• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.027 seconds

A Study on Collection and Analysis of Collaboration Tool JANDI Artifacts in a Windows Environment (윈도우 환경에서의 협업 도구 잔디 아티팩트 수집 및 분석 연구)

  • Dabin We;Hangyeol Kim;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.915-925
    • /
    • 2024
  • As non-face-to-face work increases due to the COVID-19 pandemic, companies have introduced collaboration tools to perform work without spatial constraints. The rapidly growing collaboration tool market continues to show high utilization rates even after the endemic due to the increase in demand for hybrid work that combines face-to-face and non-face-to-face work. The use of collaboration tools increases work efficiency, facilitates smooth collaboration, and increases data integration, generating various data. However, at the same time, it also increases the risk of exposure of corporate confidential information due to the possibility of external access by internal users. In response to this, an analysis method is needed to collect and acquire data during digital investigations targeting collaboration tools. In this paper, we identified local artifacts targeting JANDI, a collaboration tool in a Windows environment, and explained how to collect and analyze data through API reconstruction. Finally, we presented a digital forensic utilization method through scenario and chat room reconstruction.

Sexual Trauma Survivors and Their Mental Health: Assessing Based on Types of the Traumatic Event (성적 트라우마 경험자의 정신건강: 트라우마 사건유형에 따른 비교 분석)

  • Soyoung Choi;Hyeyun Kim;Sumi Chae
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.129-140
    • /
    • 2024
  • Background: The mental health issues caused by trauma can manifest differently depending on the characteristics of the traumatic event. Particularly, individuals who have experienced sexual trauma are known to have more negative mental health outcomes compared to those who have experienced non-sexual trauma. The mental health issues of individuals who have experienced sexual trauma are severe, and new forms of threats, such as digital sexual crimes, are emerging. This study aimed to investigate whether the type of traumatic event, particularly focusing on sexual trauma events, contributes to differences in mental health outcomes and to identify factors influencing suicidal ideation and potential post-traumatic stress disorder (PTSD) risk. Methods: Based on an online survey conducted nationwide among adults aged 20 to 50, participants were categorized based on the type of trauma they experienced (sexual trauma events and non-sexual trauma events). The study conducted propensity score matching (PSM) using demographic factors (sex, age group, subjective economic status, and marital status) and resilience protective factors (cognition of recoverability, social support, and protection experiences in childhood) as control variables, excluding the experience of sexual trauma events, to investigate their potential impact on mental health (suicidal ideation and potential PTSD risk). Subsequently, binary logistic regression analysis was conducted to identify factors influencing mental health. Results: Even after PSM, individuals who experienced sexual trauma exhibited more negative outcomes in terms of suicidal ideation and potential PTSD risk compared to those who experienced non-sexual trauma. The results of binary logistic regression analysis showed that sexual trauma survivors were 1.9 times more likely to have suicidal thoughts (odds ratio [OR], 1.911) and 2.5 times more likely to have a potential PTSD risk (OR, 2.472). Furthermore, as resilience protective factors became more negative, the likelihood of suicidal ideation and potential PTSD risk increased. Conclusion: This study emphasizes the importance of understanding and supporting individuals who have experienced sexual trauma, highlighting the necessity for strategies aimed at mitigating suicidal ideation and potential PTSD risk among sexual trauma survivors, while also facilitating recovery through the promotion of resilience protective factors.

Mg-Al합금의 조성비율에 따른 발화온도특성

  • Han, U-Seop;Lee, Geun-Won
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.77-77
    • /
    • 2013
  • 최근의 산업활동에서는 신규 원료 개발과 생산 효율성을 높이기 위하여 분체 공정이 증가하고 있는데, 미세 분진의 취급으로 분진운의 형성과 착화가 용이해지므로 분진폭발이나 화재 위험성이 증가하고 있다. 분진을 안전하게 사용하고 저장, 취급하기 위해서는 착화 전의 위험성 지표로서 최저발화온도(MIT ; Minimum Ignition Temperature)를 사전에 파악해 두는 것이 중요하다. 분진농도의 발화온도는 장치 내의 발화위험성이나 분진 취급 공정의 사고예방대책 관리를 위한 실용적 관점에서 중요하게 활용되는 폭발특성값이다. 또한 분진의 발화온도는 분진농도에 의존하며 농도변화에 따른 가장 낮은 온도를 MIT라고 한다. 본 연구에서는 화재폭발사고 빈도가 줄지 않고 있는 Mg 및 Mg-Al합금(60:40 wt%, 50:50 wt%, 40:60 wt%)을 대상으로 조성비율에 따른 최저발화온도를 실험적으로 조사하였다. Mg 및 Mg-Al(60:40 wt%), Mg-Al(50:50 wt%), Mg-Al(40:60 wt%) 시료의 평균입경은 142, 160, 151, $152{\mu}m$이다. MIT실험장치는 IEC 61241-2-1(Methods for Determining the Minimum Ignition Temperatures of Dust, 1994)에 준거하여 제작하여 사용하였다. 실험장치는 가열로, 분진운 시료홀더, 온도조절장치, 압축공기 제어장치 등으로 구성되어 있다. 구체적인 실험방법은 시험분진를 분진홀더에 장착하고 0.5 bar의 압축공기를 0.3 sec 동안 사용하여 일정 온도로 가열된 로의 내부로 분진운을 부유시킬 때에 분진운이 발화하여 가열로 하단부의 개방구에까지 화염이 전파하는지를 디지털비데오카메라로 기록, 평가하여 발화 유무를 판정하였다. Mg합금에 대한 MIT를 측정한 결과 $740^{\circ}C$가 얻어졌으며, Mg-Al(60:40 wt%)의 MIT는 $820^{\circ}C$로 조사되었다. 그러나 Mg-Al(50:50 wt%) 및 Mg-Al(40:60 wt%)에 대해서는 최대 가열로의 설정온도를 $890^{\circ}C$까지로 하여 농도를 변화시키면서 조사하였으나 발화가 일어나지 않았다. 문헌에 따르면 Mg입자 표면의 산화피막은 다공성으로 일정 온도에서 산화반응이 시간에 따라 직선적으로 증가하는데 반하여, Al의 산화피막은 보호 작용을 하여 일정 온도에서 산화반응속도가 표면과 내부의 농도 기울기에 의한 확산속도에 의존한다고 보고하고 있다. 본 연구결과를 토대로 Mg-Al합금의 발화특성을 고찰해 보면, Mg-Al합금에서 자기 전파성이 작은 Al성분의 증가는 착화지연이 증가하여 연소성이 감소하여 최저발화온도의 증가로 이어지는 것으로 추정되었다. 또한 발화온도는 주어진 조건의 온도장에서 분진이 존재하는 시간 길이에 따라 변화하므로, 발화온도를 실험적으로 측정하는 경우에는 측정장치나 방법에 따라 달라지므로 사업장의 현장에 발화온도를 적용하는 경우에는 장치 내의 분진의 존재시간을 고려할 필요가 있다.

  • PDF

Comparative study on the role of the public sector in the health care system -Comparison of the United States and Korea in social risk situations- (의료보장 체계에서의 공공 부분의 역할 비교연구 -사회적 위험 상황 속의 미국과 한국의 비교-)

  • Kim Jong Hwi;Hyun-Seung Park
    • Industry Promotion Research
    • /
    • v.9 no.2
    • /
    • pp.95-102
    • /
    • 2024
  • This study aims to compare the role of the public sector in the U.S. and Korean medical security systems and study response measures in the social risk situation of the COVID-19 virus. The COVID-19 pandemic was a typical case of a 'disaster' that spread across the world across borders in a short period of time and caused serious social welfare losses by increasing the annual number of deaths by approximately 4% in 2020. Threats to health security, such as changes in social order, unpredictable endings, prolonged control of daily life, and deepening inequality, affected the economy, politics, and environment as a whole, and people had to experience anxiety and confusion due to mental and physical stress. Furthermore, developed countries failed to provide help to low-income countries in the face of global disasters. In this situation, the country's disaster management capacity to minimize harm and secure resilience, especially disaster response capacity in the health and medical field, is inevitably very important. Therefore, this study compares how the health insurance system, which is a system to guarantee citizens' right to life, differs from the United States, a liberal health care country, and raises the need to strengthen the role of the public sector.

An Information Systems Operation Framework for Small and Medium Enterprises (중소기업을 위한 정보시스템 운영 프레임웍)

  • Park, Kwang-Ho;Baek, Dong-Hyun
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.223-239
    • /
    • 2006
  • In digital economy, information systems are recognized as the most critical survival factor of companies. Companies must launch and expand business based on information systems either developed newly or adopted as ERP. However, successful information systems operation shall face many realistic problems. Especially most small and medium enterprises experience many difficulties in systems operation or even give up operating information systems due to unexpected operational problems. This paper suggests a framework for effective information systems operation for small and medium enterprises. The framework is designed through case studies, consisting of service framework, auditing framework, and risk management framework. It is expected that the framework contributes to successful information systems operation in small and medium enterprises.

Determinations of Initial Control Parameters According to the Application of Control System for Feed Water Pump Turbine into a Nuclear Power Plant (원자력발전소 주급수펌프구동용 증기터빈 제어시스템 현장 적용에 따른 초기 제어상수 결정)

  • Choi, In-Kyu;Woo, Joo-Hee
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.4
    • /
    • pp.72-78
    • /
    • 2009
  • This paper describes one of the ways how to decide the initial control parameters after the analog type control system is changed to digital control system. If the old control parameters were already known, the initial control parameters for initial operation could be decided easily. But sometimes, it is very difficult for the control system developer to decide initial parameters before plant machine starts up. In that case, if there is a big difference between initial parameters and optimal parameters, the whole plant itself can be in very dangerous conditions. Here is a very simple experimental method which can be very easy but useful to engineers.

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Determinants Impacting on Dependency of Mobile Instant Messenger, Barrier of Living, and Intention to take Digital Break: The Moderating Effect of Perceived Risk (모바일 인스턴트 메신저 의존, 생활 장애 및 디지털휴식의도에 영향을 미치는 요인: 지각된 위험의 조절효과에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.25-46
    • /
    • 2014
  • As the use of smartphone has rapidly spread into the current society, the mobile instant messenger applications such as Kakaotalk, Tiktok, and Line have become an indispensable part of our daily lives. While, the mobile instant messenger has brought us many positive changes, social problems stemming from the dependency on the mobile instant messenger has been occurred. The dependency of the mobile instant messenger can negatively affect daily lives and lead to stress or addiction. Therefore, it is very important to examine how we can prevent such dependency and addiction. In this respect, the purpose of this study is to investigate determinants impacting on the mobile instant messenger dependency, barrier of living, and intention to digital break. The statistical analysis of survey results shows that enjoyment, identity, relationship commitment, critical mass and ease of use are significantly related to mobile instant messenger dependency, while media richness is not significantly related. Mobile instant messenger dependency have a positive effect on barrier of living, which then has a positive effect on digital break. Lastly, the moderating effect of perceived risk is significant. This research suggests theoretical and business implications to prevent mobile instant messenger dependency.

A Design and Implement Vessel USN Risk Context Aware System using Case Based Reasoning (사례 기반 추론을 이용한 선박 USN 위험 상황 인식 시스템 구현 및 설계)

  • Song, Byoung-Ho;Lee, Seong-Ro
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.42-50
    • /
    • 2010
  • It is necessary to implementation of system contain intelligent decision making algorithm considering marine feature because existing vessel USN system is simply monitoring obtained data from vessel USN. In this paper, we designed inference system using case based reasoning method and implemented knowledge base that case for fire and demage of digital marine vessel. We used K-Nearest Neighbor algorithm for recommend best similar case and input 3.000 EA by case for fire and demage context case base. As a result, we obtained about 82.5% average accuracy for fire case and about 80.1% average accuracy for demage case. We implemented digital marine vessel monitoring system using inference result.

Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria (아이디/패스워드 통합 관리 제품의 취약성 분석 및 평가기준 제안)

  • Han, Jeong-Hoon;Lee, Byung-Hee;Hong, Su-Min;Kim, Seung-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.125-132
    • /
    • 2008
  • As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.