• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.026 seconds

A study on Utilization of Big Data Based on the Personal Information Protection Act (개인정보보호법에 기반한 빅데이터 활용 방안 연구)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.87-92
    • /
    • 2014
  • We have noted a possibility of big data as a solution of social problem and pending issue. At the same time big data has a problem of privacy. Big data and privacy were in conflict. In this paper we pointed out that issue and propose a planning of big data based on privacy using case study of advanced country.

Improvement Problems Electronic Monitoring System for Sexual Assault Offender (성폭력범죄자 전자감시제도의 문제점과 개선방안)

  • Kim, Sang Gyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.39-43
    • /
    • 2014
  • Electronic monitoring system was recently introduced as an effective means of controlling certain criminal offenders. Korean society manages ex-convicts only in reliance on the electronic monitoring system, which has a clear limit. For this reason, The reorientation program should be put before anything to subdivide the perpetrators equipped with the electronic monitoring device and separate them from the others from the start, or identify their criminal propensity and heal them.

The Comparative Study of NHPP Software Reliability Model Exponential and Log Shaped Type Hazard Function from the Perspective of Learning Effects (지수형과 로그형 위험함수 학습효과에 근거한 NHPP 소프트웨어 신뢰성장모형에 관한 비교연구)

  • Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The finite failure nonhomogeneous Poisson process models presented and the life distribution applied exponential and log shaped type hazard function. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than autonomous errors-detected factor that is generally efficient model could be confirmed. This paper, a failure data analysis of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and coefficient of determination.

Development of Notify App for Cosmetics Expiration Date (화장품 유통기한 알림이 앱 개발)

  • Cho, Kwangmoon
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.179-184
    • /
    • 2015
  • An app is designed and developed for safe use of cosmetics by notifying the expiration date of cosmetics. According to increasing uses of cosmetics for modern people, the expiration date of cosmetics is becoming more important. The app proposed in this paper will be used for self management. People may manage themselves by registering the expiration date of their cosmetics. The cosmetics are registered and managed by category. This app also provides some beauty tips depending on the skin types of people.

A Study on the Virtual Reality Simulation Monitoring Verification System Available Wireless Communication Network (무선 통신망을 활용한 VR 시뮬레이션 관제상황 검증 시스템에 관한 연구)

  • Lee, Yang-Sun;Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.193-197
    • /
    • 2006
  • In this paper, We proposed monitoring verification system using virtual reality simulation technology in monitoring fields for peculiar environment. Also, we analyzed the proposed system about required technology issues and operation process. The proposed monitoring verification system available wireless communication network is expected that application is possible in medical treatment field or special dangerous article processing filed as well as monitoring verification of mobile electric railcar

  • PDF

A Study for NHPP software Reliability Growth Model based on polynomial hazard function (다항 위험함수에 근거한 NHPP 소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.7-14
    • /
    • 2011
  • Infinite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rate per fault (hazard function). This infinite non-homogeneous Poisson process is model which reflects the possibility of introducing new faults when correcting or modifying the software. In this paper, polynomial hazard function have been proposed, which can efficiency application for software reliability. Algorithm for estimating the parameters used to maximum likelihood estimator and bisection method. Model selection based on mean square error and the coefficient of determination for the sake of efficient model were employed. In numerical example, log power time model of the existing model in this area and the polynomial hazard function model were compared using failure interval time. Because polynomial hazard function model is more efficient in terms of reliability, polynomial hazard function model as an alternative to the existing model also were able to confirm that can use in this area.

Understanding the Factors that influence Website Retention and Privacy Unconcern After the Disclosure of Privacy Information (개인정보 유출 사고 후 웹 사이트 가입 지속 및 프라이버시 무관심에 영향을 미치는 요인에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.107-119
    • /
    • 2013
  • The purpose of this study is to find an answer why internet users are unconcern about their privacy information. We found that perceived privacy risk and website usability have a significant effect on privacy unconcern. That is, individuals who have experiences privacy incidents are more likely to be unconcern about their privacy information. Accordingly, organizations who supply services on the web have to pay more attention to these individuals to increase a privacy concern. Implications and Conclusions are discussed.

A Study on reinforcing relationships between domestic companies and customers with emerging Digital Economy (디지털 경제 관계마케팅을 통한 내수시장에서의 고객만족강화방안)

  • 유영중;이현영
    • Proceedings of the KAIS Fall Conference
    • /
    • 2000.10a
    • /
    • pp.47-52
    • /
    • 2000
  • 디지털기술의 발달로 무역, 유통, 금융은 물론 일상생활과 기업전반의 사무활동들이 변화되고 있다. 이는 광활한 지역에서 의사소통수단이 전화로만 가능하던 것을 인터넷이 대체해 나감으로써 가시화되는 자료들을 세계 어느 곳에서나, 반복해서, 누구나 접할 수 있게 되는 즉 기본적으로 인간의 의사소통방식이 변화되었기 때문이라고 할 수 있다. 이로써 기업들의 경쟁은 실질적인 무국경시대를 맞게 되었고, 치열해진 기업간 경쟁은 범지구화가 되어버렸다. IMF를 기점으로 한국경제는 경제의 주축이던 대기업들의 위상이 무너지게 되었고, 2000년을 들어 오일쇼크 등의 위험이 가중되는 등 그 존립의 위기감은 고조되어가고 있다고 할 수 있다. 이러한 시점에서 기업들은 내수시장에서 국내소비자들의 이탈을 예방하고, 단골고객들의 소비자로서의 가치를 강화해갈 수 있는 방안으로 고객과의 관계를 보다 밀착시키는 관계마케에 보다 심혈을 기울일 때라고 할 수 있겠다.

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.