• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.025 seconds

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Hermeneutical Philosophy and Philosophical Hermeneutics (해석학적 철학과 철학적 해석학)

  • Lee, Kyeong-bae
    • Journal of Korean Philosophical Society
    • /
    • v.142
    • /
    • pp.165-192
    • /
    • 2017
  • The purpose of this thesis is to explain the difference between Heidegger's hermeneutical philosophy and Gadamer's philosophical hermeneutics. The difference is to say that Heidegger's philosophy begins with Aristotle's theory of category and transcendental philosophy. On the other hand, the beginning of Gadamer's philosophical research is Plato's dialog, philosophy and Hegels dialectic. 2. Heidegger regards humanism as a variant of the modern ideal of human beings. On the contrary, Gadamer understands humanism as a place where romantism leads to the ideals of human education. 3. Heidegger says that the hermeneutical circle is still a logical and existential structure of the circle. On the contrary, Gadamer understands the circle as a circle between the whole and the part. This circle is the law of traditional hermeneutics derived from the tradition of rhetoric. 4. Heidegger says Plato's philosophy is the first beginning of the substance metaphysic, Hegel's philosophy the end of the subject metaphysic. On the contrary, Gadamer says the hermeneutical understanding and the hermeneutical interpretation is endless. 5. Heidegger's ontology is as Sein zum Tode a future oriented and eschatological. On the contrary, Gadamer's hermeneutic is as Sein zum Text always the way to a past, the infinite openness.

Financial Industry Security: A Qualitative Study for Reducing Internal Fraud in Banking Institutions (금융산업보안: 은행권 내부부정 방지를 위한 질적 연구)

  • Suh, Joon Bae
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.165-185
    • /
    • 2018
  • Because financial industry is closely related to the daily lives of people, internal fraud such as embezzlement by the employees can cause serious damage to the national economy, including credit crunch and contagious bankruptcy, as once demonstrated in the Savings Bank Scandal in 2011. Therefore, the importance of financial industry security is being emphasized and developed into converged security that combines physical, human and cyber security. In this study, to prevent fraud caused by internal employees in Korean financial sector, in-depth semi-structured interviews were conducted with a total of 16 participants including bankers, officials of financial regulators, and security experts, who were in charge of risk management in the industry. The collected data were analyzed at three stratification levels such as individual, organization, and socio-cultural factor. Based on this analysis, policy recommendations were suggested for the development of financial industry security and reducing internal fraud in banking institutions.

Estimation of River Management Discharge in Nakdongriver Basin (낙동강권역 하천관리유량 산정)

  • Han, Manshin;Hong, Sunghun;Lee, Eungu;Park, Jungsool;Choi, Kyuhyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.614-614
    • /
    • 2015
  • 하천수는 하천의 지표면에 흐르거나 하천 바닥에 스며들어 흐르는 물 또는 하천에 저장되어 있는 물을 말하며, 인구의 증가나 산업화로 인하여 물 사용이 증대되고 있는 실정이다. 이에 따라 국가에서는 하천법 제50조에 의거하여 생활 공업 농업 환경개선 발전 주운 등의 용도로 하천수를 사용하려는 자는 국토교통부장관(홍수통제소장)의 허가를 받아야 한다. 우리나라 수문특성상 우기에 집중되어 있는 물을 갈수기에 이용할 수 있도록 분배하고 관리하는 것이 어려운 실정이다. 하천법 제51조에 의하면 하천유지유량은 생활, 공업, 농업, 환경개선, 발전, 주운 등의 하천수 사용을 고려하여 하천의 정상적인 기능과 상태를 유지하기 위한 최소한의 유량을 말하며, 2006년 고시된 낙동강 수계의 하천유지유량은 대부분 국가하천을 기준지점으로 산정되었고, 산정방법은 평균갈수량 13개, 기준갈수량 2개, 하천생태계 2개 지점이다. 또한, 하천관리유량은 하천유지유량과 이수유량의 합으로 산정된다. 본 연구에서는 2013년도 말 기준으로 하천수 사용허가 현황을 정리하였으며, 용도별, 수계별, 행정구역별, 하천등급별로 하천수 사용허가 건수와 허가량을 분석하였다. 낙동강본류를 대상으로 하천시설물을 고려하여 하천관리유량을 산정하였으며, 하천유지유량의 적절성을 검토함으로써 향후 낙동강권역의 물관리방안을 모색하였다. 낙동강본류구간은 하천관리유량이 기준갈수량에 비하여 큰 형태로써 하천관리유량 확보를 위한 노력이 필요한 것으로 나타났으며, 향후 하천수 사용허가 시설물의 회귀율에 대한 실제적인 자료 수집과 함께 정확한 분석을 통한 하천의 회귀유량을 산정하고, 하폐수 방류시설을 고려하여 산정한 결과와 비교하여 보다 정확한 물수지 분석 체계를 확립하여야 할 것이다.

  • PDF

Metaphorical Analysis of Metaphor Expressions in Video Contents focused on film "The truman show(1998)" (영상콘텐츠 속 은유표현의 의미 분석 연구 영화 "트루먼 쇼(1998)"을 중심으로)

  • Wang, shu;Lee, Tae-hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.441-450
    • /
    • 2019
  • The research of this paper is aimed at finding out the meaning of the literary rhetoric technique of metaphor in film, and understanding the difference between metaphor and symbol. It is also worth reference to the study of metaphor in the future. This paper will read the related paper to organize the relevant concepts and look at the classical film repeatedly, and find the expression element of the metaphor in it. Finally, look at Truman Show and analyze it and find a conclusion. Through related research, we have found that metaphor in movies is always built together through various aspects of themes, titles, lines, and plays. It provides clues through the screen and induces the audience to think. Metaphor not only helps improve the movie's content, but it is also the most important feature in the movie to influence the audience and induce thinking.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

A Study on 'Language-Letter' images and politics of 'écriture' in Kim, Soo-Yung's poems (김수영 시의 '언어-문자' 이미지와 '에크리튀르'의 정치학)

  • Lee, Chan
    • Cross-Cultural Studies
    • /
    • v.26
    • /
    • pp.173-200
    • /
    • 2012
  • This paper examines ${\acute{e}}pist{\acute{e}}m{\grave{e}}$ of ${\acute{e}}criture$ and its politics in Kim, Soo-Yung's poems, focusing on 'language-letter' images such as "speech", "language", "printing type", "letter", "brush", "book" and so on. While the previous papers fail to present the overall framework of analysis on 'language-${\acute{e}}criture$' images and to show political dimensions of discourse analysis, this paper tries to overcome these limitations. It explains images of 'speech' and 'language' on the basis of Heidegger's ontological thought, and analyzes writing-images such as 'type', 'letters' using Derrida's concepts of 'archi-${\acute{e}}criture$' and '${\acute{e}}criture$'. It also gives a new name to multiple images of 'book' in his poems as 'politics of ${\acute{e}}criture$' based on problematic such as Badiou's 'ethics of truths' and Derrida's '${\acute{e}}criture$'.

Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database (인스턴트 메신저 말랑말랑 톡카페 애플리케이션 데이터베이스 복호화 방안 및 분석)

  • Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.541-547
    • /
    • 2019
  • As leakage cases of personal information increase, the concern of personal information protection is also increasing. As a result, most applications encrypt and store sensitive information such as personal information. Especially, in case of instant messengers, it is more difficult to find database where is not encrypted and stored. However, this kind of database encryption acts as anti-forensic from the point of view of digital forensic investigation. In this paper, we analyze database encryption process of MalangMalang Talkcafe application which is one of instant messenger. Based on our analysis, we propose a decryption method and explain the meaningful information collected in the database.