• Title/Summary/Keyword: 인터넷 이용

Search Result 11,448, Processing Time 0.036 seconds

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC (5G-MEC 기반 초저지연 고화질 영상 전송 시스템)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.29-38
    • /
    • 2021
  • The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth for recognizing the situation in remote places more accurately through high-quality video as well as lower latency for faster interaction between devices and users. The emergence of the 5th generation mobile network provides features such as high bandwidth and precise location recognition that were not experienced in previous-generation technologies. In addition, the Mobile Edge Computing that minimizes network latency in the mobile network requires a change in the traditional system architecture that was composed of the existing smart device and high availability server system. However, even with 5G and MEC, since there is a limit to overcome the mobile network state fluctuations only by enhancing the network infrastructure, this study proposes a high-definition video streaming system in ultra-low latency based on the SRT protocol that provides Forward Error Correction and Fast Retransmission. The proposed system shows how to deploy software components that are developed in consideration of the nature of 5G and MEC to achieve sub-1 second latency for 4K real-time video streaming. In the last of this paper, we analyze the most significant factor in the entire video transmission process to achieve the lowest possible latency.

A Study on the Factors that Influence Adult Cyberbullying - focusing on the mediation effect on the attitude to cyberbullying (성인의 사이버폭력 가해 경험에 대한 영향 요인 연구 - 사이버폭력에 대한 태도의 매개효과를 중심으로)

  • Kim, Bong-Seob
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.57-80
    • /
    • 2021
  • This study aimed to identify the causes of adult cyberbullying, an issue which arouses little academic interest despite its seriousness and its harmful consequences, in order to provide basic data for the formulation of reasonable measures for preventing and reducing adult cyberbullying. To that end, the author of the study analyzed the results of the government-led Cyber Violence Survey conducted in 2019. First, the online survey panel owned by the research company selected a sample of 1,500 adult men and women in their 20s to 50s in proportion to reflect the composition of the local population. The survey was conducted online, with male subjects and female subjects accounting for 51.5% and 48.7% of the respondents, respectively. The result of the analysis shows that the respondents' attitude towards cyberbullying was fully mediaed according to such factors as gender, age, family relations, relationship with colleagues, Internet usage time, and contact with illegal content. In addition, partial mediation was observed with regard to online delinquency colleague numbers and cyberbullying victimization. As a result, the respondents' attitude towards cyberbullying was found to be the most important factor affecting adult cyberbullying. Based on these results, this study suggests that the formation of a non-conservative attitude towards cyberbullying should be considered to be more important than any other factors when preparing programs aimed at preventing cyberbullying.

The effect of gambling accessibility and availability on gambling problems (도박의 접근성과 가용성이 도박문제에 미치는 영향)

  • Im, Sook Hee;Park, Mi Sook;Kim, Kyung Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.242-251
    • /
    • 2021
  • This study investigates the effects of availability and accessibility on an individual's risk of developing a gambling problem. A total of 24 off-track betting facilities located in 12 districts of Seoul were examined in an effort to identify any association between their presence and citizens' gambling habits. Study participants included 1,490 online recruits residing in Seoul who participated in gambling activities in the 12 months prior to the study. To examine the differences in addiction rates and gambling frequency, a survey of demographics, gambling addictions, and gambling frequency divided the participants into two groups: those who resided in a district where off-track betting facilities were available, and those who resided elsewhere. Analysis results indicate that gambling frequency and addiction rates were significantly higher among participants residing in a district where off-track betting terminals are available. Additional analysis was performed with participants who mainly gambled on horse racing, with results similar to the previous analysis-significantly higher rates of gambling addiction and frequency were observed among participants residing in close proximity to off-track betting facilities.

The Effect of Online Social Relations Service Utilization on Life Satisfaction of Middle-aged and Older Adults : Focusing on the Mediating Effect of Social Support (중·고령자의 온라인 사회관계 서비스 활용도가 삶의 만족도에 미치는 영향 : 사회적 지지의 매개효과를 중심으로)

  • Um, Sa-Rang;Shin, Hye-Ri;Kim, Young-Sun
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.1-12
    • /
    • 2021
  • This study aims to verify the mediating effect of social support in the relationship between online social relations service utilization(PC, mobile) and life satisfaction for middle-aged and Older Adults. For this purpose, the '2017 Digital Devide Survey' data collected by the National Information Society Agency was used, and among 2,300 middle-aged and Older Adults aged 55 or older, 1,488 people using the Internet were selected as the final analysis target. Then, using the structural equation, the mediating effect of social support was verified in the between online social relations service utilization and life satisfaction. As a result, it was verified that higher levels of mobile-based social relations service utilization have a positive effect on social support and life satisfaction. Also, it was confirmed that social support has a mediating effect in the relationship between the utilization of mobile-based social relations service and life satisfaction. However, the utilization of PC-based social relations services did not show to affect social support and life satisfaction. Therefore, the results of this study can be used as basic data for practical measures to increase the connection between mobile-based social relationship service education and social support promotion education for middle-aged and Older Adults. In addition, the study is meaningful in that it overcomes the limitations of measuring the use of online social relations services as one, and selects tools that are practically effective by dividing them into mobile and PC.

An Exploratory Study of Health Information Seeking Behaviors among International Students in Korea (국내 거주 해외유학생의 건강정보추구행위에 관한 탐색적 연구)

  • Yoon, JungWon
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.4
    • /
    • pp.231-250
    • /
    • 2021
  • Despite the increasing number of international students in Korea, there is a lack of research on the health information-seeking behavior of international students. This study examined the health information search behavior of international students in Korea through a questionnaires and in-depth interviews adopting Critical Incident Technique. Most frequent health information needs that the participants experienced were related to Covid-19 and locating doctors/hospitals. The difficulties in seeking health information were language barriers, lack of knowledge of the Korean medical system, insufficient or overflowing information on the Internet. However, despite the language barrier, international students mainly used Korean sources (friends/family, websites, social media) for searching health information. In order to search health information on Korean websites, they used Google Translator or got help from bilingual friends/family members. The participants who have lived in Korea for a shorter period of time or who have lower Korean language proficiency tend to obtain health information through the community on social networks; whereas the longer the period of residence in Korea and the better the Korean language proficiency, the more likely to use websites. Only 28% of the participants gave positive answers to the question asking their confidence in finding the health information they needed. It is discussed how to help international students find accurate and credible health information.

A Study on the Factors Affecting the Intention of Chinese Users to Discriminate Against Fake News on Social Media - Focusing on attitude, social capital, and risk detection - (중국 이용자 소셜미디어 가짜뉴스 판별의도에 미치는 요인에 관한 연구 -태도, 사회자본, 위험감지를 중심으로-)

  • Tan, KeHong;Lee, Hwa Haeng
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.337-351
    • /
    • 2022
  • With the full spread and rapid development of social media, the trend of decentralization of social media information propagation is becoming clearer day by day, and the segmentation of time by audiences using social media information is clearly progressing. Therefore, this study aims to study the influence relationship between social media attitudes toward fake news, social capital, risk perception, and discriminant intentions based on existing studies. Accordingly, the research model presented related research questions and organized a questionnaire to collect a total of 500 valid surveys. The SPSS 26.0 program and the AMOS 24.0 program were used to analyze the data. The research results are as follows. First, the more positive the user's attitude towards the fake news identification intention of social media, the more they want to use various methods or tools to identify the authenticity of online information. Second, the more positive the user's attitude towards social media fake news, the more aware of the potential threats social media fake news poses to their own physical, psychological, financial and so on. At the same time, by raising one's own awareness of the dangers, counterintelligence intentions against fake news on social media will also increase. Third, the richer the social capital the user has, the stronger the information literacy, and therefore the stronger the identification intention of social media fake news. Fourth, the higher the value of social capital Chinese users have, the greater the damage they have suffered from fake news, and the higher the risk awareness of fake news to protect their interests. Fifth, it means that Chinese users recognized information suspected of social media and took corresponding measures.

Development of LoRa IoT Automatic Meter Reading and Meter Data Management System for Smart Water Grid (스마트워터그리드를 위한 LoRa IoT 원격검침 및 계량데이터 시스템 개발)

  • Park, Jeong-won;Park, Jae-sam
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.172-178
    • /
    • 2022
  • In this paper, water meter AMR(automatic meter reading), one of the core technologies of smart water grid, using LoRa IoT network is studied. The main content of the research is to develop the network system and show the test results that one PC server receives the readings of water meters from multiple households through LoRa communication and stores them in the database, and at the same time sends the data to the web server database through internet. The system also allows users to monitor the meter readings using their smartphones. The hardware and firmware of the main board of the digital water meter are developed. For a PC server program, MDMS(meter data management system) is developed using Visual C#. The app program running on the user's smartphone is also developed using Android Studio. By connecting each developed parts, the total network system is mounted on a flow test bench in the laboratory and tested. For the fields test, 5 places around the university are selected and the transmission distances are tested. The test result show that the developed system can be applied into the real field. The developed system can be expanded to various social safety nets such as monitoring the living alone or elderly with dementia.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.