• Title/Summary/Keyword: 보안문화

Search Result 232, Processing Time 0.032 seconds

A Experimental Study of Rock Fragmentation with Plasma Method (플라즈마 공법에 의한 암석파괴의 실험적 연구)

  • Yoon, Ji-Son;Kim, Sang-Hoon
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.4 no.1
    • /
    • pp.27-35
    • /
    • 2002
  • For the excavation of the rock, blast method is put into operation in most of the construction site in Korea. In comparison to other methods of excavation, blast method has many merits such as improvement in efficiency in operation, reducement of operation period, and etc. However, blast operation also creates much loss due to the blast vibration, noise, and fly rocks. Thus, in this study, we have examined main features, rock fragmentation effect and the application of plasma method the one of shallow vibration method. In this study, the attenuation exponent of blast method operated in the site was 1.39~1.40 and that of the plasma method was analysed to be 1.45~2.23. From the location where the distance between excavation location and observation location was over 15 m, most of excavation vibration were measured to be less than 0.2 kine(cm/sec), which is also the allowed standard value of sensitive buildings, such as cultural assets and computer facilities. According to the result of FFT(Fast Fourier Transform) analysis, the frequency measured through blast method in this site was 30~50 Hz and the frequency of plasma method ranges in between 30~130 Hz.

  • PDF

A Study on Acceptance of Public Recording for SNS Post (SNS 게시물에 대한 공공기록화 수용에 관한 연구)

  • Yun, Sung-Uk;Chang, Jun-Gab;Kim, Geon
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • This study explored the factors affecting the acceptance of public recording in SNS post. Using SPSS 21.0 program and AMOS 21.0 program, major results were derived through exploratory factor analysis, confirmatory factor analysis, correlation analysis, and path analysis. The results are as follows: First, the risk of personal information leakage on SNS posting has a significant negative impact on the attitude toward SNS posting. Second, the security of the SNS posting has a significant effect on the attitude toward the SNS posting. Third, the concern about privacy of SNS posting has a significant negative impact on the attitude toward SNS posting. Fourth, the attitude toward SNS posting has a significant effect on the intention to accept the SNS posting. The above results suggest that the SNS post recording should be able to collect opinions of SNS users from a long-term viewpoint.

An Empirical Study on Factors Affecting the University Students' Software Piracy Intention (대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구)

  • Jeon, Jin-Hwan;Kim, Jong-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.127-140
    • /
    • 2009
  • Recently, software piracy is one of the serious crimes for the digital materials. It makes economically devasting to the software industry and the market. In particular, it is a widespread phenomenon among university students in Korea and negative affects in measuring social and cultural level. Many studies have been focused on the users' intention of the software piracy for making anti-piracy policy. The purpose of this study is to investigate the factors affecting university students' software piracy intention. The survey includes responses from 271 university students in a school of business adminstration. The research model was estimated with multiple regression. The analysis showed results that user's characteristics, subjective norms, and perceived software quality were significantly related to intention of software piracy, but security policy was not. Perceived importance of intellectual property has negative impact on user's software piracy intention. Based on the findings, we suggest the implications for developing and implementing appropriate policies for anti-piracy.

A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain (블록체인을 위한 양자 내성의 격자 기반 블라인드 서명 기법)

  • Hakjun Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.76-82
    • /
    • 2023
  • In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.

Design and Implementation of Workflow Federation Method for Multi-cluster Based Korea Research Data Commons (멀티 클러스터 기반 국가연구데이터커먼즈 간 워크플로우 연계 방안 설계 및 구현)

  • Dasol Kim;Sang-baek Lee;Seong-eun Park;Minhee Cho;Mikyoung Lee;Sa-kwang Song;Hyung-jun Yim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.100-102
    • /
    • 2023
  • 최근 오픈 사이언스 문화가 확산됨에 따라 오픈 데이터, 오픈 소스 소프트웨어와 같은 공개된 리소스들을 효율적으로 공유 및 활용하기 위한 방법이 주목을 받고 있다. 본 논문에서는 연구 소프트웨어의 재현성을 향상시키기 위한 국가연구데이터커먼즈(KRDC)를 소개하고 다중 KRDC 클러스터 간 워크플로우 연계 방안을 제안한다. 국가연구데이터커먼즈는 연구 소프트웨어와 분석 환경인 인프라를 결합하여 함께 제공하는 서비스로, 멀티 노드 쿠버네티스(kubernetes) 클러스터를 기반으로 동작한다. 따라서, 서로 다른 KRDC 프레임워크에 존재하는 리소스들을 하나의 워크플로우로 연계하는 것은 복잡한 사용자 인증/인가 문제, 보안 상의 문제를 고려하여야 한다. 본 논문에서는 프록시(proxy) 앱을 사용하는 워크플로우 연계 기능을 제안하고, 이를 지원하기 위한 통합 인증, 인가 체계와 연계 방안을 구현한다. 제안하는 방법을 두 개의 KRDC 프레임워크를 대상으로 적용하여 제안 워크플로우 연계 방법의 유효함을 확인한다. 본 논문에서 제안하는 워크플로우 연계 방법과 시나리오는 실제 멀티 클러스터 연계 방안을 구현한 사례로, KRDC 프레임워크 뿐만 아니라 다양한 쿠버네티스 기반 리소스 연계에 활용할 수 있는 우수한 결과로 사료된다.

A Study on the Improvement of Archival Content Services in the Museum of Performing Arts of the National Theater of Korea through Comparisons and Analyses of UK and US Performing Arts Archives (영미권 공연예술아카이브 비교·분석을 통한 국립극장 공연예술박물관 기록정보콘텐츠 개선 방안 연구)

  • Kyunghan, Oh;Geon Kim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.1-24
    • /
    • 2023
  • At present, domestic archives within the realm of performing arts predominantly focus on recording through videos, yet they often lack comprehensive documentation of crucial production processes and content services. Recognizing the contemporary significance of archival content services, this study analyzes the archival content within the national performing arts archives websites of the United Kingdom and the United States, serving as international benchmarks. The findings extrapolate insights and implications to propose enhancements for the Museum of Performing Arts in the National Theater of Korea. The analysis focused mainly on the missions and visions on the websites, examining 107 contents from the UK National Theater, 27 from the United States, and 9 from Korea. The suggested improvements encompass clarifying target users and execution tasks in the mission and vision statements, fostering expert collaborations, incorporating preview features, curating content with a single theme, and organizing a comprehensive list on the National Theater's YouTube channel.

A Study on Privacy Preserving Methods in the Metaverse Environment Using Secure Multi-Party Computation (안전한 다자간 연산을 활용한 메타버스 환경에서의 프라이버시 보존 방안 연구)

  • Jiun Jang;Kwantae Cho;Sangrae Cho;Soo Hyung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.725-734
    • /
    • 2024
  • The rapidly growing metaverse environment has received widespread attention across various fields such as health and medicine, culture and gaming, as well as politics. However, the excessive collection of personal data by the diverse sensors and devices used in the metaverse environment poses a substantial threat to user privacy. In this paper, we investigate existing cases of secure Multi-Party Computation(MPC) applications, examine the services anticipated to be necessary for the expansion of the metaverse environment, and analyze the privacy issues present in the metaverse environment as well as the limitations of current real-world services. Based on these findings, we propose application scenarios that utilize MPC to preserve user privacy in the metaverse environment. These proposed MPC application scenarios present a new perspective in metaverse security research. In the future, they are expected to be utilized in the development of secure metaverse services.

A Study on the Improvement of Security Terminology (경호・경비 용어의 개선방안)

  • Kim, Hong Seong
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.231-252
    • /
    • 2018
  • we have long used foreign words in using the term for guard security despite the obvious existence of own language, the use of foreign terms is strong in foreign feeling in delivery. and also weakens the true meaning of security. there are no terms expressed independently in korean, and we(they) are negligent in finding them and use the terms of foreign language. as a result, we(they) brought about a lack of choice in terms of proper security for our langage. currenty, it is widely used as a security guard even though there is an appropraite word that corresponds to the meaning and meaning of security guards in our words, we still use enlish expressions. there is because the English language is used for convenience regardless of weather the term is appropraite or not, and as the power of the English language is great amid in the trend of globalization. lt is easy to use english without thinking in terms of the use of terminology. ultimitely, however, this is due to the lack of awareness of the korean language. with these reasons, we must find the term of security guards in pure korean language. until now, we have used the terms 'guard, security, protect' as the terms security and protection the term 'Jikim' refers to the korean language as a means to be vigilant and guarded. Jikim refers to the action of maintaining the current safe state. Like school jikimi, children safety jikimi and environment jikimi, Jikim is already being used in many places. Therefore, the term 'guard' should be changed to an appropriate Korean term, and the term 'Jikim' is considered to be the most appropriate term in various sections. so, 'Jikim' will be appropriate in korean, which corresponds to the meaning of security guards. the guardian here is called the Jikimi. Jikimi is a combination of the word Jikim and the korean pronounce 'I' which means people

Effects of Elderly Characteristics and Service Characteristics on the Use Intention of Government 24 (고령자 특성 및 서비스 특성이 정부24 이용 의도에 미치는 영향)

  • Lee, Jung-jae;Lee, Gi-dong
    • Journal of Venture Innovation
    • /
    • v.6 no.1
    • /
    • pp.75-93
    • /
    • 2023
  • As non-face-to-face contact was activated due to the progress of the 4th Industrial Revolution and COVID-19, the government's civil service was also rapidly reflecting this phenomenon. However, there were cases in which it was quite burdensome and rather uncomfortable for the elderly who were relatively alienated from the digital culture. Therefore, in this study, we tried to empirically analyze the factors that affect the use of government 24(a government civil integration service) by the elderly. For this purpose, the characteristics of the elderly and the characteristics of services were paid attention. As the characteristic factors of the elderly, cognitive characteristics, psychological characteristics, and physical characteristics were derived, and as service characteristics, usefulness, ease of use, security, and government support were derived when using government 24. The effect of these factors on the intention to use Government 24 was empirically analyzed. For empirical analysis, a survey was conducted targeting the elderly in their 60s and older, and 250 valid sample were used for analysis. The analysis results were as follows. Among the characteristics of the elderly, cognitive characteristics, psychological characteristics, and physical characteristics were all found to had a significant negative (-) effect on the intention to use Government 24. On the other hand, usefulness, ease of use, and government support were found to had a significant positive (+) effect on the intention to use government 24. On the other hand, security was not tested for a significant relationship with government 24 use intention. Among the variables that have a significant impact, the psychological characteristics of the elderly had the greatest impact on the intention to use Government 24. Usefulness, cognitive characteristics, physical characteristics, ease of use, and government support were in order. The fact that this study conducted an empirical analysis by combining the characteristics of the elderly and the characteristics of services was meaningful at the academic level. In addition, considering that psychological characteristics appeared to be the most important factor, it seemed necessary to consider these points to promote the use of Government 24 by the elderly.

Application of Deep Learning for Classification of Ancient Korean Roof-end Tile Images (딥러닝을 활용한 고대 수막새 이미지 분류 검토)

  • KIM Younghyun
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.24-35
    • /
    • 2024
  • Recently, research using deep learning technologies such as artificial intelligence, convolutional neural networks, etc. has been actively conducted in various fields including healthcare, manufacturing, autonomous driving, and security, and is having a significant influence on society. In line with this trend, the present study attempted to apply deep learning to the classification of archaeological artifacts, specifically ancient Korean roof-end tiles. Using 100 images of roof-end tiles from each of the Goguryeo, Baekje, and Silla dynasties, for a total of 300 base images, a dataset was formed and expanded to 1,200 images using data augmentation techniques. After building a model using transfer learning from the pre-trained EfficientNetB0 model and conducting five-fold cross-validation, an average training accuracy of 98.06% and validation accuracy of 97.08% were achieved. Furthermore, when model performance was evaluated with a test dataset of 240 images, it could classify the roof-end tile images from the three dynasties with a minimum accuracy of 91%. In particular, with a learning rate of 0.0001, the model exhibited the highest performance, with accuracy of 92.92%, precision of 92.96%, recall of 92.92%, and F1 score of 92.93%. This optimal result was obtained by preventing overfitting and underfitting issues using various learning rate settings and finding the optimal hyperparameters. The study's findings confirm the potential for applying deep learning technologies to the classification of Korean archaeological materials, which is significant. Additionally, it was confirmed that the existing ImageNet dataset and parameters could be positively applied to the analysis of archaeological data. This approach could lead to the creation of various models for future archaeological database accumulation, the use of artifacts in museums, and classification and organization of artifacts.