• Title/Summary/Keyword: 정보출처

Search Result 187, Processing Time 0.021 seconds

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

Unpacking Technique for In-memory malware injection technique (인 메모리 악성코드 인젝션 기술의 언 패킹기법)

  • Bae, Seong Il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2019
  • At the opening ceremony of 2018 Winter Olympics in PyeongChang, an unknown cyber-attack occurred. The malicious code used in the attack is based on in-memory malware, which differs from other malicious code in its concealed location and is spreading rapidly to be found in more than 140 banks, telecommunications and government agencies. In-memory malware accounts for more than 15% of all malicious codes, and it does not store its own information in a non-volatile storage device such as a disk but resides in a RAM, a volatile storage device and penetrates into well-known processes (explorer.exe, iexplore.exe, javaw.exe). Such characteristics make it difficult to analyze it. The most recently released in-memory malicious code bypasses the endpoint protection and detection tools and hides from the user recognition. In this paper, we propose a method to efficiently extract the payload by unpacking injection through IDA Pro debugger for Dorkbot and Erger, which are in-memory malicious codes.

Development of Classification System and Online Service Methods for Collections in Larchiveum-Type Institutions: The Case of the National Memorial of the Korean Provisional Government (라키비움 형식의 기관 소장 자료에 관한 분류체계 개발 및 온라인 서비스 방안: 국립대한민국임시정부기념관을 사례로)

  • Hyeyun Lee;Hae-young Rieh
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.24 no.2
    • /
    • pp.113-137
    • /
    • 2024
  • In this study, considering the National Memorial of the Korean Provisional Government as a "Larchiveum," the researchers attempted to develop a classification system that can comprehensively categorize various types of materials and propose a method of providing an online service. To this end, as a case study, the researchers examined the classification system structure and contents of the National Archives of Korea, National Assembly Archives, and Archives of Korean History of the National Institute of Korean History, which are the current material collection institutions of the Korean Provisional Government. Regarding online services, apart from the three institutions above, the Imperial War Museum and the Hoover Institution at Stanford University were also explored. Through the implications derived from the case analysis of domestic and foreign institutions, a basic hierarchical classification system by provenance for the materials held by the institution was established, and a multi-classification system was presented according to the classification criteria of "by type, by era, and by subject." In addition, methods of applying the developed classification system to online services were proposed.

A Study on the Collection Policy for Archiving Visual Arts Materials: Focusing on the National Museum of Modern and Contemporary Art, Korea (시각예술자료 아카이빙을 위한 수집정책 연구 - 국립현대미술관을 중심으로 -)

  • Sujin Kim;Soonhee Kim
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.2
    • /
    • pp.159-187
    • /
    • 2024
  • From the past to the present, collecting and managing collections have been one of the main functions of art museums. Museum work has focused on artworks rather than visual arts materials. Consequently, the importance of visual arts materials has tended to be undervalued, and due to persistent problems such as a lack of budget and space, the collection and management of these materials have not been easy. Furthermore, the unique nature of visual arts materials in terms of their types, sources, and distribution systems poses challenges for collecting them. Establishing a collection policy is the most fundamental and essential approach to addressing these difficulties. However, most domestic institutions collecting visual arts materials operate without a collection policy. This study aims to improve this situation by examining the current state of collecting visual arts materials at the National Museum of Modern and Contemporary Art, Korea, a prominent art museum in South Korea, to identify problems. It then analyzes overseas cases to draw implications. Based on these findings, the study proposes measures to improve current regulations and establish a collection policy for enhancing the collection of visual arts materials.

How Do People Evaluate a Web Site's Credibility (이용자들의 웹 사이트 신뢰성 평가 방법에 관한 연구)

  • Kim, Young-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.53-72
    • /
    • 2007
  • The Internet is now an integral part of the everyday lives of a majority of people. They are demanding web sites that offer credible information - Just as much as they want sites that are easy to navigate. But the online reality today is that few Internet users say they can trust the web sites that have products for sale or the sites that offer advice about which products and services to buy. Users want the web sites they visit to provide clear information to allow them to judge the site's credibility. Users want to know who runs the site; how to reach those people; the site's privacy policy; and how the site deals with mistakes. In the eyes of users all sites ate not equal. Users have different credibility standards for different types of sites. For news and information sites users want advertising clearly labeled as advertising. And users want the site to provide a list of the editors responsible for the site's contents, including the editor's email address. For e-commerce sites, user expectations and demands are just about as high as they can be. They say that it is very important that these sites provide specific, accurate information about the site's policies and practices.

  • PDF

A Study on Development of Digital Compilation Management System for Local Culture Contents: Focusing on the Case of The Encyclopedia of Korean Local Culture (향토문화 콘텐츠를 위한 디지털 편찬 관리시스템 개발에 관한 연구: "한국향토문화전자대전"의 사례를 중심으로)

  • Kim, Su-Young
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.3
    • /
    • pp.213-237
    • /
    • 2009
  • Local culture is a cultural heritage that has come down from generation to generation in the natural environment of a region. It includes history, tradition, natural features, art, and historic relics. The Academy of Korean Studies has complied "The Encyclopedia of Korean Local Culture" using those local culture contents. Local culture content shave the features of documentary, such as authenticating the source, and managing hierarchy structure. Thus, to deal with local culture contents, a "circular knowledge information management system" is sought for that helps basic, fragmentary, and high-level information to circulate to create new knowledge information within the system. A user of this circular knowledge information management system is able not only to collect data directly in it, but also to fetch data from other database. Besides, processing the collected data helps to create new knowledge information. But, it's very difficult to sustain the features of the original hierarchy bearing meaning contained in the various kinds of local culture contents when building a new database. Moreover, this kind of work needs many times of correction over a long period of time. Therefore, a system in which compilation, correction, and service can be done simultaneously is needed. Therefore, in this study, focusing on the case of "The Encyclopedia of Korean Local Culture", I propose a XML-based digital compilation management system that can express hierarchy information and sustain the semantic features of the local culture contents containing lots of ancient documents, and introduce the expanded functions developed to manage contents in the system.

Quality Evaluation Factors and Continuance Intention for Web-based Legal Information Services (웹기반 법률정보서비스 품질 평가요인 및 지속의도에 관한 연구)

  • Park, Ji-Hong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.57-76
    • /
    • 2017
  • The purpose of this study is to investigate the determinants of the quality of Web-based legal information services and their significant influences on the user continuance intentions. Based on the main dimensions of the SERVQUAL, this study conceptualizes five dimensions of reliability, assurance, design, empathy, and responsiveness. It measures the level of expectation and satisfaction on the basis of these five dimensions. Regression analysis was conducted to extract and analyze the determinants of the service quality and the factors affecting continuous intention. The level of legal information service quality is superior in empathy, responsiveness, and design category, but it is relatively insufficient in reliability and assurance category. In the reliability category, the relevance of the search results was an issue. The problems related to the authority and information sources were recognized as important. Reliability implies that there is a relatively close relationship between empathy and responsiveness, and that it is necessary to improve the quality of contents such as empathy and responsiveness in order to increase reliability. In order to increase the ongoing use of legal information services in the future, it is more effective to make sure that assurance is top priority.

Geospatial Data Pipeline to Study the Health Effects of Environments -Limitations and Solutions- (환경의 건강 영향 연구를 위한 공간지리정보 데이터 파이프라인 -자료활용의 제한점과 극복방안-)

  • Won Kyung Kim;Goeun Jung;Dongook Son;Sun-Young Kim
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.27 no.3
    • /
    • pp.60-75
    • /
    • 2024
  • Research on health outcomes of environmental factors has been implemented by multiple and interacting factors, including environmental, socio-demographic, economic, and traffic aspects. There are still significant challenges and limitations in constructing databases for the connections between contributing factors and an integrated approach to environmental health research even though there has been a dramatic increase in data availability and incredible technological advance in data storage and processing. This study emphasizes the necessity of establishing a geospatial data pipeline to analyze the impact of environmental factors on health. It also highlights the difficulties and solutions related to the construction and utilization of a geospatial database. Key challenges include diverse data sources and formats, different spatio-temporal data structures, and coordinate system inconsistencies over time within the same geospatial data. To address these issues, a data pipeline was constructed with pre-processing and post-processing for the data, resulting in refined datasets that could be used for calculating geographic variables. In addition, an AWS-based relational database and shared platform were established to provide an efficient environment for data storage and analysis. Guidelines for each step of the process, including data management and analysis, were developed to enable future researchers to effectively use the data pipeline.

Development of Web Credibility Evaluation Model Using AHP (AHP를 이용한 웹 사이트 신뢰성 평가 모델 개발)

  • Kim, Young-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.51-69
    • /
    • 2008
  • This study tired to develop the web credibility evaluation model by calculating weighted values and sensitivities of indicators which presented on preceding researches using Analytic Hierarchy Process. "Expert Choice 2000" was used as the tool for analysing AHP. 25 experts are answered for this questionnaire who are selected by judgement sampling method, one of the non-probability sampling method. Also, sensitivity analyses was performed to graphically see how the alternatives change with respect to the importance of the indicators or sub-indicators. The main results are summarized as followings; i) importance analysis in first level factors: trust-worthiness(0,606), expertness(0.222), safety(0.173), ii) importance analysis in second level factors: trustfulness (0.519), reputation(0.087), usefulness (0.102), timeliness(0,093), competency(0.027), security(0.115), reliability(0,058). iii) some of the importance analysis in third level factors: the site provides comprehensive information that is attributed to a specific source(0.252), the site has articles that list citations and references(0.153), the site contains user opinions and reviews(0.072), etc. iv) sensitivity analyses showed that the importance of the indicators or sub-indicators are slightly changed with respect to the alternatives change.

  • PDF

A Study on DID-based Vehicle Component Data Collection Model for EV Life Cycle Assessment (전기차 전과정평가를 위한 DID 기반 차량부품 데이터수집 모델 연구)

  • Jun-Woo Kwon;Soojin Lee;Jane Kim;Seung-Hyun Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.309-318
    • /
    • 2023
  • Recently, each country has been moving to introduce an LCA (Life Cycle Assessment) to regulate greenhouse gas emissions. The LCA is a mean of measuring and evaluating greenhouse gas emissions generated over the entire life cycle of a vehicle. Reliable data for each electric vehicle component is needed to increase the reliability of the LCA results. To this end, studies on life cycle evaluation models using blockchain technology have been conducted. However, in the existing model, key product information is exposed to other participants. And each time parts data information is updated, it must be recorded in the blockchain ledger in the form of a transaction, which is inefficient. In this paper, we proposed a DID(Decentralized Identity)-based data collection model for LCA to collect vehicle component data and verify its validity effectively. The proposed model increases the reliability of the LCA by ensuring the validity and integrity of the collected data and verifying the source of the data. The proposed model guarantees the validity and integrity of collected data. As only user authentication information is shared on the blockchain ledger, the model prevents indiscriminate exposure of data and efficiently verifies and updates the source of data.