• 제목/요약/키워드: 이론 정보보호

Search Result 348, Processing Time 0.028 seconds

A Study on Policy Acceptance Intention to Use Artificial Intelligence-Based Public Services: Focusing on the Influence of Individual Perception & Digital Literacy Level (인공지능 기반 공공서비스 정책수용 의도에 관한 연구: 개인의 인식과 디지털 리터러시 수준이 미치는 영향을 중심으로)

  • Jang, Changki;Sung, WookJoon
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.60-83
    • /
    • 2022
  • The purpose of this study is to empirically analyze the effect of individual perception of artificial intelligence and the level of digital literacy on the acceptance of artificial intelligence-based public services. For empirical analysis, a research model was set up based on the technology acceptance model and planned behavior theory using survey data of 2017 and analyzed through structural equations. To summarize the results of the analysis, firstly, the positive perception of individuals about artificial intelligence technology plays a role in reinforcing attitudes toward benefits and reducing concerns about public service in which artificial intelligence technology has been introduced. Secondly, the level of digital literacy reinforces both benefits and concerns about artificial intelligence technology, but it was found that the intention to use public services was reinforced through the benefits of artificial intelligence technology perceived by individuals, rather than privacy concerns about artificial intelligence technology. Thirdly, it was confirmed that the perceived benefits of individuals on artificial intelligence technology reinforced the intention to use public civil services, and privacy concerns negatively influenced the intention to use. It was confirmed that the influence of a perceived ease of use and usefulness, as opposed to privacy concerns, further reinforces the intention to use. Both citizens' positive perceptions regarding the accuracy and reliability of information provided through artificial intelligence technology and institutional complementation of responsibility for errors caused by artificial intelligence technology are strengthened, and technical problems related to privacy protection are solved.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

Improving Lock Performance of Home-base Lazy Release Consistency (Home-based Lazy Release Consistency의 락 성능향상)

  • Yun, Hui-Cheol;Lee, Sang-Gwon;Lee, Jun-Won;Maeng, Seung-Ryeol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.10
    • /
    • pp.513-519
    • /
    • 2001
  • Home-based Lazy Release Consistency (HLRC) shows poor performance on lock based applications because of two reasons:(1) a whole page is fetched on a page fault while actual modification is much smaller , and(2) the home is at the fixed location while access pattern is migratory, In this paper we present an efficient lock protocol for HLRC. In this protocol, the pages that are expected to be used by acquirer selectively updated using diffs. The diff accumulation problem is minimized by limiting the size of diffs to be sent for each page. Our protocol reduces the number or page faults inside critical sections because pages can be updated by applying locally stored diffs . This reduction yields the reduction of average lock waiting time and the reduction of message amount. The experiment with five applications shows that our protocol archives 2%~40% speedup against base HLRC for four applications.

  • PDF

Induction Motor Starting Characterization with Power Factor Correction Capacitors (역률개선 콘덴서를 이용한 유도전동기 기동특성 분석)

  • Son, Seok-Geum
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.3
    • /
    • pp.206-212
    • /
    • 2017
  • Induction motor torque is the reactive power is needed which corresponds to the exciting current to generate the magnetic flux as the product of current and flux. For use in the method of supplying the required reactive power to the induction motor power factor correction apparatus using a lot of ways to supply in place of the power supply side, when using a power factor compensation device can reduce the apparent power, the power factor can be improved. However, the distance to the emergency generator transformers or motors from the motor capacity is smaller but short and difficult to maneuver the theory and practice of the operating characteristics of the starting characteristics of the motor used a lot of large industrial plants were measured and analyzed. Therefore, this study investigated the motor starting Analysis and interpretation for the relationship with the large motor starting torque and speed during motor starting.

Low Power Cryptographic Design based on Circuit Size Reduction (회로 크기 축소를 기반으로 하는 저 전력 암호 설계)

  • You, Young-Gap;Kim, Seung-Youl;Kim, Yong-Dae;Park, Jin-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.92-99
    • /
    • 2007
  • This paper presented a low power design of a 32bit block cypher processor reduced from the original 128bit architecture. The primary purpose of this research is to evaluate physical implementation results rather than theoretical aspects. The data path and diffusion function of the processor were reduced to accommodate the smaller hardware size. As a running example demonstrating the design approach, we employed a modified ARIA algorithm having four S-boxes. The proposed 32bit ARIA processor comprises 13,893 gates which is 68.25% smaller than the original 128bit structure. The design was synthesized and verified based on the standard cell library of the MagnaChip's 0.35um CMOS Process. A transistor level power simulation shows that the power consumption of the proposed processor reduced to 61.4mW, which is 9.7% of the original 128bit design. The low power design of the block cypher Processor would be essential for improving security of battery-less wireless sensor networks or RFID.

Research Trends Investigation Using Text Mining Techniques: Focusing on Social Network Services (텍스트마이닝을 활용한 연구동향 분석: 소셜네트워크서비스를 중심으로)

  • Yoon, Hyejin;Kim, Chang-Sik;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.513-519
    • /
    • 2018
  • The objective of this study was to examine the trends on social network services. The abstracts of 308 articles were extracted from web of science database published between 1994 and 2016. Time series analysis and topic modeling of text mining were implemented. The topic modeling results showed that the research topics were mainly 20 topics: trust, support, satisfaction model, organization governance, mobile system, internet marketing, college student effect, opinion diffusion, customer, information privacy, health care, web collaboration, method, learning effectiveness, knowledge, individual theory, child support, algorithm, media participation, and context system. The time series regression results indicated that trust, support satisfaction model, and remains of the topics were hot topics. This study also provided suggestions for future research.

A Study on the layered structure and supplementation of the international commerce order (국제통상질서의 충화구조와 보완성에 관한 연구)

  • Ko, Yong-Bu
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.215-233
    • /
    • 2001
  • Nowadays, the international economic environment has been improved by the World Trade Organization based on UR trade negotiation. In such state, the international commerce cooperation, which means trade liberalization through relaxation or abolition of customs and noncustoms harrier, is necessary a country's policy for overseas strategy. To the view point of international commerce order, there co-exist the globalism represntatived by GATT/WTO and the regionalism operated by European Community including 15 countries, or North American Zone with canada, Maxico. The former expands the trade liberalization through the most favoured nation treatment of WTO among whole world nations and the latter takes the differential trade policy to other countries. For extreme dependence on foreign natural resources and raw materials, Our country should strengthen it' comming prospect for the world economy. To put it more concrete, We must enforce in advance the legal basis of convention and norm which in adopted by WTO. Also we are desirable to cooperate with Asia and pacific economy area or APEC. Finally, under the direction of international commerce environment and world economy, we must take the commerce cooperation in global order considering the tendency of regionalism and bloc economy.

  • PDF

A Wavelet Based Robust Logo Watermarking Algorithm for Digital Content Protection (디지털 콘텐트 보호를 위한 강인한 웨이블릿 기반 로고 워터마킹 알고리즘)

  • Kim, Tae-Jung;Hwang, Jae-Ho;Hong, Choong-Seon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.33-41
    • /
    • 2008
  • Due to the advantage of wavelet transform such as the compatibility with JPEG2000, multi-resolution decomposition, and application of HVS(Human Visual System), watermarking algorithm based on wavelet transform (DWT) is recently mast interesting research subject. However, mast of researches are focused on theoretical aspects for the robustness rather than practical usage, and. may be not suitable too much complicated to use in practice. In this paper, robust logo watermarking algorithm based on DWT is proposed for large and huge data processing. The proposed method embeds the logo watermark by mapping of $8{\times}8$ blocks in order of the number of '1' of the original image and the randomized watermark image with LFSR. The original image is transformed by 2 level wavelet. The experimental results shows that the watermark is embedded successfully, and the proposed algorithm has the valuable robustness from the image processing like JPEG compression, low pass filter, high pass filter and changes in brightness and contrast.

  • PDF

A Meta-Analysis of Internet-Related Policy Research in Communication (인터넷 관련 규제정책 연구의 동향분석)

  • Kim, Yoojung
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.3-22
    • /
    • 2010
  • This study reviewed and ascertained policy researches relating to the Internet in the field of communication. With using a meta-analysis, this study attempts to classify 44 academic papers from 2000 to 2009 by research theme, methodology, theoretic rationale, related sub-theme, and targeted service and area. It is found that the themes of preceding researches examined herein were limited to the 4th domain in Developmental Model of Media Research. Such researches mainly relied on exploratory studies and only a few of them addressed theoretic rationales. Also, most of Internet regulation discussions focused on content regulation and general internet service. Lastly, researchers discussed laws having bearing on the Internet and social-cultural issues of the Internet.

  • PDF

A Prospective Model of Behavior of Physical and Occupational Therapists of The Confidentiality of Patient Medical records by Structural Equation Model (구조모형방정식을 이용한 물리치료사와 작업치료사의 환자의료정보 보호행동 예측모형 개발)

  • Lee, I.H.;Park, H.J.;Yun, K.I.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.4 no.1
    • /
    • pp.71-80
    • /
    • 2010
  • This study developed the perspective model of behavior of physical therapists(PTs) and occupational therapists(OTs) who are dealing with confidential patient medical information in hospitals. Theory of planned Behavior(TpB) model, expanded models 1 and 2 that add habit, social pressure, and work convenience concept to TpB are tested for the validity in explaining the preposing factors that affect the behavior of PTs and OTs in ensuring the confidentiality of patient medical records. Data were collected by administrating a survey to the 120 PTs and OTs in A city. Of the 120 questionaries distributed, 110 were responded resulting 91.6% of response rate. There were not significantly different among the group classified by age, 'clinical career, gender, work family, and education level were analysis using with Independent t test and one-way ANOVA. The relationships on the concepts suggested in the models were analysed by applying the Structured Equations Modeling methods. The results of Structured Equations analysis showed that expanded model 2 was more effective model than TpB model and expanded model 1.