• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.031 seconds

A study on the improvement of hiring system in the military human resources: introduction of modified blind hiring (군 인적자원 채용제도 개선에 관한 연구 : 수정형 블라인드 채용의 도입 검토)

  • Jung, Jung Kyun;Park, Cheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.93-99
    • /
    • 2019
  • In the Republic From the national interest in the recent hiring scandals in the public institutions such as the Financial Supervisory Service, Gangwon Land, and so on, people were outraged by the fact that the competition opportunities were not secured although they should be equally secured to compete with anyone with their capabilities in the fair process. Hence, the government made the public institutions blind hiring to be mandatory, which eliminated writing the academic background, GPA, and English score in the application form and selected the new employees only with job competencies in the public institutions in 2017. In 2018, the prosecution did their best for the investigation on hiring scandal with the strong will to cut the scandal upon announcement of 5-year anti-corruption master plan. Amid this controversy, this study tries to suggest the further direction in the hiring military human resources upon introduction of blind hiring system, reviewing the needs to introduce blind hiring system in the military, the governmental guideline according to the mandatory blind hiring in the public institutions, and the application status of modified blind hiring in the military.

Overview of Design Rhetoric (디자인 수사학의 논의와 전망)

  • 강현주
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.181-190
    • /
    • 2002
  • Rhetoric, simply defined, is the art of persuasion. Gui Bonsiepe, Robin Kinross, Hanno, Ehses and Richard Buchanan have all spoken of rhetoric as an element of the theory of design. St. Joost Academy in the Netherlands has tried to present the theory and practice of a new kind of designing based on rhetoric since 1995. Post-St Joost was the name of the experimental graduate programme. They adopted visual rhetoric as a matrix for setting up a new type of exercise and assignment in design education. In this paper, 1 have tried to show that rhetorical approach can play an important role in the development of a view of design as a discipline in its own right. The first chapter looks at the brief history of rhetoric in western culture. And the following chapter focuses on the development of design rhetoric and visual rhetoric in the twentieth century. 1 hope this essay will contribute to find the designerly way of knowing, thinking and doing.

  • PDF

Improved Data Concealing and Detecting Methods for OOXML Document (OOXML 문서에 대한 향상된 데이터 은닉 및 탐지 방법)

  • Hong, Kiwon;Cho, Jaehyung;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.489-499
    • /
    • 2017
  • MS office is a office software which is widely used in the world. The OOXML format has been applied to the document structure from MS office 2007 to the newest version. In this regard, the method of data concealing, which is a representative anti-forensic act has been researched and developed, so the method of detecting concealed data is very important to the digital forensic investigation. In this paper, we present an improved data concealing method bypassing the previewers detecting methods for OOXML formatted MS office documents. In addition, we show concealment of the internal data like sheets and slides for MS office 2013 Excel and PowerPoint, and suggest an improved detecting algorithm against this data concealing.

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

A Study on the Individual Recognition with Skull Image Composition (두개골 영상합성에 의한 개인감정시스템 연구-II)

  • 송현교;이양원;강민구
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.1
    • /
    • pp.3-10
    • /
    • 1998
  • In this paper, a new superimposition scheme using a computer vision system was proposed with 7 pairs of skull and ante-mortem photographs, which were already identified through other tests and DNA fingerprints at the Korea National Institute of Scientific Investigation. At this computer vision system, an unidentified skull was caught by video-camcoder with the MPEG and a ante-mortem photograph was scanned by scanner. These two images were processed and superimposed using pixel processing. Recognition of the individual identification by anatomical references was performed on the two superimposed images. This image processing techniques for the superimposition of skull and ante-morterm photographs simplify used the previous approach taking skull photographs and developing it to the same size as the ante-mortem Photographs. This system using various image Processing techniques on computer screen, a more precise and time-saving superimposition technique could be able to be applied in the area of computer individual identification.

  • PDF

Methods for Investigating of Edit History about MS PowerPoint Files That Using the OOXML Formats (OOXML형식을 사용하는 MS 파워포인트 파일에 대한 편집 이력 조사 방법)

  • Youn, Ji-Hye;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.215-224
    • /
    • 2012
  • Today, individuals and businesses are a lot of paperwork through a computer. So many documents files are creating to digital type. And the digital type files are copied, moved by various media such as USB, E-mail and so on. A careful analysis of these digital materials can be tracked that occurred during the document editing work history. About these research are on the compound document file format, but has not been studied about the new OOXML format that how to analyze linkages between different document files, tracking an internal order, finding unsaved file for identify the process of creating the file. Future, the use of OOXML format digital documents will further increase, these document work history traceability in digital forensic investigation would be a big help. Therefore, this paper on the new OOXML format(has a forensic viewpoint) will show you how to track the internal order and analyze linkages between the files.

Distributions of Nicotine and Toluene in Teenagers' Urine (청소년의 뇨 중에서 nicotine과 톨루엔의 분포에 관한 연구)

  • Park, Sungwoo;Seo, Baeseck;You, Jaehoon;Kim, Namyee;Shin, Hosang;Han, Wansoo;Kim, Ilkwang
    • Analytical Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 1997
  • We identified nicotine, cotinine and toluene in high school volunteer's urine by using GC/NPD, GC/FID and GC/MS. To analyze of nicotine and cotinine, urine samples were extracted with diethylether and centrifuged on a benchtop centrifuge for 5 min. The upper organic layer was injected into a GC. The distributions of nicotine and cotinine were $4{\sim}630{\mu}g/L$ and $63{\sim}1,602{\mu}g/L$ in smoking-group, respectively. To analyze of toluene, head space vial was filled with 2mL sodium citrate solution and 1mL of urine. The vial was warmed in a water bath at $55^{\circ}C$ for 20min, and then $250{\mu}L$ of head space air was injected into a GC. The result show that toluene was not detected in all of the volunteers' samples. However, the range of toluene was 0.1~28.0mg/L in glue sniffer's urine samples(NISI data).

  • PDF

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

Improvement Method of Forensic Accounting Using Characteristics of Accounting Programs Used in Windows System (윈도우 시스템에서 사용되는 회계 프로그램의 특성을 이용한 포렌식 어카운팅 기법 개선 방안)

  • Lee, Seung-ju;Lee, Kuk-heon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1099-1105
    • /
    • 2017
  • Enterprises use different accounting programs to process vast amounts of accounting data. Due to the characteristic of the accounting program, in addition to the accounting data used by the accounting program, there is a variety of information to help detect accounting fraud. Existing forensic accounting techniques have limited scope of analysis because they analyze only accounting data like accounting ledger without using such information. When you do accounting fraud detection, information obtained from characteristics of accounting program can be used to obtain various information that can not be obtained by accounting data analysis alone. In this paper, we try to contribute to effective accounting fraud investigation by suggesting a technique to effectively detect accounting fraud by using other data obtained from characteristics of accounting program used in Windows system.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.