• Title/Summary/Keyword: 서비스 요소

Search Result 4,688, Processing Time 0.03 seconds

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

The study about role of enforcement stage in safety activity for the international conference (국제회의 안전활동에 있어서 실시단계의 역할에 관한 연구)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.387-416
    • /
    • 2013
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in G20 summit meeding that had been held in Seoul in 2010. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Seoul G20 summit meeding and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role of event site activity stage for international conference are as followings; First, 'security protocol section' protocol and security are needed mutual win-win enough to be compared with adaptative relationship, thereby being demanded the closer cooperation and information exchange. Second, 'situation management section' there is a need of reinforcing the cooperative system between situation rooms of each agency in order to possibly operate all of the security manpower integrally, which are dispersed by function and by event site, in addition to the swift and organic information exchange between wide-area local government and all the security agencies focusing on a preparation planning group. Third, 'security manpower resource management section' there is a need of encouragement and interest in the leadership in order to devise system that all of the security manpower can concentrate on event and to be possibly satisfied the given conditions. Fourth, 'local government cooperative support section' the wide-area local government of a hosting city as international city operates several kinds of the facilities for international conference, supports operation of conference, achieves a ripple effect of event such as tourism, maximizes service of accomodations, and performs the primary responsibility for the maintenance of the traffic facilities, thereby needing to execute special inspection under the responsibility of Si-Do governors.

  • PDF

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

Big Five Personality in Discriminating the Groups by the Level of Social Sims (심리학적 도구 '5요인 성격 특성'에 의한 소셜 게임 연구: <심즈 소셜> 게임의 분석사례를 중심으로)

  • Lee, Dong-Yeop
    • Cartoon and Animation Studies
    • /
    • s.29
    • /
    • pp.129-149
    • /
    • 2012
  • The purpose of this study was to investigate the clustering and Big Five Personality domains in discriminating groups by level of school-related adjustment, as experienced by Social Sims game users. Social Games are based on web that has simple rules to play in fictional time and space background. This paper is to analyze the relationships between social networks and user behaviors through the social games . In general, characteristics of social games are simple, fun and easy to play, popular to the public, and based on personal connections in reality. These features of social games make themselves different from video games with one player or MMORPG with many unspecific players. Especially Social Game show a noticeable characteristic related to social learning. The object of this research is to provide a possibility that game that its social perspective can be strengthened in social game environment and analyze whether it actually influences on problem solving of real life problems, therefore suggesting its direction of alternative play means and positive simulation game. Data was collected by administering 4 questionnaires (the short version of BFI, Satisfaction with life, Career Decision-.Making Self-.Efficacy, Depression) to the participants who were 20 people in Seoul and Daejeon. For the purposes of the data analysis, both Stepwise Discriminant analysis and Cluster analysis was employed. Neuroticism, Openness, Conscientiousness within the Big Five Personality domains were seen to be significant variables when it came to discriminating the groups. These findings indicated that the short version of the BFI may be useful in understanding for game user behaviors When it comes to cultural research, digital game takes up a significant role. We can see that from the fact that game, which has only been considered as a leisure activity or commercial means, is being actively research for its methodological, social role and function. Among digital game's several meanings, one of the most noticeable ones is the research on its critical, social participating function. According to Jame Paul gee, the most important merit of game is 'projected identity'. This means that experiences from various perspectives is possible.[1] In his recent autobiography , he described gamer as an active problem solver. In addition, Gonzalo Francesca also suggested an alternative game developing method through 'game that conveys critical messages by strengthening critical reasons'. [2] They all provided evidences showing game can be a strong academic tool. Not only does a genre called social game exist in the field of media and Social Network Game, but there are also some efforts to positively evaluate its value Through these kinds of researches, we can study how game can give positive influence along with the change in its general perception, which would eventually lead to spreading healthy game culture and enabling fresh life experience. This would better bring out the educative side of the game and become a social communicative tool. The object of this game is to provide a possibility that the social aspect can be strengthened within the game environment and analyze whether it actually influences the problem solving of real life problems. Therefore suggesting it's direction of alternative play means positive game simulation.

Directions for More Effective County Extension Committees (군 농촌지도위원회의 효율적 운영 방안)

  • Martens, Daniel C.;Kim, Sung-Soo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.6 no.2
    • /
    • pp.75-84
    • /
    • 1999
  • Minnesota state law requires County Extension Committees (CECs). The County Board of Commissioners appoints committee members. Extension Educators are responsible for using CECs to assure the value of Extension work in the County. This paper will explore underlying values, principles and practices that can effect the utilization of CECs in ways that benefit the work of Extension and make the process a good experience for CEC members and Extension Educator. The paper is based primarily on readings in the Journal of Extension, interviews with two Extension Educator, and information provided by the University of Minnesota Extension Service for CEC members.

  • PDF

Impacts of R&D and Smallness of Scale on the Total Factor Productivity by Industry (R&D와 규모의 영세성이 산업별 총요소생산성에 미치는 영향)

  • Kim, Jung-Hwan;Lee, Dong-Ki;Lee, Bu-Hyung;Joo, Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.4
    • /
    • pp.71-102
    • /
    • 2007
  • There were many comprehensive analyses conducted within the existing research activities wherein factors affecting technology progress including investment in R&D vis-${\Box}$-vis their influences act as the determinants of TFP. Note, however, that there were few comprehensive analysis in the industrial research performed regarding the impact of the economy of scale as it affects TFP; most of these research studies dealt with the analysis of the non -parametric Malmquist productivity index or used the stochastic frontier production function models. No comprehensive analysis on the impacts of individual independent variables affecting TFP was performed. Therefore, this study obtained the TFP increase rate of each industry by analyzing the factors of the existing growth accounting equation and comprehensively analyzed the TFP determinants by constructing a comprehensive analysis model considering the investment in R&D and economy of scale (smallness by industry) as the influencers of TFP by industry. First, for the TFP increase rate of the 15 industries as a whole, the annual average increase rate for 1993${\sim}$ 1997 was approximately 3.8% only; during 1999${\sim}$ 2000 following the foreign exchange crisis, however, the annual increase rate rose to approximately 7.8%. By industry, the annual average increase rate of TFP between 1993 and 2000 stood at 11.6%, the highest in the electrical and electronic equipment manufacturing business and IT manufacturing sector. In contrast, a -0.4% increase rate was recorded in the furniture and other product manufacturing sectors. In the case of the service industry, the TFP increase rate was 7.3% in the transportation, warehousing, and communication sectors. This is much higher than the 2.9% posted in the electricity, water, and gas sectors and -3.7% recorded in the wholesale, food, and hotel businesses. The results of the comprehensive analysis conducted on the determinants of TFP showed that the correlations between R&D and TFP in general were positive (+) correlations whose significance has yet to be validated; in the model where the self-employed and unpaid family workers were used as proxy variables indicating the smallness of industry out of the total number of workers, however, significant negative (-) correlations were noted. On the other hand, the estimation factors of variables surrogating the smallness of scale in each industry showed that a consistently high "smallness of scale" in an industry means a decrease in the increase rate of TFP in the same industry.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

A Semantic Classification Model for e-Catalogs (전자 카탈로그를 위한 의미적 분류 모형)

  • Kim Dongkyu;Lee Sang-goo;Chun Jonghoon;Choi Dong-Hoon
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.102-116
    • /
    • 2006
  • Electronic catalogs (or e-catalogs) hold information about the goods and services offered or requested by the participants, and consequently, form the basis of an e-commerce transaction. Catalog management is complicated by a number of factors and product classification is at the core of these issues. Classification hierarchy is used for spend analysis, custom3 regulation, and product identification. Classification is the foundation on which product databases are designed, and plays a central role in almost all aspects of management and use of product information. However, product classification has received little formal treatment in terms of underlying model, operations, and semantics. We believe that the lack of a logical model for classification Introduces a number of problems not only for the classification itself but also for the product database in general. It needs to meet diverse user views to support efficient and convenient use of product information. It needs to be changed and evolved very often without breaking consistency in the cases of introduction of new products, extinction of existing products, class reorganization, and class specialization. It also needs to be merged and mapped with other classification schemes without information loss when B2B transactions occur. For these requirements, a classification scheme should be so dynamic that it takes in them within right time and cost. The existing classification schemes widely used today such as UNSPSC and eClass, however, have a lot of limitations to meet these requirements for dynamic features of classification. In this paper, we try to understand what it means to classify products and present how best to represent classification schemes so as to capture the semantics behind the classifications and facilitate mappings between them. Product information implies a plenty of semantics such as class attributes like material, time, place, etc., and integrity constraints. In this paper, we analyze the dynamic features of product databases and the limitation of existing code based classification schemes. And describe the semantic classification model, which satisfies the requirements for dynamic features oi product databases. It provides a means to explicitly and formally express more semantics for product classes and organizes class relationships into a graph. We believe the model proposed in this paper satisfies the requirements and challenges that have been raised by previous works.

Contents analyses of teaching·learning research on housing education of home economics for secondary schools (중등학교 주생활교육 교수·학습 개발연구 내용분석)

  • Joo, Hyunjung;Cho, Jaesoon;Choi, Yoori
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.33-48
    • /
    • 2017
  • The purpose of this research was to analyze the contents of housing teaching learning studies in Home Economics of secondary schools since 2001. The 22 research, drawn from the database 'riss4u', were analyzed in terms of general information of the paper (studied institution & year, implementation & evaluation, subject of study & size) and specific contents of teaching learning plans (theme, curricula & textbooks, methode & # of lessons, resources). The results showed that most studies were reported during the 7th or the 2007 revised curricula period. All, except one doctoral dissertation, were master's theses from a few universities. In all studies, ranging from 2 to 15 lessons, teaching learning plans were implemented and evaluated in the class of the researcher while some were applied in other schools, too. The theme of the teaching learning plans varied but were concentrated on one out of two content elements and two out of six learning elements. The 2007 revised curriculum seems to be an important turning point, not only reinforcing the analyses of the curricular and textbooks in the analyzing stage but also facilitating the use of various methods for the lessons in the developing stage. Practical problem based model was the most frequently adopted, while cooperative learning and ICT served as fundamental although not always mentioned. Various teaching resources such as UCC, reading materials, PPT were developed for the teacher. Activity sheets were the most frequently used for the students, followed by reading materials. Because teaching learning is an essential core of education, teaching learning studies should be more actively conducted and the variety of subject topics, methods and resources should also be obtained by more researchers.

The Present Situation and Challenges of the Russian Music Industry: Centered on the Digital Sound Sources (러시아 음악 산업 현황과 과제 - 디지털 음원을 중심으로 -)

  • Kwon, ki-bae;Kim, Se-il
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.395-424
    • /
    • 2018
  • The purpose of this paper is to examine the current situation and background of the Russian consumer music market, where digital music sources are making great strides in the noted recent years. In addition, music storage technology, media and change are considered together in this report. Moreover, Russia is the 12th largest music market in the world. The Russian music industry is following the recent trend of the global music industry, where the digital music market is growing rapidly on many different levels. The explosive growth of the digital sound sources in Russia's music industry is attributed to the explosive increase in available consumer downloads, streaming sound source service, and the increase in the number of digital sound sources using mobile technologies due to the development of the Internet. In particular, the sales of the available and accessible streaming sound sources are expected to grow explosively by the year 2020, which is expected to account for more than 85% of total digital music sales. In other words, the spread of smartphones and the resulting changes in the lifestyle of the Russians have created these changes for the global consumer of music. In other words, the time has come for anyone to easily access music and listen to music without a separate audio or digital player. And the fact that the Russian government's strong policy on the eradication of illegal copying of music is becoming an effective deterrent, as is also the factor that led to the increase of the share of the digital sound source to increase sales in Russia. Today, the Russian music industry is leading this change through the age and process of simply adapting to the digital age. Music is the most important element of cultural assets, and it is the beneficial content, which drives the overall growth of the digital economy. In addition, if the following five improvements(First, strengthen the consciousness of the Russian people about copyright protection; Second, utilizing the Big Data Internet resources in the digital music industry; Third, to improve the monopoly situation of digital music distributors; Fourth, distribution of fair music revenues; and Fifth, revitalization of a re-investment in the current Russian music industry) are effective and productive, Russia's role and position in the world music market is likely to expand.