• Title/Summary/Keyword: security service

Search Result 3,721, Processing Time 0.033 seconds

A Study on the Governance of U.S. Global Positioning System (미국 글로벌위성항법시스템(GPS)의 거버넌스에 관한 연구 - 한국형위성항법시스템 거버넌스를 위한 제언 -)

  • Jung, Yung-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.3
    • /
    • pp.127-150
    • /
    • 2020
  • A Basic Plan for the Promotion of Space Development (hereinafter referred to as "basic plan"), which prescribes mid- and long-term policy objectives and basic direction-setting on space development every five years, is one of the matters to be deliberated by the National Space Committee. Confirmed February 2018 by the Committee, the 3rd Basic Plan has a unique matter, compared to the 2nd Basic Plan. It is to construct "Korean Positioning System(KPS)". Almost every country in the world including Korea has been relying on GPS. On the occasion of the shooting down of a Korean Air flight 007 by Soviet Russia, GPS Standard Positioning Service has been open to the world. Due to technical errors of GPS or conflict of interests between countries in international relations, however, the above Service can be interrupted at any time. Such cessation might bring extensive damage to the social, economic and security domains of every country. This is why some countries has been constructing an independent global or regional satellite navigation system: EU(Galileo), Russia(Glonass), India(NaVic), Japan(QZSS), and China(Beidou). So does South Korea. Once KPS is built, it is expected to make use of the system in various areas such as transportation, aviation, disaster, construction, defense, ocean, distribution, telecommunication, etc. For this, a pan-governmental governance is needed to be established. And this governance must be based on the law. Korea is richly experienced in developing and operating individually satellite itself, but it has little experience in the simultaneous development and operation of the satellites, ground, and users systems, such as KPS. Therefore we need to review overseas cases, in order to minimize trial and error. U.S. GPS is a classic example.

The Want for Home-Visit Health Care in Rural Olders (농촌지역(農村地域) 노인(老人)의 방문보건의료(訪問保健醫療) 요구도(要求度))

  • Kwag, Hwa-Soon;Kam, Sin;Kim, Jong-Yeon;Ahn, Soon-Gi;Jin, Dae-Gu;Lee, Kyung-Eun;Cha, Byung-Jun
    • Journal of agricultural medicine and community health
    • /
    • v.27 no.1
    • /
    • pp.143-153
    • /
    • 2002
  • This study was performed to examine the want for home-visit health care of health center and health sub-center in rural olders and to provide the basic data to develop strategies for efficient and effective home-visit health care delivery of public health facilities. The questionnaire survey by interview was conducted to 355 olders whose ages were all over 65 years, residing at a rural community, Myun, Gyeongsangbuk- do. Among study population, 64.5% replied that their self-rated health status were 'poor', 14.1% had low ADL and 14.9% had low IADL. Among study population, 73.5% replied that they had health problem which were in need of medical personnel's care. The existence of health problem were significantly different according to sex, age, marital status, health security status, occupation, economic status, circumstances for medical care, self-rated health status, ADL, and IADL(p<0.05). Among olders with health problem which were in need of medical personnel's care, 19.5% wanted to receive the home-visit health care. The degree of want for home-visit health care was higher significantly in olders whose ages were 75-year old or more(p<0.05), jobless olders(p<0.01), the aged persons who were not in harmony with other family members, olders whose self-rated health status were 'poor' and olders with low IADL. The major reasons why they wanted to receive the home-visit health care services were 'they had no helpers when they were sick' (64.7%), 'long distance to the medical facilities from their residence'(23.5%). The medication service was the most need service among home-visit health care services. The reasons why they didn't want to receive the home-visit health care services were 'we could walk and move' (60.0%), 'we wanted to have a direct contact with doctor' (25.7%) in the order of high rate. In multiple logistic regression analysis, the degree of want for home-visit health care were higher significantly in olders who were not in harmony with other family members and olders whose self-rated health status were 'poor'(p<0.05).

  • PDF

Performance Status of Sanitary Management of School Food Service in the Jeonnam Area (전남지역 학교급식의 위생관리 실태)

  • 고무석;정난희;이전옥
    • Korean Journal of Human Ecology
    • /
    • v.7 no.1
    • /
    • pp.51-67
    • /
    • 2004
  • This study analyzed the effects of nutrition technicians' hygiene education on cooking workers' performance of hygiene management in order to ensure the security of school meals. The situation of cooking workers' disposition in subject schools was elementary school(51.1%) and middle school(48.9%) and the type of meals was rural area type(54.2%), urban type(36.5%). and island and isolated area type(9.3%). The methods of meals management were single cooking(88.2%) and joint cooking and management(11.8%). The type of distributing meals was distributing in a dining room(93.5%), in a classroom(3.7%), and in both dining room and classroom(2.8%). Nutrition technicians' employment form included regular(53.5%) and daily(88.2%). Their education was junior college graduate(50.2%), university graduate(44.8%). and graduate school students(5.0%). Cooking workers' employment form included daily(88.2%) and regular (11.1%). suggesting that most were regular. Most cooking workers(77.4%) had at least high school certificate. Regarding the situation of cooking workers' disposition in subject schools, the number of student per one cooking worker was found as 91-120(37.2%), 61-90(22.6%). 60 and under(21.l %). 121-15006.7%). and 151 and over(2.5%). Cooking workers' level of performance of hygiene management was post-working stage(66.37/75 marks), pre-working stage(64.22/75 marks). and working stage(20.34/25 marks), The counting of meals articles in a pre-working stage(20.34/25 marks). temperature and required time in a working stage(18.78/25 marks), and machinery equipment and hygiene in a pre-working stage(21.40/25 marks) showed lowest of performance, which suggest poor service of hygiene. Cooking workers' performance of hygiene management by working stage showed the significant difference with school class(p<.001), type of schools with meals(p<.05). state of cooking workers' employment(p<.001), and cooking worker's disposition(p<.05). A working stage showed the significant difference with type of schools with meals(p<.05). A post-working stage showed the significant difference according to type of schools with meals(p<.05), and the methods of meals management(p<.05), and cooking workers' disposition(p<.05). In the execution of hygiene education, individual hygiene was highest(94.8%), followed by the management of machinery equipment and tools(89.7%), food poisoning and microorganism(94.7%), and the method of food treatment(76.4%). A yearly plan of hygiene education included established(83.9%) and not established(l6.1%). Regular education included not executed(25.1%), 2-3 times a month(l6.1%), and more than 4 a month(4.0%) and occasional education was not executed(57.0%), 1-3 times a month(26.3%), and more than 4 a month(l5.7%). In the methods for hygiene education, oral education(95.7%) was used most, followed by demonstration(10.5%), poster/photo(10.5%), video/slide(3.7%), and computer(3.7%). Frequency of improvement and complement of hygiene education included once a month(56.3%), once a year(20.7%), by quarter(l1.5%), and every six months(1l.5%). Newspaper was used most in materials of hygiene education, followed by internet, TV, nutrition technician's reeducation, information exchange between members, educational office's training, and reference book, and educational office's material. and symposium. Cooking workers' assessment of the effect of hygiene education was conducted through observation(56.8%), check table(l5.2%), question(l4.0%), and examination(14.0%). The reason of cooking workers' low level of performance included habitual custom(53.9%), lack of understanding(20.4%), overwork(l4.6%), and lack of knowledge(l1.l%) and the reason of difficulty in hygiene education included lack of time(55.3%), lack of understanding(27.6%), lack of knowledge and information(8.7%), and lack of budget(48.0%).

  • PDF

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

College-bound Curriculum Developement for Training of Atomic Industry Technician (원자력산업 중견전문인력 양성을 위한 전문대학 교육과정 개발)

  • Lyu, Kwang-Yeul;Kim, Sung-Soo;Ahn, Sung-Min
    • Journal of radiological science and technology
    • /
    • v.28 no.1
    • /
    • pp.33-44
    • /
    • 2005
  • The objective of this study is to supply the good quality of experts the radiation industries in Korea and develop the major subject matter needed in the radiation industries and the curriculum in order to execute it for the variation of fields of employment at the department of radiation in the junior college and the development of the percentage of employment. In addition, this study is to improve the level of radiation experts engaged in the industries in quality, and it is to improve the social recognition of radiation rather negative now because of the development of radiation industry. As for the core results of this research, it was to suggest the detailed choice method curriculum proper to the service fields of radiation industries, but it may be subject to change due to each college's property and the educational objectives. From the result of this research above, it may be summed up as follows. First, as for the detailed curriculum by the service field, this study was to organize two subject matters: 1. the subject matter proper to the field of using the radiation, and 2. the subject matters proper to the safety control field of radiation. Second, as for the detailed curriculum by the pattern of industries, this study was to organize the four subject matters: 1. the subject matter needed in the manufactures, 2. the subject matter needed in the nondestructive testing industries, 3. the subject matter needed in the sales agencies, and 4. the subject matter needed in the laboratories. This study was to suggest the operational model about the curriculum in order to execute these subject matters. It could be executed as two methods below. First, one method is to execute the major systems by the medical field and industrial field in the third course at the department of radiation in the junior college now. Second, the other method is to make them specialize the industrial radiation in the Advanced Course(one year course) after the graduation of junior college. To operate these curricula successively it needs to assume the deeper research and the development of materials about the subject matters related to the nuclear radiation industries hereafter. In addition, it needs to solve the security of finance like the manpower of professor, space for practice, and the educational appliances, etc. needed in the operation of subject matters. Finally, the effect and result from the development or revision of college curriculum did not come out in a short time. It will require considerable time until the undergraduates at the department in the junior college finish a set of curriculum newly developed, and graduate the university, and can get the results while they engage in their works in the industrial sites. Accordingly, all the interested parties have to anticipate the results of this research with the patience in long-standing point of view. Also, this researcher considers it as it is willing to give them the continuous interest and support.

  • PDF

A case study of blockchain-based public performance video platform establishment: Focusing on Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do (블록체인 기반 공연영상 공공 플랫폼 구축 사례 연구: 경기도 뉴미디어 예술방송국 경기아트온을 중심으로)

  • Lee, Seung Hyun
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.108-126
    • /
    • 2023
  • This study explored the sustainability of a blockchain-based cultural art performance video platform through the construction of Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do. In addition, the technical limitations of video content transaction using block chain, legal and institutional issues, and the protection of personal information and intellectual property rights were reviewed. As for the research method, participatory observation methods such as in-depth interviews with developers and operators and participation in meetings were conducted. The researcher participated in and observed the entire development process, including designing and developing blockchain nodes, smart contracts, APIs, UI/UX, and testing interworking between blockchain and content distribution services. Research Question 1: The results of the study on 'Which technology model is suitable for a blockchain-based performance video content distribution public platform?' are as follows. 1) The blockchain type suitable for the public platform for distribution of art performance video contents based on the blockchain is the private type that can be intervened only when the blockchain manager directly invites it. 2) In public platforms such as Gyeonggi ArtOn, among the copyright management model, which is an art based on NFT issuance, and the BC token and cloud-based content distribution model, the model that provides content to external demand organizations through API and uses K-token for fee settlement is suitable. 3) For public platform initial services such as Gyeonggi ArtOn, a closed blockchain that provides services only to users who have been granted the right to use content is suitable. Research question 2: What legal and institutional problems should be reviewed when operating a blockchain-based performance video distribution public platform? The results of the study are as follows. 1) Blockchain-based smart contracts have a party eligibility problem due to the nature of blockchain technology in which the identities of transaction parties may not be revealed. 2) When a security incident occurs in the block chain, it is difficult to recover the loss because it is unclear how to compensate or remedy the user's loss. 3) The concept of default cannot be applied to smart contracts, and even if the obligations under the smart contract have already been fulfilled, the possibility of incomplete performance must be reviewed.

Open Digital Textbook for Smart Education (스마트교육을 위한 오픈 디지털교과서)

  • Koo, Young-Il;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.177-189
    • /
    • 2013
  • In Smart Education, the roles of digital textbook is very important as face-to-face media to learners. The standardization of digital textbook will promote the industrialization of digital textbook for contents providers and distributers as well as learner and instructors. In this study, the following three objectives-oriented digital textbooks are looking for ways to standardize. (1) digital textbooks should undertake the role of the media for blended learning which supports on-off classes, should be operating on common EPUB viewer without special dedicated viewer, should utilize the existing framework of the e-learning learning contents and learning management. The reason to consider the EPUB as the standard for digital textbooks is that digital textbooks don't need to specify antoher standard for the form of books, and can take advantage od industrial base with EPUB standards-rich content and distribution structure (2) digital textbooks should provide a low-cost open market service that are currently available as the standard open software (3) To provide appropriate learning feedback information to students, digital textbooks should provide a foundation which accumulates and manages all the learning activity information according to standard infrastructure for educational Big Data processing. In this study, the digital textbook in a smart education environment was referred to open digital textbook. The components of open digital textbooks service framework are (1) digital textbook terminals such as smart pad, smart TVs, smart phones, PC, etc., (2) digital textbooks platform to show and perform digital contents on digital textbook terminals, (3) learning contents repository, which exist on the cloud, maintains accredited learning, (4) App Store providing and distributing secondary learning contents and learning tools by learning contents developing companies, and (5) LMS as a learning support/management tool which on-site class teacher use for creating classroom instruction materials. In addition, locating all of the hardware and software implement a smart education service within the cloud must have take advantage of the cloud computing for efficient management and reducing expense. The open digital textbooks of smart education is consdered as providing e-book style interface of LMS to learners. In open digital textbooks, the representation of text, image, audio, video, equations, etc. is basic function. But painting, writing, problem solving, etc are beyond the capabilities of a simple e-book. The Communication of teacher-to-student, learner-to-learnert, tems-to-team is required by using the open digital textbook. To represent student demographics, portfolio information, and class information, the standard used in e-learning is desirable. To process learner tracking information about the activities of the learner for LMS(Learning Management System), open digital textbook must have the recording function and the commnincating function with LMS. DRM is a function for protecting various copyright. Currently DRMs of e-boook are controlled by the corresponding book viewer. If open digital textbook admitt DRM that is used in a variety of different DRM standards of various e-book viewer, the implementation of redundant features can be avoided. Security/privacy functions are required to protect information about the study or instruction from a third party UDL (Universal Design for Learning) is learning support function for those with disabilities have difficulty in learning courses. The open digital textbook, which is based on E-book standard EPUB 3.0, must (1) record the learning activity log information, and (2) communicate with the server to support the learning activity. While the recording function and the communication function, which is not determined on current standards, is implemented as a JavaScript and is utilized in the current EPUB 3.0 viewer, ths strategy of proposing such recording and communication functions as the next generation of e-book standard, or special standard (EPUB 3.0 for education) is needed. Future research in this study will implement open source program with the proposed open digital textbook standard and present a new educational services including Big Data analysis.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

The Classification System and Information Service for Establishing a National Collaborative R&D Strategy in Infectious Diseases: Focusing on the Classification Model for Overseas Coronavirus R&D Projects (국가 감염병 공동R&D전략 수립을 위한 분류체계 및 정보서비스에 대한 연구: 해외 코로나바이러스 R&D과제의 분류모델을 중심으로)

  • Lee, Doyeon;Lee, Jae-Seong;Jun, Seung-pyo;Kim, Keun-Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.127-147
    • /
    • 2020
  • The world is suffering from numerous human and economic losses due to the novel coronavirus infection (COVID-19). The Korean government established a strategy to overcome the national infectious disease crisis through research and development. It is difficult to find distinctive features and changes in a specific R&D field when using the existing technical classification or science and technology standard classification. Recently, a few studies have been conducted to establish a classification system to provide information about the investment research areas of infectious diseases in Korea through a comparative analysis of Korea government-funded research projects. However, these studies did not provide the necessary information for establishing cooperative research strategies among countries in the infectious diseases, which is required as an execution plan to achieve the goals of national health security and fostering new growth industries. Therefore, it is inevitable to study information services based on the classification system and classification model for establishing a national collaborative R&D strategy. Seven classification - Diagnosis_biomarker, Drug_discovery, Epidemiology, Evaluation_validation, Mechanism_signaling pathway, Prediction, and Vaccine_therapeutic antibody - systems were derived through reviewing infectious diseases-related national-funded research projects of South Korea. A classification system model was trained by combining Scopus data with a bidirectional RNN model. The classification performance of the final model secured robustness with an accuracy of over 90%. In order to conduct the empirical study, an infectious disease classification system was applied to the coronavirus-related research and development projects of major countries such as the STAR Metrics (National Institutes of Health) and NSF (National Science Foundation) of the United States(US), the CORDIS (Community Research & Development Information Service)of the European Union(EU), and the KAKEN (Database of Grants-in-Aid for Scientific Research) of Japan. It can be seen that the research and development trends of infectious diseases (coronavirus) in major countries are mostly concentrated in the prediction that deals with predicting success for clinical trials at the new drug development stage or predicting toxicity that causes side effects. The intriguing result is that for all of these nations, the portion of national investment in the vaccine_therapeutic antibody, which is recognized as an area of research and development aimed at the development of vaccines and treatments, was also very small (5.1%). It indirectly explained the reason of the poor development of vaccines and treatments. Based on the result of examining the investment status of coronavirus-related research projects through comparative analysis by country, it was found that the US and Japan are relatively evenly investing in all infectious diseases-related research areas, while Europe has relatively large investments in specific research areas such as diagnosis_biomarker. Moreover, the information on major coronavirus-related research organizations in major countries was provided by the classification system, thereby allowing establishing an international collaborative R&D projects.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.