• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.036 seconds

The Impact of Past Behavior on Intention to Smartphone Application Piracy (과거행동이 스마트폰 애플리케이션 불법복제 의도에 미치는 영향)

  • Kim, Joong Han
    • Journal of Service Research and Studies
    • /
    • v.6 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • Due to the expandability of smartphone, the mobile application market is growing explosively. However, as happens in other digital contents markets, piracy of mobile applications is prevalent. This study investigated the effects of behavioral factors on smartphone application piracy. The research model consists of factors from the theory of planned behavior model - subjective norms, attitudes toward piracy and perceptions of behavioral control. In addition, perceived consequences, past behavior and habit was included. The past behavior of PC software piracy was a meaningful predictor of habit, and habit was found to influence significantly the smartphone piracy intention. The result also shows that perceived benefit had significant effect on attitude, but both perceived legal and technical risk were not significantly related to attitude. Implications for research and practice are discussed.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

User Interface Experiment Model Design for Touch-Screen Based on Navigation System (터치스크린 기반 항해 시스템을 위한 사용자 인터페이스 실험 모델 설계)

  • Jeon, Hyun-Min;An, Jae-Yong;Oh, Seung-Yup;Park, Peom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.503-510
    • /
    • 2014
  • With the development of electronic communication technology, the ship's navigational equipment is being digitized, and it has being studied touch-screen-based navigation user interface. However, due to the influence of environmental factors such as waves, it has a potential problem hazardous marine accident occurs due to incorrect operation, the systematic research in consideration of this be done do not. In this paper, we provide a user interface experimental model to verify the stability that takes into account the external environment of the touch-screen input on. Further, we simulated to verify that the interface of the touch screen, the effect of applying the input delay time and the size of the button is obtained through the experimental model proposed. It will be able to greatly contribute to studies of the interface robust touch screen user errors that can be analyzed by the experimental model is proposed to improve the ship, the overall system stability.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Active Object Tracking System for Intelligent Video Surveillance (지능형 비디오 감시를 위한 능동적 객체 추적 시스템)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.2
    • /
    • pp.82-85
    • /
    • 2014
  • It is helpful to use Intelligent Video Surveillance to replace and supplement the demerit which can possibly occur due to the mistake that can be made by human management. To accomplish this, it is essential that the system should digitalize image information from surveillance camera so that the system, itself, can be able to locate a object and to analyze the pattern of the object. Also, it is imperative that the system should have ability to operate a alarm and a entrance blocking system and to notify a situation to a security manager. Zooming a small object form a screen, however, requires a exact zooming ratio of the object and a shift of centric coordinate. In this paper, It is able to locate and observe closely a object from flexible background, regardless of the distance, by calculating a zooming ratio according to object moment, pan coordinate, and tilt coordinate.

The Study on Entrepreneurial Motivations and Maintenance Factors of Independent Publication (1인출판 창업 동기와 유지 요인에 관한 연구)

  • Cho, Jung-Mi;Kong, Byoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1541-1550
    • /
    • 2012
  • The study examines entrepreneurial motivation and maintenance factors of independent publication, a rising business in the current digital era. Focusing on a case of independent publication which has been successful, this research discloses that personal attributes and backgrounds of individuals are the main factors to motivate them to establish businesses. Personal attributes include desire for achievement, self-control, risk-taking inclination, and etc., and personal backgrounds contain educational background, work experiences in the same line of business, social network, and etc. Moreover, this research also discovers that both intrinsic reward indicating the belief that the individuals will be able to publish the books which they want, and extrinsic reward as market profits are the main maintenance factors. This case study will contribute to developing the education and consulting programs for independent publication entrepreneurship and the related policies.

A Winter Road Weather Information System Using Ubiquitous Sensor Network (유비쿼터스 센서 네트웍을 이용한 겨울철 도로기상정보 시스템)

  • Yoon, Geun-Young;Kim, Nam-Ho;Choi, Hwang-Kyu;Jung, Do-Young;Choi, Shin-Hyeong;Kim, Gi-Taek
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.392-402
    • /
    • 2011
  • Snow fall and icing on traffic roads in the winter season cause not only inconvenience but unexpected traffic accidents, so the proper measures are needed. The existing road information system is being installed for steep slope roads in mountain areas, however, it is not widely adopted because it is too expensive. In this paper, a novel and cost-effective road weather information system especially for snow fall and icing on roads is proposed. The system consists of digital temperature and relative humidity sensor, infrared temperature sensor, ultrasonic sensor, CMOS camera, and two types of control/communication board for ubiquitous sensor network to send the data to server. The server program including the decision making method with received data is also described. Experimental results are provided to prove the feasibility of the proposed system.

Machine Vision based Quality Management System for Tele-operated Concrete Surface Grinding Machine (원격조종 콘크리트 표면절삭 장비를 위한 머신비전 기반 품질관리 시스템)

  • Kim, Jeonghwan;Phi, Seung Woo;Seo, Jongwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1683-1691
    • /
    • 2013
  • Concrete surface grinding is frequently used for flatness of concrete surface, concrete pavement rehabilitation, and adhesiveness in pavement construction. The procedure is, however, labor intensive and has a hazardous work condition. Also, the productivity and the quality of concrete surface grinding highly depend on the skills of worker. Thus, the development of remote controlled concrete surface grinding equipment is necessary to prevent the environmental pollution and to protect the workers from hazardous work condition. However, it is difficult to evaluate the grinded surface objectively in a remote controlled system. Also, The machine vision system developed in this study takes the images of grinded surface with the network camera for image processing. Then, by representing the quality test results to the integrated program of the remote control station, the quality control system is constructed. The machine vision algorithm means the image processing algorithm of grinded concrete surface and this paper presents the objective quality control standard of grinded concrete surface through the application of the suggested algorithm.

Cultural Differences of Choice on Interaction Problem (인터랙션 문제에 대한 선택의 문화적 차이)

  • Yeoun, Myeong-Heum
    • Science of Emotion and Sensibility
    • /
    • v.13 no.4
    • /
    • pp.711-720
    • /
    • 2010
  • This study is aimed to compare choices on interaction problems, and to consider the reason of the choices. It was expected that the interaction problems are influenced from national culture, age, gender and so on. The first interaction problem in this study is default answer button when user operates to delete all messages on SMS in-box. Second one is action when pop-p window warning dangerousness of install showed on web browsing. The third one is type(analog/digital) and information expression of control panel on soup maker. 639 Korean data and 784 data from China, Japan and the Netherlands are analyzed through cross-tabulation and chi-square test. In the results, many Japanese choose 'No' answer at SMS delete problem, while many Dutch choose 'Yes'. The result suggests that uncertainty avoidance effect on interaction problems. On warning pop-up, Younger generation and men choose actively 'install' than older one and women. On type of control panel, Dutch subjects preferred analog type than other countries' subjects. On expression of control panel, older generation and individualistic subjects relatively preferred text style than other style.

  • PDF

A Study on Moving Object Recognition and Tracking in Unmanned Aerial Camera (공중 무인감시 카메라의 이동물체 인식 및 추적에 관한 연구)

  • Park, Jong-Oh;Kim, Young-Min;Lee, Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.684-690
    • /
    • 2010
  • Digitalized Image Information is variously used like to substitute or help human's visual ability. Unmanned observation Camera is useful for the preventing disaster, risk factor and object observation but it is mostly to depend on awareness for human's vision. The purpose of this paper is to show that Unmanned Aerial Camera carries out object recognition and autonomous position tracking. when the informations about a specific object are given. For this purpose, we have to solve complicated problems like change according to object movement and variation of color and brightness information with refraction, interference and scattering of light and noise from environmental factors like weather. But, as the first step we limit the scope of this study with simplified environment in this paper. Our goal is the study and experience about object recognition and tracking via simplified environment with unmanned aerial camera. We obtained successful results of this study and experiment.