Journal of the Korea Institute of Information Security & Cryptology
/
v.28
no.1
/
pp.215-227
/
2018
As Korea is rapidly becoming an IT powerhouse in the short term, various side effects such as cyber violence, personal information leakage and cyber terrorism are emerging as new social problems. Especially, the seriousness of leakage of personal information, which is the basis of safe cyber life, has been highlighted all over the world. In this regard, it is necessary to estimate the amount of the damage cost due to the leakage of personal information. In this study, we propose four evaluation methods to calculate the cost of damages due to personal information leakage according to average real transactions value, personally recognized value, compensation amount basis, and comparison to similar countries. We analyzed data from 2007 to 2016 to collect personal information leakage cases for 10 years and estimated the cost of damages. The number of cases used in the estimation is 65, and the total number of personal information leakage is about 430 million. The estimated cost of personal information leakage in 2016 was estimated to be at least KRW 7.4 billion, up to KRW 220 billion, and the 10 year average was estimated at from KRW 10.7 billion to KRW 307 billion per year. Also, we could find out the singularity that the estimated damage due to personal information leakage increases every three years. In the future, this study will be able to provide an index that can measure the damage cost caused by the leakage of personal information more accurately, and it can be used as an index of measures to reduce the damage cost due to personal information leakage.
Journal of the Korean Institute of Landscape Architecture
/
v.44
no.4
/
pp.66-74
/
2016
In what way is the urban landscape of North Korea used today, and what features do people prefer in the North Korean landscape? This study analyzed the characteristics of Pyongyang landscapes and their effects, based on an analysis of Western tourists motivation for tourism in North Korea and preferred enjoyment-seeking experiences. Using data from the tourist agency specializing in Western tourism in North Korea and a location based photo-sharing service, the study interprets the visual distinctiveness of Pyongyang landscape. The study concluded that widely known risk to travelers in North Korea is in fact an attraction, making people want to visit directly. However, this risk was mitigated in practical experience by the overall intermediation of the tourism agency and locals' conscious behavior to keep their distance from foreigners. Next, the scope of National ritual attributes was expanded to the locals' daily life as well as large-scale events such as mass games and military parades only if for national holidays. Also, the most preferred factors contributing to North Korean tourism were based on departure from routine through mobilization of the residents. This indicates the extension that the nature of North Korea as a theater state. The Pyongyang landscape represents a world politically isolated, people's congregated motion to display to the world, and people's lives hidden beneath a veil. These visualities fulfill the fantasy of Westerners regarding North Korea. Furthermore, these are superficial images that help create a basis to maintain the North Korea regime.
With the common tendency in the accordance with the trend, low-stories built edifices that are Pilotis-oriented structured exponentially and constantly increasing its number of buildings. It inevitably contains its risks of facing conflagrations as most of its part is used as parking lots. In the parking lots, the length of the flame has a heavy-weighted possibility that it would get increased because the heat release rate gets relatively high due to the vehicle insulation. Following on top of that, due to the nature of the Pilotisconsisting of pillars, there is a risk of flame spread to the adjacent building if the same Pilotis-structured buildings are adjacent to each other, if the flame spreads to the surroundings due to the influence of the wind. Because the most of the pilotis-structured-buildings have this entrance that makes the residents be able to enter, if the entrance were plugged the resident get a serious risk of a poisonous gas and a flame. Therefore, if the parking-lots of the pilotis-structured-buildings are adjacent to each other it requires a space to prevent the place from the spread of flame. This research studied how far is appropriate to prevent flame spreading with FDS. As a result, the study found that the distance at least 3.0 m is required.
Journal of the Korea Academia-Industrial cooperation Society
/
v.12
no.11
/
pp.5063-5070
/
2011
Foot-and-mouth disease occurs in cattle or wild animal with two hooves such as cow, pig, sheep, goat, and deer. In this study, survey on knowledge, awareness, and lifestyle about foot-and-mouth disease was performed on 398 elementary school in 5 regions in Gyeonggi-do. 49 people (92.5%) from the group who have been educated about the foot-and-mouth disease replied that they have heard of foot-and-mouth disease and 139 people (68.5%) from the group who have not been educated about the disease replied that they have not heard of the disease. About the knowledge regarding "Foot-and-mouth disease virus is destroyed at temperatures above $50^{\circ}C$, so cooked food is free from the virus", only 26 people (49.1%) from the educated group and 82 people (40.4%) have correct knowledge. When asked about when education on disease such as foot-and-mouth disease, both groups replied that the education should be done in elementary school. The FMD includes in Korea and is a disease where the infection occurrence is happening continuously from the various nation. Must prepare with a recognition and the knowledge where the people are proper.
Journal of the Korea Academia-Industrial cooperation Society
/
v.9
no.3
/
pp.664-673
/
2008
Recently, the ubiquitous is handled by maximum topic. New knowledge information and ubiquitous computing evolution have promoted new paradigm transfer and grand change. Also, need technology as powerful engineering approached fairly system and educational guidance side examination necessarily to overcome u-Learning base situation and studying obstacle situations. This treatise embodied handiness examination about attention shortage and excess obstacle (Attention Deficit Hyperactivity Disorder, low ADHD) who must solve so as to be square and level being increase trend in primary school using USB (Universal Serial Bus) terminal system that allow fetters to OSGi (Open Service Gateway Initiative). That OSGi base USB terminal system is easy preservation of information, safety of network, cost-cutting and maintenance by various ubiquitous system that server that load many USB terminals and OSGi uses an USB bus of high speed and construct network, there is advantage of concentration elevation and so on of week and ADHD handled in this treatise because early diagnosis and treatment are serious. The confirmed system application that can supplement paper and pens examination's shortcoming and could solve examination's problem which use computer, and help in student guidance through ADHD simpleexamination who utilize OSGi base USB terminal system. Is available by game system that system for human nature examination or intelligence test and general exam explaining and level studying, order style question investigation program, studying system for disabled person, majority that enforce in public in school this study finding does together.
Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.
KIPS Transactions on Computer and Communication Systems
/
v.8
no.9
/
pp.217-224
/
2019
Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.
Purpose: The aim of this study is to analyze the trend for the dispatch of the 119 rescue teams to remove the beehive according to the distribution of temperature and time in Busan metropolitan city for 5 years from 2015. Method: From January 2015 to December 2019, 11 fire stations in Busan were dispatched and the source data of rescue and emergency activities were collected. The number of beehive removal dispatches was determined by the Busan Metropolitan Fire Station's jurisdiction over the past five years, and the temperature meteorological factors and honeycomb removal dispatches were analyzed in frequency and percentage. Result: The frequency of dispatch began to increase at an monthly average temperature of more than 20℃ and was higher at 23℃ to 29℃ than other temperature range. The highest frequency of dispatch was 7,900 cases in 2017. In particular, we found that the start timing of the honeycomb removal is getting faster as the year goes by. Gijang-gun had the largest frequency of dispatch, and Haeundae-gu, Geumjeong-gu, and Nam-gu were found to have a higher that. Conclusion: We found that the start timing of the honeycomb removal is getting faster as the year goes by and temperature changes. The results of this study are considered to be useful in future studies of wasps in urban areas.
As part of the digital era, a digital twin that simulates the weak part of a product by performing a stress test that reduces the lifespan of some expensive equipment that cannot be done in reality by accurately moving the real world to virtual reality is being actively used in the manufacturing industry. Due to the development of IoT, the digital twin, which accurately collects data collected from the real world and makes it the same in the virtual space, is mutually beneficial through accurate prediction of urban life problems such as traffic, disaster, housing, quarantine, energy, environment, and aging. Based on its action, it is positioned as a necessary tool for smart city construction. Although digital twin is widely applied to the manufacturing field, this study proposes a smart city model suitable for the 4th industrial revolution era by using it to smart cities and increasing citizens' safety, welfare, and convenience through the proposed model. In addition, when a digital twin is applied to a smart city, it is expected that more accurate prediction and analysis will be possible by real-time synchronization between the real and virtual by maintaining realism and immediacy through real-time interaction.
Joung, Se Ho;Lee, Jung Woo;Bae, Da Young;Kim, Yoo Kyung
Journal of Korean Home Economics Education Association
/
v.33
no.1
/
pp.151-167
/
2021
This study reports on the development of a dietary education program for Korean young adults in single-person households. The 7th National Health and Nutrition Survey (2016-2018) was used to compare and analyze the dietary behavior of single-person households and multi-person households, and an online survey was conducted on 350 young adults (age 19-39 years) living in Seoul. According to the analysis, single-person households had higher rates of breakfast and eating out than multi-person households, and significantly lower average intake of energy and nutrients (p<0.05). In particular, in the case of single-person households, the lower the frequency of cooking at home, the higher the rate of breakfast and the higher the frequency of eating out and delivery food (p<0.05). Based on the survey, a dietary education program for young adults single-person households was developed by applying the DESIGN six-step procedure and social cognitive theory as a conceptual model. The first session consisted of the health and economic benefits of home-cooked meals, the second session of the importance of the breakfast and the effect of exercise in life, the third session of the importance of balanced nutrition and the principles of a healthy diet, the fourth session of food safety and storage, and the fifth session of social dining. Each session was composed of a combination of theoretical lectures to motivate 'more making and eating healthy home-cooked meals' and cooking practice for improving behavioral performance.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.