• Title/Summary/Keyword: theft

Search Result 276, Processing Time 0.033 seconds

A Study on the Current Status of the Use of Bike Parking Lots in Apartments - For the Apartments with Bike Parking Lots in Gwangju Metropolitan City - (아파트 자전거 주차장 이용실태에 관한 조사 연구 - 광주광역시 자전거 주차장 설치 아파트를 대상으로 -)

  • Kim, Yun-Hag;Park, Sung-Jin
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.21 no.2
    • /
    • pp.43-51
    • /
    • 2019
  • The purpose of this study was to examine the current status of the use of bike parking lots in apartment complexes located in Gwangju Metropolitan City. The results were as follows. While common respondents answered the use of a bike for leisure or health, relatively few respondents answered a means of transportation such as going to school or work. It suggests that systematic plans to expand the range of using a bike should be made such as the connection of an apartment complex with a bike road. The common places to keep bikes were the entrance, the inside of the house, or stairs rather than bike parking lots because of safety problems such as theft or damage. In this regard, it is necessary to prepare clear regulation guidances to complement the safety problems of bike parking lots such as CCTV installation in the parking lots or compulsory installation of night lighting. Based on the findings, the methods to improve a bike parking lot should consider safety solutions and the complement of locations or keeping types. To activate the use of a bike, it is necessary to improve facilities to help residents' use of bike parking lots and expand their size in the future and examine the design of bike racks.

Relationship Between Co-operative Society Governance And Members Satisfaction: A Case Study of the Ambrose Alli University Workers/Farmers Multi-Purpose Cooperative Society, Edo State, Nigeria

  • Ekhorutomwen, Asemota Abel;Peters, Ojeakeri Benson
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.4
    • /
    • pp.87-99
    • /
    • 2021
  • The study examines the relationship between co-operative society governance and members' satisfaction. Co-operative societies face problems of how to keep balance between efficiency and governance because those in charge of operations of co-operative; the board and the staff must meet two demands i.e. good business practice and the social responsibility which involves the satisfaction of members. The objective of this study is to examine the relationship between co-operative governance and members' satisfaction using Ambrose Alli University Workers/Farmers Multi -Purpose the Co-operative Society as a case study. The data collected in this study were obtained through structured questionnaire. Data analyzed were subjected to descriptive statistics and graphs. The data analyzed indicated that the challenges facing the co-operative society include theft /fraud and mismanagement. Members agitated for transformation of the co-operative society to operate in line with the guidelines of the Central Bank of Nigeria. It was recommended that for efficiency and high productivity, staff should be trained. Also there is need for innovative technology and the necessity for the cooperative society in question to network with other organizations.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

Research on Security Threats for SMEs by Workplace in the COVID-19 Environment

  • Kim, Woo-Su;Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.307-313
    • /
    • 2022
  • Although telecommuting of SMEs has been activated due to the COVID-19 phenomenon, the security model for this is insufficient. Accordingly, the study was divided into threats centered on smartphones and threats centered on smartphone users. As a result of the study, one-third of SMEs are working from home. At this company with 100 employees, more than 50% of them work from home.and In the metal, machinery and chemical industries with factories, 20% of them work from home. As a result of analyzing the correlation between telecommuting according to the presence or absence of a factory, the correlation coefficient (r=-.385) has a clear linear relationship. And, as a result of the regression analysis, the R-squared value was 0.148, so companies with factories are highly related to telecommuting. In other words, we found that SMEs with factories do not want to work from home. In addition, as a result of analyzing the level of security threats, there were great concerns about theft, hacking, and phone taking during remote work. As limitations of the study, there were difficulties in selecting SMEs from the population in a non-face-to-face work environment, and there were limitations in the questionnaire items for deriving a non-face-to-face work environment.

A Study on the Metaverse Framework Security Service (메타버스 서비스를 위한 보안 모델 연구 )

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.82-90
    • /
    • 2022
  • emerging. And it shows numerous possibilities and tremendous potentials in the virtual world. This metaverse is not limited to one type, but it is evolving and developing into a service in the form of a virtual convergence economy by breaking down boundaries. As a result, various security issues in metaverse are emerging. Metaverse performs all activities in the virtual space, so various problems such as privacy infringement, virtual asset theft, or fraud can occur. In this paper, a service security model is proposed to provide safe services on metaverse. To this end, we analyze security threats in the metaverse framework and propose a security service model to prevent threats. By evaluating the security of the proposed model, it was shown that safe services are effectively possible on the metaverse.

A Novel Node Management in Hadoop Cluster by using DNA

  • Balaraju. J;PVRD. Prasada Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.134-140
    • /
    • 2023
  • The distributed system is playing a vital role in storing and processing big data and data generation is speedily increasing from various sources every second. Hadoop has a scalable, and efficient distributed system supporting commodity hardware by combining different networks in the topographical locality. Node support in the Hadoop cluster is rapidly increasing in different versions which are facing difficulty to manage clusters. Hadoop does not provide Node management, adding and deletion node futures. Node identification in a cluster completely depends on DHCP servers which managing IP addresses, hostname based on the physical address (MAC) address of each Node. There is a scope to the hacker to theft the data using IP or Hostname and creating a disturbance in a distributed system by adding a malicious node, assigning duplicate IP. This paper proposing novel node management for the distributed system using DNA hiding and generating a unique key using a unique physical address (MAC) of each node and hostname. The proposed mechanism is providing better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The main target of this paper is to propose an algorithm to implement Node information hiding in DNA sequences to increase and provide security to the node from hackers.

A Study on Similarity Comparison for Detecting Theft of Android Application (안드로이드 앱 도용 탐지를 위한 유사도 비교 연구)

  • Park, Seik;Park, Heekwang;Choi, Sungha;Park, Heewan
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.868-871
    • /
    • 2011
  • 소프트웨어 버스마크는 모든 프로그램에 이미 포함되어 있으며 서로 다른 프로그램을 식별하는데 사용될 수 있는 프로그램의 고유한 특징을 말한다. 본 논문에서는 소프트웨어 버스마크를 이용하여 안드로이드 앱 사이의 유사도를 측정하고 코드 도용 탐지에 활용하는 방법을 제안하였고, 다양한 카테고리의 안드로이드 앱에 대한 유사도 비교 실험을 하였다. 먼저, 같은 개발사에서 만든 유사한 프로그램을 대상으로 버스마크 유사도를 측정한 결과 유사도가 매우 높다는 것을 확인하였다. 또한, 서로 다른 개발사에서 만든 유사한 카테고리의 프로그램을 비교하였고 비슷한 프로그램이라도 서로 다른 개발사에서 만든 앱이기 때문에 유사도가 낮다는 것을 확인하였다. 마지막으로, 서로 다른 개발사의 유사한 프로그램들 중에서 유사도가 높게 측정된 경우를 탐지한 실험 결과를 제시하였다. 이러한 유사 앱들은 실제로 공통 클래스를 함께 포함하고 있었다. 실험 결과들을 바탕으로 소프트웨어 버스마크가 안드로이드 앱 사이의 공통 클래스를 탐지하는데 활용될 수 있음을 확인하였고, 더 나아가 안드로이드 앱에서의 코드 도용을 탐지하는 목적으로도 활용될 수 있음을 보여주었다.

A Study on Management Functions of Intelligent Reflectors Environment (지능형 반사경의 관리 기능 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.433-440
    • /
    • 2023
  • When the reflector is hit by a vehicle or returned by a storm, an event is generated by the impact sensor and a trigger is operated. The trigger processing algorithm of this paper compares the X, Y, and Z values of the gyro sensor with the registered values and proposes to drive them to the original values by the operation of the 3-axis driving motor. And by recognizing the vehicle license plate, if the vehicle is stolen or a social problem, information is provided to the police operation network. When the reflector is stolen or moved, it has a registered GPS value, so it operates the theft monitoring function to process it.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Current Status and Prospects of Mobile Content Platforms (모바일 콘텐츠 플랫폼 현황과 전망)

  • Kim, Ji-hyun;Yu, Ji-in;Jeong, Ji-won;Han, Ye-jin;Choi, hun;Lee, Yong-Seol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.596-598
    • /
    • 2022
  • Mobile is expanding beyond just a content consumption tool to an exclusive platform role. Mobile content refers to the services of companies using mobile devices. The advantage is that it can analyze the user's behavior in real-time, increasing satisfaction according to preference. On the other hand, the disadvantage is that minors can easily make paid payments due to a convenient online payment environment. Be careful not to be exposed to provocative media without using a content unauthorized theft platform. In addition, it is necessary to find ways to increase the net function of the mobile content platform and reduce the dysfunction.

  • PDF