• Title/Summary/Keyword: 보안 전공

Search Result 195, Processing Time 0.025 seconds

Sera Web-Viewer : a Convenience-Featured Web Browser (SERA Web-Viewer : 사용자 편의성을 향상시킨 웹 브라우저 설계 및 구현)

  • Cho, Young-Suk;Kim, Jae-Hoon;Jang, Ik-Hyeon
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.61-72
    • /
    • 2007
  • We developed a convenience-featured Web browser which is intended to enhance Web users' convenience. The integrated convenience functions are VPV(Visited Page Viewer), APV(Aligned Page Viewer), USC(User Specified Capture), and VAC(Video and Audio Converter) which is the most important feature of FLV(FLash Video file) in UCC (User Created Contents). The four functions are considered ad the most needed functions to the Web users and we referred to the opinion of frequent and advanced Web users. We addressed important algorithms and techniques in terms of the implementation of the above four functions. The implementation methods based on the MDI application using rendering technique same as in Internet Explorer 6.0 are shown with codes. The results of implementation is compared with the survey conducted on 134 Computer Science and Multimedia Engineering major students. All four integrated functions are considered to be useful.

  • PDF

A study on additional information and its transmission method of data service linked to travel program (여행 프로그램 연동형 데이터서비스의 부가정보와 정보 전송 설계 연구)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.67-73
    • /
    • 2021
  • According to a survey by the Korea Tourism Organization in 2018 and 2019, traveling to places recorded in TV programs or influential videos has become an important travel trend and several studies show that watching a travel program improves the intention to visit the places featured on the program. This study designed a travel program-linked data service that provides additional information on the places and events to the viewers of the travel program. Specifically, the additional information of the travel program was defined in a formal manner by dividing it into places and events, and a method of exposure of the additional information conformed to the contents of the program was designed. We also devised an international standard DVB-based data transmission method that provides the additional information to data services appropriately in time for program broadcasting. This study is significant in that it tested new applications of data services for travel programs.

A Study on the Meaning Extension of User-Centeredness in UX Design (사용자 경험 디자인의 사용자 중심성에 대한 의미 확장 연구)

  • Lee, You-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.301-310
    • /
    • 2021
  • The purpose of the study was to induce meaning of the UX design from users' interview. The study covers interviews from 20 untact finance application users in their twenties in written form. It aims to examine previous studies on UX design and to overcome their shortcomings by categorizing usability qualities focusing on verbs used in the interview. The followings are the result: Usability of UX design can be summarized into Unity, Trust, Persistency, Recognition and Approachability of the information to the 20 users in their twenties. As for the data earned from interviews focusing on verbs, usability included Security, Familiarity, Accessibility, Convenience of Operation and Visibility. Each of the qualities fell into related categories such as Security, Information, Brand and Design. In conclusion, analysis based on verb choices led to better understanding of the user-based experience compared to using objective means in previous studies and can be a suggestion to make up for errors in the former evaluation process.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism (국내 자생테러 대응을 위한 원-스톱 감시 및 추적 시스템 설계)

  • Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.89-96
    • /
    • 2021
  • In recent years, the fear of terrorism due to 'Lone Wolf' terrorism is spreading in the United States and Europe. The lone wolf terrorism, which carries out terrorism independently, without an organization behind it, threatens social security around the world. In Korea, those who have explosive national/social dissatisfaction due to damage caused by national policies, and delusional mental disorders can be classified as potential 'Lone Wolf' terrorists. In 'Lone Wolf' terrorism, unlike organized terrorism, it is difficult to identify signs of terrorism in advance, and it is not easy to identify terrorist tools and targets. Therefore, in order to minimize the damage caused by 'Lone Wolf' terrorism, it is necessary to architect an independent monitoring and tracking system for the police's quick response. In this paper, we propose to architect response system that can collect information from organizations that can identify the signs of potential 'Lone Wolf' terrorism, monitor the continuity of abnormal behavior, and determine the types of 'Lone Wolf' terrorism that can happen as continuous abnormal behaviors.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

Policy Recommendations for Domestic Internal Control System through the Analysis of the U.S. Government Agency Inspector General System (미국 정부기관 감찰관 제도 분석을 통한 국내 내부통제시스템에의 정책적 제언)

  • KiYeung Kim;Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.509-515
    • /
    • 2023
  • As the trend towards expanding the functions of modern governments continues, there are also problems such as misconduct and waste that arise as government activities and operations increase. To solve these issues, countries are establishing and developing internal control mechanisms. In this process, the U.S. Inspector General system has been operating for over 40 years with the aim of balancing and overseeing the government and the legislature. Accordingly, this study analyzed in detail the development process of the inspector system, one of the internal control systems promoted by U.S. government agencies, the formation of an inspector community, and the deployment, cooperation, and supervision of inspectors. As a result, the internal control system of domestic government agencies also needs to continue research so that the government and parliament can maintain close relations and introduce the inspector system according to the domestic situation.

A Study on MMIP Data Service providing additional Information of multiple Movie Information Programs (복수의 영화정보 프로그램의 부가정보를 제공하기 위한 MMIP 데이터서비스에 관한 연구)

  • Kwangil KO
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.119-127
    • /
    • 2022
  • A movie information program has a positive effect on the viewer's intention to watch the movie by providing an indirect experience of the movie based on trust. In order to increase the effectiveness of a movie information program, a data service that provides the additional information on the movies introduced in a movie information program has been studied. However, since the study limited the data service to one movie information program, it was difficult to apply it to the actual environment of general cable broadcasting companies or satellite broadcasting companies that transmit multiple movie information programs. Therefore, this study expanded the existing research limited to one movie information program to provide additional information of several movie information programs. This study is meaningful in that it suggests a data service that can be operated in the realistic environment of a broadcaster that actually transmits several movie information programs.

A Study on the development plan for the smooth fixation of the RNTC (부사관학군단(RNTC)의 원활한 정착을 위한 발전방안 연구)

  • Eung-woo Nam;Jong-Hyun Park
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.53-63
    • /
    • 2022
  • The Ministry of National Defense reintroduced the non-commissioned officer corps (RNTC) system for colleges from 2015 and has been testing it for five years. The reason for this is that the acquisition of non-commissioned officers in the military is low and the level of manpower management is low. Through the implementation of the NCO(RNTC) system, the military expected that the colleges would stably acquire non-commissioned officers with excellent resources in various major fields, and the colleges expected positive results in entrance exams and employment. However, when analyzing the results of the pilot operation, it can be evaluated that the expected results have not been achieved. It was found that the system needs to be supplemented and improved to achieve the purpose of the system implementation in the promotion of recruitment of district candidates, selection evaluation, operation and the cooperative system between the military and colleges. Therefore, in this study, a development plan was presented to supplement the system and operation system so that the non-commissioned officer corps system can be smoothly established at universities and obtain the expected results from the military and colleges.