• Title/Summary/Keyword: 위험도 판별

Search Result 173, Processing Time 0.033 seconds

A method for quantitative measuring the degree of damage by personal information leakage (개인 정보 노출에 대한 정량적 위험도 분석 방안)

  • Kim, Pyong;Lee, Younho;Khudaybergenov, Timur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.395-410
    • /
    • 2015
  • This research defines the degree of the threat caused by the leakage of personal information in a quantitative way. The proposed definition classifies the individual items in a personal data, then assigns a risk value to each item. The proposed method considers the increase of the risk by the composition of the multiple items. We also deals with various attack scenarios, where the attackers seek different types of personal information. The concept of entropy applies to associate the degree of the personal information exposed with the total risk value. In our experiment, we measured the risk value of the Facebook users with their public profiles. The result of the experiment demonstrates that they are most vulnerable against stalker attacks among four possible attacks with the personal information.

Decision Method for Change Model using Discriminant Analysis Technique (판별분석을 이용한 변경모델 결정방법)

  • Park, Ha-Kyung;Kim, Sang-Soo;In, Hoh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.645-648
    • /
    • 2007
  • IT 에 대한 비즈니스 의존성이 증가하면서, 안정된 IT 서비스의 제공과 비용 효과적인 운영의 중요성이 강조되고 있다. ITIL 에서는 효율적이고 신속한 변경 처리를 위해 Service Support 영역에서 변경 관리 프로세스를 제시하고 있다. 하지만 고비용을 요하는 CAB 의 소집 여부 등 의사 결정이 변경 관리자의 자의적인 판단에 의존함으로써, 다른 비즈니스 및 안정된 IT 서비스 제공의 위험요소로 작용하고 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 요청된 변경 사안이 신중한 검토가 필요한 지 여부를 객관적으로 판단할 수 있도록, 판별분석기법을 적용한 변경 모델 결정 방법을 제안한다. 제안된 모델의 유효성을 검증하기 위해, 실제 운영에 적용된 변경 관리 모델과 제안된 모델을 이용했을 때의 결과를 비교하고 그 결과를 제시하였다. 제안된 방법은 동일한 사안에 대하여 일관성 있는 결정을 도출할 수 있어 프로세스 품질개선에 기여할 수 있으며, 궁극적으로 안정된 IT 서비스 제공에 기여하여 기업성과를 개선할 수 있을 것이다.

  • PDF

Outlier Distinction Algorithm via Vessel Representative Trajectory Extraction (선박 대표 궤적 추출을 통한 Outlier 판별 알고리즘)

  • Park, Jin-Gwan;Oh, Joo-Seong;Kim, Bum-Mu;Jeon, Sung-Min;Lee, Sung-Ro;Jeong, Min-A
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.102-104
    • /
    • 2014
  • 본 논문은 해상 교통량 증가로 급증하는 선박 사고 위험을 줄이기 위해 안전 운항을 위한 대규모 선박 궤적 클러스터링을 제안한다. 선박의 위도와 경도, 이름 및 상태, 속도, 선수 방향 등이 기록된 대용량의 데이터집합을 바탕으로 선박 궤적 클러스터링을 통해 총 2개의 선박 대표 궤적을 추출한다. 해당 선박의 이전까지의 대표 궤적, 그리고 해당 해상의 모든 선박의 대표 궤적을 추출한 후 현재 해당 선박의 궤적패턴과 비교하여 유사하지 않으면 Outlier로 판별하여 이상 거동 및 불규칙 움직임, 충돌상황을 대비할 수 있도록 의사결정에 도움을 줄 수 있는 알고리즘을 제안하였다.

Mask and Maskless Wearers Detection based on Deep Learning (딥러닝 기반 마스크 착용자 및 미착용자 검출)

  • Kim, Taehyeon;Woo, Seunghee;Kim, Jeongmi;Choi, Haechul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.325-327
    • /
    • 2021
  • 코로나19 전염병 예방을 위한 공공장소에서의 마스크 착용이 의무화되고 있다. 그러나 사람들이 다양한 이유로 마스크를 제대로 착용하지 않아 감염에 노출되는 위험이 발생하고 있다. 이러한 방역 문제를 해결하고 본 논문은 영상을 인식하여 마스크를 쓴 얼굴과 쓰지 않은 얼굴을 검출하는 방식을 제안한다. 제안 방법은 마스크 착용자와 비착용자 얼굴 영상을 딥러닝 기반의 YOLO 네트워크로 학습하여, 마스크 착용 유무를 판별한다. 동일 YOLO 네트워크에 대해 여러가지 조건으로 학습을 수행하고, 학습에 사용되지 않은 검증 데이터를 이용해 정확도가 가장 높은 네트워크의 가중치를 선택하였다. 실험결과, 마스크 착용자는 67.2%, 미착용자는 39.8%의 판별 정확도를 보였다. 미착용자에 대해 낮은 정확도를 보인 이유는 학습 데이터의 부족으로 판단되며, 이를 보완하기 위하여 더 많은 학습데이터를 제작하여 성능을 개선시키고자 한다.

  • PDF

Internet Apparel Shopping: Perception of Risk among South Korean Female College Students in the Apparel Major (한국 여대생의 인터넷을 통한 의류제품 구입시의 인지위험 - 의류학 전공자를 대상으로 -)

  • Ko, Seung-Bong;Salusso, Carol J.;Sprott, David E.;Hwang, Choon-Sup
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.869-878
    • /
    • 2007
  • The purpose of this study was to investigate perception of risks among South Korean female college students within the process of purchasing apparel products through the Internet. The study was implemented by descriptive survey method using questionnaire and subjects consisted of 324 South Korean female college students. Findings of the study showed that the purchasing process particularly regarding delivery and security issues seemed to be a strong concern. On the other hand, unique selection such as apparel brands only available through the Internet was a strong appeal to 37.7% of subjects. Factor analysis profiled risk perception as: 1) Internet Shopping Selection Preference, 2) Delivery Problems and Lack of Security 3) Product Quality and Characteristics 4) Return Policy Difficulties and 5) Fair Prices. Discriminant analysis showed Factors 1, 2 and 3 were significant in helping to differentiate among Non-Purchasers, Fewer-purchasers and Many-Purchasers. Factor 1 and 3 helped differentiate among respondents relative to age range. Across all types of purchasers, offering unique selections of cutting edge fashions and improving risk perception relative to delivery and security concerns seemed important for gaining greater market share. Being able to delivery quality products and communicate product characteristics would be a powerful competitive edge to add to the incentive of convenience in shopping for apparel on the Internet.

Enhancement of Accuracy of Exploitability Analysis Tools for Crashes (크래시의 위험도에 대한 분석 도구의 정교성 향상)

  • Jeon, Hyeon-gu;Eom, Ki-Jin;Mok, Seong-Kyun;Cho, Eun-Sun
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.4
    • /
    • pp.178-183
    • /
    • 2016
  • To enhance the reliability of programs, developers use fuzzing tools in test processes to identify vulnerabilities so that they can be fixed ahead of time. In this case, the developers consider the security-related vulnerabilities to be the most critical ones that should be urgently fixed to avoid possible exploitation by attackers. However, developers without much experience of analysis of vulnerabilities usually rely on tools to pick out the security-related crashes from the normal crashes. In this paper, we suggest a static analysis-based tool to help developers to make their programs more reliable by identifying security-related crashes among them. This paper includes experimental results, and compares them to the results from MSEC !exploitable for the same sets of crashes.

The Influence of Smartphone Use on Marine Traffic Safety (스마트폰 사용이 선박통항안전에 미치는 영향에 관한 연구)

  • Shin, Daewoon;Park, Youngsoo;Park, Jinsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.2
    • /
    • pp.131-138
    • /
    • 2017
  • Lately, Internet-based vessels have begun to appear at sea with the development of ICT. Thereby crews have gained easy Internet access through increased smartphone portability. However, the side effects of smartphone use while on watch, have not been studied seriously despite being a reality. In this study, simulation experiments were carried out using a Ship Handling Simulator in order to distinguish the risks of using a smartphone while on watch. Proximity Evaluation, Control Evaluation, Subjective Evaluation and Situation Awareness to the dangerous situation were used to quantify risk during simulation, and analysis results were compared with cases when using and not using a smartphone. It was found that the degree of risk increased between 1.3 to 3 times given smartphone use. Consequently, this paper represents foundation for the restriction of smartphone use and proposes smartphone usage guideline for ship navigation.

Studies on Development of Prediction Model of Landslide Hazard and Its Utilization (산지사면(山地斜面)의 붕괴위험도(崩壞危險度) 예측(豫測)모델의 개발(開發) 및 실용화(實用化) 방안(方案))

  • Ma, Ho-Seop
    • Journal of Korean Society of Forest Science
    • /
    • v.83 no.2
    • /
    • pp.175-190
    • /
    • 1994
  • In order to get fundamental information for prediction of landslide hazard, both forest and site factors affecting slope stability were investigated in many areas of active landslides. Twelve descriptors were identified and quantified to develop the prediction model by multivariate statistical analysis. The main results obtained could be summarized as follows : The main factors influencing a large scale of landslide were shown in order of precipitation, age group of forest trees, altitude, soil texture, slope gradient, position of slope, vegetation, stream order, vertical slope, bed rock, soil depth and aspect. According to partial correlation coefficient, it was shown in order of age group of forest trees, precipitation, soil texture, bed rock, slope gradient, position of slope, altitude, vertical slope, stream order, vegetation, soil depth and aspect. The main factors influencing a landslide occurrence were shown in order of age group of forest trees, altitude, soil texture, slope gradient, precipitation, vertical slope, stream order, bed rock and soil depth. Two prediction models were developed by magnitude and frequency of landslide. Particularly, a prediction method by magnitude of landslide was changed the score for the convenience of use. If the total store of the various factors mark over 9.1636, it is evaluated as a very dangerous area. The mean score of landslide and non-landslide group was 0.1977 and -0.1977, and variance was 0.1100 and 0.1250, respectively. The boundary value between the two groups related to slope stability was -0.02, and its predicted rate of discrimination was 73%. In the score range of the degree of landslide hazard based on the boundary value of discrimination, class A was 0.3132 over, class B was 0.3132 to -0.1050, class C was -0.1050 to -0.4196, class D was -0.4195 below. The rank of landslide hazard could be divided into classes A, B, C and D by the boundary value. In the number of slope, class A was 68, class B was 115, class C was 65, and class D was 52. The rate of landslide occurrence in class A and class B was shown at the hige prediction of 83%. Therefore, dangerous areas selected by the prediction method of landslide could be mapped for land-use planning and criterion of disaster district. And also, it could be applied to an administration index for disaster prevention.

  • PDF

A Study on MS Crash Analyzer (MS 크래시 분석도구에 관한 연구)

  • Noh, Myoung Sun;Na, Jong Bae;Jung, Gwang Un;Ryou, Jae Cheol;Noh, Bong Nam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.399-404
    • /
    • 2013
  • MSEC(Microsoft Security Engineering Center) performed fuzz testing Windows Vista with 350 million test cases for 14 months before launching it. They analyzed crashes resulted from the testing and developed crash analyzer !exploitable based on the data used to determine exploitability. In this paper, we describe how MS crash analyzer determines exploitability of crashes. Besides, we suggest an improvement to overcome the limitations found in the MS crash analyzer during the analysis.

Risk Propensity and Marketing Strategies for Wrap Account Customers (랩 어카운트 고객 위험성향과 마케팅전략에 관한 연구)

  • Noh, Jeon-Pyo
    • Korean Business Review
    • /
    • v.17
    • /
    • pp.137-151
    • /
    • 2004
  • Wrap accounts are customized financial services for which investment companies and stock brokers manage investors assets based on their preferences. The success of wrap accounts depend upon the accurate understanding of investment risk propensity and the proper designing of financial portfolio. To this end investment companies should accurately measure investors investment risk propensity with calibrated measures. There, unfortunately, exist few highly calibrated measures of investment risk propensity. Therefore the practices of marketing strategies and customer management often turn out to be less effective and fragile to competition. The purposes of this present study aim to understand the investment risk propensity of wrap accounts customers, to help classify the customers based on the degree of the investment risk propensity, and to implement relevant marketing strategies for different groups of customers. Based on previous studies, two hypotheses were delineated and verified. The findings of the study should help differentiate prospective customers into unique and accessible segments for further targeting and positioning wrap account markets.

  • PDF