• Title/Summary/Keyword: privacy invasion

Search Result 158, Processing Time 0.024 seconds

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

study about social issues according to the surveillance society time : benefit, controlled society? (감시사회의 도래에 따른 사회적 이슈에 관한 고찰: 혜택인가, 통제인가?)

  • Kim, Sang-Jin;Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.73-79
    • /
    • 2014
  • In the 21st century, the higher CCTV, hidden Camera, and surveillance and contra-surveillance in Cyber-space are, the higher the voices of concern about surveillance society nationally are. Nevertheless, phenomenon of panoptisme is becoming into general use. Actually, this watching system should be on the rise but this is the output playing up and advertising the positive effect of immediate convenience and offering safety that government and business made. Thus, this study wants to offer implication to warn the invasion of privacy and generalization controlled society as pointed out cause and problem of the surveillance society time according to the digital era.

The Direction for a Sustainable Residential Environment Plan based on Resident Testimonies about the Use of the 'Streets in the Sky' of the Park Hill Flats in the United Kingdom

  • Park, Joon Young;Park, Woo Jang;Jeong, Sang Kyu
    • KIEAE Journal
    • /
    • v.14 no.2
    • /
    • pp.61-68
    • /
    • 2014
  • This study aims at proposing a sound and sustainable development direction of an residential environment by analyzing testimonies of residents who lived in Park Hill flats or their surround at Sheffield City in the United Kingdom. The results are obtained through the analysis on a residential environment of Park Hill flats, opinions of the residents on its refurbishment, and effects of the building on the residential environment. The block of Park Hill flats was a community with a strong unity and solidarity, but that became increasingly a slum by the decline of the physical and social environment since the 1980s. In particular, it was identified that the deterioration of the social environment than that of the physical environment was a major cause of the decline. Nevertheless, it was found that "streets in the sky", the concept applied in Park Hill, played a key role in activating the community in the apartment complex. However, that street system in the complex has caused noise, poor security, and invasion of privacy. If such problems are solved, the streets in the sky will be a meaningful alternative for community activation and then ensuring sustainability in Korean residential environments that lost the function of the community.

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

The Experience of Nursing Staff on the Dementia Patients′ Aggressive Behavior (간호제공자들의 치매노인 공격행동 경험에 대한 연구)

  • 오진주
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.2
    • /
    • pp.293-306
    • /
    • 2000
  • Providing care to the dementia elderly with behavioral problem is a major issue in nursing homes today. This study was aimed to explore the nursing staffs′ response to aggressive dementia patients, and the effect that the aggressive behavior had on Nsgstaff. The interviews used a semi-structured questionnaire are were carried out from May to July, 1999. The subjects were 23 nursing personnel working in the nursing homes for dementia elderly. The result are as follows; 1. The types of aggressive behavior cited by the subjects was "physical", "linguistic", and "sexual". 2. The factors that caused the behavior were "symptoms of disease", "under- conditioning", "context of nursing care", "unsatisfied need", "relationship to other patients", "change of outer environment", and "invasion of one′s own privacy". 3. The response of the subjects were "unhappiness", "stress", "anger", "exaggeration", "anxiety", and "fear". 4. The management strategies listed by nursing personnel used to alleviate aggressive behavior were "ignorance" "patience" "leaving the area" "soothing sounds" "verbal punishment" "restriction and isolation" and "various management skill appliance" "adaptation". 5. The effect that aggressive behavior and were "disturbance of relationship to elderly" "decline in the amount and quality of nursing care" "interruption of task performance" "job exhaustion" "desire to leave the job" "physical impact" "stress on the cognition of others" "anxiety about health and one own future" "interference to family life′. The findings of this study will be useful in understanding the difficulties of nursing personnel when confronting the aggressive behavior of dementia partients. It also is useful as basic data in preparing efficient intervention program for these difficulties.

  • PDF

A Study on North Korea's Cyber Attacks and Countermeasures (북한의 사이버공격과 대응방안에 관한 연구)

  • Chung, Min Kyung;Lim, Jong In;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

A Study on the Psychological anxiety on Private information leakage to likelihood of internet users (인터넷 이용자의 개인정보 유출 가능성에 대한심리적 불안에 관한 연구: 성별, 이용량, 이용 빈도를 중심으로)

  • Jin, Seong-Cheol;Kim, In-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.731-737
    • /
    • 2011
  • The purpose of this study is to examine Internet users' psychological anxiety about the possibility of personal information leakage. The investigator examined the difference of psychological anxiety focusing on the possibility of personal information leakage according to the use amount of Internet, the number of joined sites and the frequency of e-commerce transaction. Study findings show that women felt more psychological anxiety than men did. In addition, people who used Internet more frequently felt more psychological anxiety. However, the number of joined sites and the average frequency of e-commerce transaction in a month had no significant influence upon users' psychological anxiety about the possibility of personal information leakage.

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

The Effect of Technostress on Counterproductive Work Behavior (테크노스트레스가 반생산적 과업행동에 미치는 영향)

  • Lee, Jaekang;Park, Taekyung
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.1-14
    • /
    • 2015
  • Due to advances in information and communication technologies (ICTs) and the advent of the Smartphone, people have access to the internet and can work at any time and any where. These are however likely to cause negative effects such as the personal information leakage and invasion of privacy. Caused by negative aspects of ICTs, the stress is so-called technostress. Recently, it is reported that managers tend to task order to their subordinates using an SNS or mobile messenger on a real-time basis after office hours or even on holiday, leading to a sharp increase in technostress. While previous studies of stress indicate that it is associated with the counter-productive work behavior (CWB), no empirical evidence has shown about the relationship between technostress and CWB. This study aims to explore the effect of technostress on CWB. In addition, it seeks to clarify the moderating effect of leader-member exchange(LMX) in this relationship. Drawing on literature regarding technostress and CWB, hypotheses are developed and tested with the sample of 101 using regression analyses. Results show that technostress has a significantly positive effect on CWB, but LMX has an insignificant moderating effect in the relationship between technostress and CWB. Implications and limitations with suggestions for future studies are presented.

A Study on Improvement of Crime Prevention Environment Design in Gyeongui Line Forest Park - In Case of Changjeon-dong section - (경의선 숲길공원의 범죄예방 환경디자인 개선점 연구 - 창전동 구간을 중심으로 -)

  • Kim, Yeon-Kyeong;Yoo, Daun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.1
    • /
    • pp.113-124
    • /
    • 2020
  • The purpose of this study is to suggest an improvement for the CPTED(Crime Prevention Through Environmental Design) guidelines for the urban linear park. We analysed the Changjeon-dong section of Gyeongui Line Forest Park into 12 sub-areas and evaluated CPTED design applied on the park based on analysis framework derived from 15 precedent studies by conducting on-site observations. Both surveys and in-depth interviews on users of the park were conducted and the results of analysis on the evaluation from users and the on-site observation were compared. We found that the lighting condition and the height of wall and trees at the park boundaries are very important to insure natural surveillance since the adjacent areas are easy to be hidden from passers-by and subject to invasion and threat of crime while protecting the privacy of residents on the boundary. There should be improvement on management facilities and crime prevention facilities for more safe and convenient use of the linear park and the adjacent commercial use during nighttime also need to be managed for conflicts between various type of users.