• Title/Summary/Keyword: 사이버 기반

Search Result 1,233, Processing Time 0.027 seconds

A Exploratory Study on The Determinants of Youth Facilities Visits (청소년시설이용에 영향을 미치는 요인에 대한 탐색적 연구)

  • Kim, Sin-Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.129-134
    • /
    • 2023
  • This study purports to investigate potential factors in various levels that affect respondents' use of youth facilities. Those levels include individual, family, and school. The data from 「2021 Youth Survey on Human Right Conditions」 will be analyzed. Hierarchical multiple regression analysis shows several results. First of all, respondents' age and level of human rights related information strongly influence respondents' use of youth facilities. Secondly, the analysis also shows that subjective well -being, abusive language and physical punishment from school faculty, and experience of human rights violation in schools affect the level of respondents' use of youth facilities. The order of effect sizes among significant variables are as follows; respondents' age, level of human rights related information, subjective well -being, abusive language and physical punishment from school faculty, and experience of human rights violation in schools. The independent variables in the model explain roughly 20 percent of whole variation of dependents variable.

The Effect of Failure of Online Food Delivery Service Recovery Strategies on Consumer Attitude and Behavioral Intention: Focusing on Justice Theory (온라인 음식 배달 서비스 회복 전략의 실패가 소비자 태도 및 행동 의도에 미치는 영향: 공정성 이론(Justice Theory)을 중심으로)

  • Jungkun Park;Sangwoo Lee;Hyowon Hyun;Jihwan Yum
    • Journal of Service Research and Studies
    • /
    • v.13 no.2
    • /
    • pp.161-180
    • /
    • 2023
  • This study empirically analyzed the effect of perceived injustice on service recovery measures proposed by online food delivery service (OFDS) companies on consumer disappointment. This study adopted interaction justice, information justice, procedural justice, and distributive justice as sub-variables of justice perception based on the justice theory. In addition, the differences by generation (MZ generation and other generations) were examined in the relationship between negative word-of-mouth behavior and switching intentions due to service recovery failure. An online survey was conducted targeting 250 adult consumers in the U.S for the empirical analysis of this research model. The results of the data analysis demonstrated that negative perceptions about the procedural justice and distributive justice among the service recovery strategies had a positive effect upon the consumer's disappointment. Furthermore, it was confirmed that the consumer's disappointment due to the perceived injustice of the service recovery strategy had a positive effect on the consumer's negative word-of-mouth behavior and switching intentions. The verification results of the moderation effect in the relationship between negative word-of-mouth behavior and switching intention, it was found that the younger the age(MZ generation), the higher the possibility of causing dysfunctional behavior. This study expands the scope of related research by presenting a new perspective on the justice perception in the service recovery process by verifying dysfunctional behavior of consumers caused due to the failure of the service recovery strategy. It is believed that the results of this study will be used as basic data for the establishment of practical strategies for OFDS companies to prevent double defection of their customers.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

A Tracking Method of Same Drug Sales Accounts through Similarity Analysis of Instagram Profiles and Posts

  • Eun-Young Park;Jiyeon Kim;Chang-Hoon Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.109-118
    • /
    • 2024
  • With the increasing number of social media users worldwide, cases of social media being abused to perpetrate various crimes are increasing. Specifically, drug distribution through social media is emerging as a serious social problem. Using social media channels, the curiosity of teenagers regarding drugs is stimulated through clever marketing. Further, social media easily facilitates drug purchases due to the high accessibility of drug sellers and consumers. Among various social media platforms, we focused on Instagram, which is the most used social media platform by young adults aged 19 to 24 years in South Korea. We collected four types of information, including profile photos, introductions, posts in the form of images, and posts in the form of texts on Instagram; then, we analyzed the similarity among each type of collected information. The profile photos and posts in the form of image were analyzed for similarity based on the SSIM(Structural Simplicity Index Measure), while introductions and posts in the form of text were analyzed for similarity using Jaccard and Cosine similarity techniques. Through the similarity analysis, the similarity among various accounts for each collected information type was measured, and accounts with similarity above the significance level were determined as the same drug sales account. By performing logistic regression analysis on the aforementioned information types, we confirmed that except posts in image form, profile photos, introductions, and posts in the text form were valid information for tracking the same drug sales account.

Fraud Detection System Model Using Generative Adversarial Networks and Deep Learning (생성적 적대 신경망과 딥러닝을 활용한 이상거래탐지 시스템 모형)

  • Ye Won Kim;Ye Lim Yu;Hong Yong Choi
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.59-72
    • /
    • 2020
  • Artificial Intelligence is establishing itself as a familiar tool from an intractable concept. In this trend, financial sector is also looking to improve the problem of existing system which includes Fraud Detection System (FDS). It is being difficult to detect sophisticated cyber financial fraud using original rule-based FDS. This is because diversification of payment environment and increasing number of electronic financial transactions has been emerged. In order to overcome present FDS, this paper suggests 3 types of artificial intelligence models, Generative Adversarial Network (GAN), Deep Neural Network (DNN), and Convolutional Neural Network (CNN). GAN proves how data imbalance problem can be developed while DNN and CNN show how abnormal financial trading patterns can be precisely detected. In conclusion, among the experiments on this paper, WGAN has the highest improvement effects on data imbalance problem. DNN model reflects more effects on fraud classification comparatively.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

Analysis of research trends on infants and school-age-child: Focusing on Journal of The Korean Society for School & Community Health Education from 2000 to 2023 (영·유아기 및 학령기 아동에 관한 연구동향 분석: 2000~2023년 한국학교·지역보건교육학회지 게재논문을 중심으로)

  • Hee-Jung Park;Minsung Sohn;Seok Hwan Kim
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.25 no.3
    • /
    • pp.39-49
    • /
    • 2024
  • Purpose: This study aims to analyze the current status of research related to infants and school-age-child published in the journal of Korean society for school & community health education from 2000 to 2023, with the goal of contributing to the future development and enhancement of the journal. Method: From 2000 to 2023, 52 papers were analyzed, comparing and classifying their journal topic, research types, data collection methods, and data analysis methods. Results: The results shows that the highest publication trend occurred between 2008 and 2012, with most studies focusing on school-age children. In terms of research topic, 'health behavior and health education' was the most frequent with 14 papers (26.9%), followed by oral health with 9 papers (17.3%), safety management with 7 papers (13.5%), and sexual awareness with 6 papers (11.5%). Quantitative research was the most common research type, with surveys being the primary data collection method. Descriptive statistics and t-test were the most frequently used data analysis methods. Conclusion: To enhance the quality of the journal of Korean society for school & community health education, there should be an expansion of evidence-based research focusing on infants and school-age children. Additionally, there is a need for greater diversity in research design, data collection, and analysis methods.

A study on an application of 'Virtual Reality Therapy' concerning a technology of real-time interaction. (실시간 상호작용 기술의 '가상현실치료' 적용에 관한 연구)

  • Kim, Jeong-Hwan
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.81-97
    • /
    • 2011
  • The technology of 'Virtual Reality' has placed in advanced tools for human beings' joy and anger together with sorrow and pleasure in our generation. It has recently tried in a variety ways to use as an implication for treatment in the field of Cognitive Psychology. Especially, it widely approaches to human in terms of that a sense of reality in a virtual world through the five senses should reinterpret the meaning of cognition in the real world. Based on this paradigm shift, it allows for new treatment using the technology of virtual reality. A typical example is a field of Therapy in order to overcome panic disorder. It has advantages that in particular development of flexible interaction technologies in a virtual space can lead patients to experience psychological environments rather than physical one. the interaction technology provides environments in which users' five senses can be actively stimulated, it is very useful that information from the experiences in the virtual world allows people to learn through real experiences by renewing potential energies, advantages of Virtual Reality Therapy can be customized treatment by depending on symptoms in patients with panic disorder and are capable of differentiate application for the cure at each stage. It is to treat by leading patients to get accustomed to environments and situations in real world through care process with each symptom and stage. It is helpful that based on A Human-Sensibility Ergonomics, technologies like immersive virtual reality equipment, force-relative feedback and stereophonic sound, and like stimulating the sense of smell make people to induce experiences by stimulating human's five senses. There are many advantages of immersion in virtual world in that the phenomenon such as challenge, interaction, reality, illusion, and cooperation is expanded. As an application for therapy by growing such augmented reality, virtual space and sharing of data through the Internet and also inexpensive its availability have recently expanded the base. There are other benefits of Virtual Reality Therapy offering active interaction environments for cognitive experience which can provide appropriately adjusted environments for patients who are hard to overcome the real situation because of phobia. In addition to that it is safe and economical and patients' confidentiality is assured. Moreover, due to the principles of applying real-time navigation the Virtual Reality Therapy makes modification and supplementation easier and also it can reduce cybersickness because of the supply of Lenticular allowing people to see stereoscopy without eyeglasses, which makes sense of presence clearer. On top of that due to the development of interactive technologies, it is becoming close to sense of reality similar to real world by leading users to navigate by themselves and to operate objects in a virtual space. This paper will therefore examine, although it is of limited, characteristics of application of virtual reality technology based on A Human-Sensibility Ergonomics used for treatment for a disorder. this paper will analyse a range of its application and problems and it will suggest the future possibilities.

  • PDF