• Title/Summary/Keyword: 익명성

Search Result 510, Processing Time 0.029 seconds

A Study on Crime Prevention Design in Urban Apartment Complex by Application of a CPTED -focused on the Medium sized City- (중소도시 아파트단지 방범계획의 CPTED 요소 적용에 관한 연구)

  • Bahn, Sang-Chul;Shin, Hee-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1176-1187
    • /
    • 2014
  • In Contemporary residential area, especially apartment commplex, crime affect the quality of life and sustainability of cities. So our interest is an all-time high in the role that planning processes and the design of the physical environment can play in reducing the opportunity for crime. The purpose of this study try to find the possibility of application of CPTED in Urban Apartment Complex. Recently, as increase of residencial density, diverse and new types of crime are increasing in urban apartment complex. It is the current of times which demand our serious consideration. This research focused on crime reduction through the physical environmental control methods. And the concepts and contents of CPTED are studied and the case studies of developed countries are surveyed. For groping in the practical application, researched into the case study of apartment blocks in medium sized city, Cheongju. Also Local crime prevention initiatives require partnership working, both between professionals and with local communities. The result of this study has implicated, increasing importance on daily safety issue in urban life and examining the possibility of applying crime prevention and reduction program and systems.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

The Moderating Role of Binge Drinking on the Self-Assertiveness-Sexual Victimization Relationship among College Students (대학생의 자기주장과 성폭력 피해에서 폭음의 조절역할)

  • Hong, Hyeon-gi;Kim, Hee-song;Lee, Jung-eun;Jung, Sue-hyun;Ji, Hyung-ki;Kim, Ki-pyoung;Pyo, Chu-yun;Kim, Jong-han;Hyun, Myoung-Ho
    • Stress
    • /
    • v.25 no.2
    • /
    • pp.93-97
    • /
    • 2017
  • Backgound: The present study was designed to investigate the moderating role of binge drinking on the relationship between self-assertiveness and sexual victimization among college students (N=393, male: 161, female: 232). We hypothesized that the relationship between self-assertiveness and sexual victimization is meaningful only when binge drinking is low, not high. Methods: Using an online site, participants filled out a packet of questionnaires for demographic information, their amount of unwanted sexual contact experience, and their rate of alcohol consumption. Results: In the result, binge drinking moderated the relationship between self-assertiveness and sexual victimization. For the high binge drinker group, high self-assertiveness was not a statistically significant predictor of sexual victimization. Conclusions: Although self-assertiveness is known to be a protective factor against sexual victimization, our results imply that self-assertiveness alone is not enough to lower sexual victimization. Binge drinking and self-assertiveness are considered together in sexual violence prevention programs.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Message Recovery Fair Blind Multi-Signature Scheme Based on Meta-ElGamal Protocol (Meta-ElGamal 기반 메시지 복원 공정 은닉 다중 서명 기법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.23-36
    • /
    • 1999
  • As the blind signature(10) does not reveal any information about the message or its signature it has been used for preventing the information leakage and for providing the anonymity in secure electronic payment systems. Unfortunately this perfect anonymity could be misused by criminals as blind signatures prevent linking the withdrawal of money nd the payment made 표 the same customer. Therefore we should provide publicly verifiable mechanism if it is required for the judge to trace the blackmailed messages. In this paper we propose a modified blind signature scheme which additionally provides the role of message recovery after analyzing the existing meta-ELGamal scheme(12) suggested by Horster. And we suggest a new fair blind multi-signature scheme based on the oblivious transfer protocol with which a judge can publicly verify its fairness and correctness if needed. Proposed scheme can also applicable to the diverse electronic payment applications.

Comparative Analysis on Digital Currency Models and Electronic Payments (중앙은행의 디지털화폐 발행방식 및 전자지급수단의 비교분석)

  • Yoon, Jae-Ho;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.63-72
    • /
    • 2022
  • With the advent of cryptocurrencies such as Bitcoin in 2009, the paradigm of money, a means of payment, has been changing significantly. And it has a great impact on our daily lives. Thus central banks have attempted various analyzes on the issuance and impact of digital currencies including electronic payments but a study on which issuance method is suitable is insufficient. In this study, the issuance of digital currency was analyzed compared to the electronic payments which are currently used. As a result, the account-based model did not show any significant differences from the current RTGS(real-time gross settlement systems) and retail payment systems. But the token-based model is expected that it can improve the efficiency of finance and induce technological innovation in the financial field. However, it was analyzed that this model would weaken the intermediary function of financial institutions such as loans due to the characteristics of digital signature technology. In addition, in order to protect consumers against security attacks such as hacking and phishing of CBDCs, legal and institutional supports similar to the current electronic payment method are required, and continuous technology development efforts are also required for the CBDC issuance model to maintain convenience and anonymity equivalent to cash.

Developing Local Human Resources Program by Analyzing the Preference Factors for Enrollment of Higher Education in Seoul-Metropolitan Area: Focused on High School Students in Jeonbuk (수도권대학 진학 선호 요인 분석을 통한 지역인재 양성 프로그램의 방향 모색: 전북지역 고등학생을 중심으로)

  • Pak, Sungsine;Kim, Seok-soon
    • Journal of Practical Engineering Education
    • /
    • v.14 no.1
    • /
    • pp.205-217
    • /
    • 2022
  • For high school students in Jeonbuk, this study aims to identify the problems caused by outflow of local youth population and their preference factors to enter university in Seoul-metropolitan area, and to draw out the direction of local human resources program, through questionnaire investigation and focused group interview. The main findings are as follows: First, 68.8% of high school students, especially the top grade students prefer to enter university in metropolitan area. The metropolitan cultural characteristics, such as reputation of universities and ranking, openness and anonymity, and urban infrastructure attract students. Second, there is a close relationship between the individual background, growth area - enrollment area - employment area, and the location dependency without return migration is very strong. Third, local human resources program was evaluated as a meaningful activity for high school students, in order to understand the further education and career, and have an interest in local universities. Therefore, it is necessary to discover industries consistent with local identity, create networks, develop and implement programs considering the actual educational conditions. The gender-free program, supplement program for the integrated curriculum, and contents that to supplement science subjects should be developed. Additionally, this issue could be resolved expanding the perspective of balanced national development and improve the local environment to enhance the urban attraction points.

A comparison of working alliance, session evaluation and participants' experience of university student clients by counseling media -Comparison of face-to-face, phone, video, and video with digital mask counseling- (대학생 내담자를 대상으로 한 상담 작업동맹과 회기 평가 및 내담자 경험 비교 연구 - 전화, 화상 및 디지털가면 화상상담과 대면상담 비교 -)

  • Cho, Eunsuk;Oh, Yoon-Seok;Jang, Eun-Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • The purpose of this study is to find out how on-line counseling modalities (phone, video, and video counseling using digital mask) differ from face-to-face counseling in terms of clients' perception of working alliance, depth and smoothness of each session, satisfaction, and their qualitative counseling experience. 40 university students participated in the experiment, divided into 4 groups, received 3 personal counseling sessions per person. The quantitative data revealed no significant difference among the four counseling groups in working alliance. Also, the "depth" of the session was similar in the four groups, but phone and video with mask counseling group who did not expose their faces showed higher "smoothness" in the first and second sessions than face-to-face counseling group, indicating that anonymity was helping the clients' inhibition overcome. Through the post-interview data, subtle differences in experience of each counseling method were identified by the participants. The results are expected to provide primary information for developing and implementing various online counseling modalities in the future.

A Hybrid Blockchain-Based E-Voting System with BaaS (BaaS를 이용한 하이브리드 블록체인 기반 전자투표 시스템)

  • Kang Myung Joe;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.8
    • /
    • pp.253-262
    • /
    • 2023
  • E-voting is a concept that includes actions such as kiosk voting at a designated place and internet voting at an unspecified place, and has emerged to alleviate the problem of consuming a lot of resources and costs when conducting offline voting. Using E-voting has many advantages over existing voting systems, such as increased efficiency in voting and ballot counting, reduced costs, increased voting rate, and reduced errors. However, centralized E-voting has not received attention in public elections and voting on corporate agendas because the results of voting cannot be trusted due to concerns about data forgery and modulation and hacking by others. In order to solve this problem, recently, by designing an E-voting system using blockchain, research has been actively conducted to supplement concepts lacking in existing E-voting, such as increasing the reliability of voting information and securing transparency. In this paper, we proposed an electronic voting system that introduced hybrid blockchain that uses public and private blockchains in convergence. A hybrid blockchain can solve the problem of slow transaction processing speed, expensive fee by using a private blockchain, and can supplement for the lack of transparency and data integrity of transactions through a public blockchain. In addition, the proposed system is implemented as BaaS to ensure the ease of type conversion and scalability of blockchain and to provide powerful computing power. BaaS is an abbreviation of Blockchain as a Service, which is one of the cloud computing technologies and means a service that provides a blockchain platform ans software through the internet. In this paper, in order to evaluate the feasibility, the proposed system and domestic and foreign electronic voting-related studies are compared and analyzed in terms of blockchain type, anonymity, verification process, smart contract, performance, and scalability.

Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community (온라인 커뮤니티에서 사용되는 댓글의 형태를 고려한 악플 탐지를 위한 전처리 기법)

  • Kim Hae Soo;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.103-110
    • /
    • 2023
  • With the spread of the Internet, anonymous communities emerged along with the activation of communities for communication between people, and many users are doing harm to others, such as posting aggressive posts and leaving comments using anonymity. In the past, administrators directly checked posts and comments, then deleted and blocked them, but as the number of community users increased, they reached a level that managers could not continue to monitor. Initially, word filtering techniques were used to prevent malicious writing from being posted in a form that could not post or comment if a specific word was included, but they avoided filtering in a bypassed form, such as using similar words. As a way to solve this problem, deep learning was used to monitor posts posted by users in real-time, but recently, the community uses words that can only be understood by the community or from a human perspective, not from a general Korean word. There are various types and forms of characters, making it difficult to learn everything in the artificial intelligence model. Therefore, in this paper, we proposes a preprocessing technique in which each character of a sentence is imaged using a CNN model that learns the consonants, vowel and spacing images of Korean word and converts characters that can only be understood from a human perspective into characters predicted by the CNN model. As a result of the experiment, it was confirmed that the performance of the LSTM, BiLSTM and CNN-BiLSTM models increased by 3.2%, 3.3%, and 4.88%, respectively, through the proposed preprocessing technique.