Analysis (미세먼지로 인한 자전거 이용객의 야외활동 인식변화에 관한 연구: 사회네트워크분석을 중심으로)

  • Kim, Bomi;Lee, Dong Kun
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.5
    • /
    • pp.440-456
    • /
    • 2019
  • The controversy of the risk perception related to particulate matters becomes significant. Therefore, in order to understand the nature of the particulate matters, we gathered articles and comments in on-line community related to bicycling which is affected by exposure of the particulate matters. As a result, firstly, the government - led particulate matter policy was strengthened and segmented every period, butthe risk perception related to particulate matters in the bicycle community has become active and serious. Second, as a result of analyzing the perception change of outdoor activities related to particulate matters, bicycle users in community showed a tendency of outdoor activity depending on the degree of particulate matters ratherthan the weather. In addition, the level of the risk perception related to particulate matters has been moved from fears of serious threat in daily life and health, combined with the disregard of domestic particulate matter levels or mask performance. Ultimately, these risk perception related to particulate matters have led some of the bicycling that were mainly enjoyed outdoors to the indoor space. However, in comparison with outdoor bicycling enjoyed by various factors such as scenery, people, and weather, the monotonous indoor bicycling was converted into another type of indoor exercise such as fitness and yoga. In summary, it was derived from mistrust of excessive information or policy provided by the government or local governments. It is considered that environmental policy should be implemented after discussion of risk communication that can reduce the gap between public anxiety and concern so as to cope with the risk perception related to particulate matters. Therefore,this study should be provided as an academic basis for the effective communication direction when decision makers establish the policy related to particulate matters.

Consumer's Negative Brand Rumor Acceptance and Rumor Diffusion (소비자의 부정적 브랜드 루머의 수용과 확산)

  • Lee, Won-jun;Lee, Han-Suk
    • Asia Marketing Journal
    • /
    • v.14 no.2
    • /
    • pp.65-96
    • /
    • 2012
  • Brand has received much attention from considerable marketing research. When consumers consume product or services, they are exposed to a lot of brand related stimuli. These contain brand personality, brand experience, brand identity, brand communications and so on. A special kind of new crisis occasionally confronting companies' brand management today is the brand related rumor. An important influence on consumers' purchase decision making is the word-of-mouth spread by other consumers and most decisions are influenced by other's recommendations. In light of this influence, firms have reasonable reason to study and understand consumer-to-consumer communication such as brand rumor. The importance of brand rumor to marketers is increasing as the number of internet user and SNS(social network service) site grows. Due to the development of internet technology, people can spread rumors without the limitation of time, space and place. However relatively few studies have been published in marketing journals and little is known about brand rumors in the marketplace. The study of rumor has a long history in all major social science. But very few studies have dealt with the antecedents and consequences of any kind of brand rumor. Rumor has been generally described as a story or statement in general circulation without proper confirmation or certainty as to fact. And it also can be defined as an unconfirmed proposition, passed along from people to people. Rosnow(1991) claimed that rumors were transmitted because people needed to explain ambiguous and uncertain events and talking about them reduced associated anxiety. Especially negative rumors are believed to have the potential to devastate a company's reputation and relations with customers. From the perspective of marketer, negative rumors are considered harmful and extremely difficult to control in general. It is becoming a threat to a company's sustainability and sometimes leads to negative brand image and loss of customers. Thus there is a growing concern that these negative rumors can damage brands' reputations and lead them to financial disaster too. In this study we aimed to distinguish antecedents of brand rumor transmission and investigate the effects of brand rumor characteristics on rumor spread intention. We also found key components in personal acceptance of brand rumor. In contextualist perspective, we tried to unify the traditional psychological and sociological views. In this unified research approach we defined brand rumor's characteristics based on five major variables that had been found to influence the process of rumor spread intention. The five factors of usefulness, source credibility, message credibility, worry, and vividness, encompass multi level elements of brand rumor. We also selected product involvement as a control variable. To perform the empirical research, imaginary Korean 'Kimch' brand and related contamination rumor was created and proposed. Questionnaires were collected from 178 Korean samples. Data were collected from college students who have been experienced the focal product. College students were regarded as good subjects because they have a tendency to express their opinions in detail. PLS(partial least square) method was adopted to analyze the relations between variables in the equation model. The most widely adopted causal modeling method is LISREL. However it is poorly suited to deal with relatively small data samples and can yield not proper solutions in some cases. PLS has been developed to avoid some of these limitations and provide more reliable results. To test the reliability using SPSS 16 s/w, Cronbach alpha was examined and all the values were appropriate showing alpha values between .802 and .953. Subsequently, confirmatory factor analysis was conducted successfully. And structural equation modeling has been used to analyze the research model using smartPLS(ver. 2.0) s/w. Overall, R2 of adoption of rumor is .476 and R2 of intention of rumor transmission is .218. The overall model showed a satisfactory fit. The empirical results can be summarized as follows. According to the results, the variables of brand rumor characteristic such as source credibility, message credibility, worry, and vividness affect argument strength of rumor. And argument strength of rumor also affects rumor intention. On the other hand, the relationship between perceived usefulness and argument strength of rumor is not significant. The moderating effect of product involvement on the relations between argument strength of rumor and rumor W.O.M intention is not supported neither. Consequently this study suggests some managerial and academic implications. We consider some implications for corporate crisis management planning, PR and brand management. This results show marketers that rumor is a critical factor for managing strong brand assets. Also for researchers, brand rumor should become an important thesis of their interests to understand the relationship between consumer and brand. Recently many brand managers and marketers have focused on the short-term view. They just focused on strengthen the positive brand image. According to this study we suggested that effective brand management requires managing negative brand rumors with a long-term view of marketing decisions.

  • PDF