• Title/Summary/Keyword: 정보 노출

Search Result 2,542, Processing Time 0.03 seconds

YouTube Users' Awareness of False Information Regulation and Exposure to Disinformation (유튜브 이용자들의 허위정보 노출경험 및 규제에 대한 인식 차이)

  • Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.14-32
    • /
    • 2022
  • This study aims to examine the perception of false information and deepfakes according to the experience of being exposed to false information and deepfake images for YouTube content users. The study used the data from 'YouTube Use and False Information Exposure Experience' conducted by the Korea Press Foundation in 2018. For the statistical analysis, correspondent analysis was employed. The main results followed as: First, it was found that men who have been exposed to false information are most seriously aware of the problems caused by false information on YouTube. Second, regarding the need for regulation on deepfake images, women who have experienced exposure to deepfake images tended to agree, and women had a stronger awareness of the need for regulation due to damage to deepfake images than men. While YouTube users generally agree that regulation is necessary, it is required to educate YouTube users about the types of disinformation and deepfakes. In particular, it is considered to be desirable to create an environment for the self-regulation of the producers and distributors.

Auto Exposure control system for Compact Image Sensor Module (콤팩트 이미지 센서모듈을 위한 자동 노출제어 시스템)

  • Kim, Hyun-Sik;Jang, Won-Woo;Song, Jin-Gun;Kim, Kang-Joo;Kang, Bong-Soon
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2006.06a
    • /
    • pp.13-16
    • /
    • 2006
  • 사진을 찍을 때 카메라는 보기 좋은 사진을 얻을 수 있도록 많은 기능을 제공하고 있다. 대표적인 기능으로 자동 초점거리 조정(Auto Focus), 자동 색온도 보정(Auto White Balance), 자동 노출 조정(Auto Exposure)이 있다. 본 논문에서는 편리한 기능들 중 하나로써 자동 노출제어 시스템을 구현하였다. 본 논문에서 제안하는 자동 노출제어 시스템은 가변 시상수(Variable Time Constant)를 가지는 IIR 필터를 이용한다. Zone System에서 보여주는 사물의 휘도정보를 바탕으로 하여 이상적인 영상의 휘도 특성 그래프를 얻어내고, 이와 현재의 노출설정에서 휘도와 비교하여 적정 노출을 찾는다. 제안하는 자동 노출제어 시스템은 적정 노출을 얻을 수 있는 위치로 이동하기 위하여 기존의 마이크로 콘트롤러 등을 이용하여 구현하는 방법과 달리 간단한 구성을 가지는 IIR 필터를 이용한다. 제안하는 자동 노출제어 시스템은 간단한 구성을 가지므로 콤팩트 이미지 센서를 구성하기 위하여 사용 할 수 있다.

  • PDF

Legislative Reform of Smart Grid Privacy Act (스마트그리드 개인정보보호법제 개선)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.415-423
    • /
    • 2016
  • Smart grid systems can be real-time information exchange between suppliers and consumers, and provides a lot of convenience. However, the risk to the user's personal information exposure is ever-present. Depending on the characteristic of the smart grid environment, there is a threat of the disclosure of personal information based on the personal information life-cycle, and can also be exposed a variety of information based on energy consumption pattern analysis. In this paper, we analyze the existing privacy act in the smart grid and propose improvements for the existing directive.

Analysis of current density distribution and in vitro exposure system for ELF exposed cell experiments (ELF 전자파 피폭 세포실험을 위한 배양기의 전류밀도 분포해석 및 Invitro 노출장치 설계)

  • 김대근;정재승;안재목
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2000.11a
    • /
    • pp.297-301
    • /
    • 2000
  • ELF 전자파의 생물학적인 영향 평가를 위한 in vitro 세포 실험에서 노출장치의 설계는 코일내피 유도기전력(E)과 전류밀도(J) 해석과 함께 이루어져야 한다. 균일 자기장 속에서 세포를 배양할 경우애도 배양기내의 전도성 매질로 인해 균일한 E와 J가 분포하지 않는다. 따라서 균일한 ELF 자기장 노출장치로부터 발생되는 샘플 매질 내에서의 E나 J를 정확히 예측하는 것은 in vitro 세포실험의 성공여부를 가늠 할 정도로 매우 중요한 정보가 된다. 이에 본 논문에서는 in vitro 실험에 적합한 ELF in vitro 노출 장치를 설계하고 노출 장치에 대한 전자기학적 평가를 수행하였다. 코일 내에서 샘플 매질의 유무와 샘플 내에서도 세포가 놓여질 임의의 위치에 따라 E와 J를 예측하고 검증을 위한 측정과 시뮬레이션을 시도하였다. 노출장치는 헬름 홀쯔 코일로 제작되었고 자기장의 세기는 1-2OG 범위 내에서 가변이 가능하다. 또한 코일내의 자기장의 분포가 균일(uniform), 비균일(nonuniform)만 두 가지모드를 각각 제작하여 보았다.

  • PDF

Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks (세션상태 정보 노출 공격에 안전한 개선된 그룹 키 교환 프로토콜)

  • Kim, Ki-Tak;Kwon, Jeong-Ok;Hong, Do-Won;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.3-8
    • /
    • 2008
  • Ephemeral data are easily revealed if state specific information is stored in insecure memory or a random number generator is corrupted. In this letter, we show that Nam et al.'s group key agreement scheme, which is an improvement of Bresson et al.'s scheme, is not secure against session-state reveal attacks. We then propose an improvement to fix the security flaw.

Exploit Tool Implementation for Secure USB Drive: Based on the Password Authentication of Product F (보안 USB 취약점 익스플로잇 도구 개발: F 제품 비밀번호 인증을 기반으로)

  • Suwan Go;Seunghee Kwak;Junkwon Lee;Jaehyuk Lee;Kyungroul Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.176-177
    • /
    • 2023
  • 최근 USB 저장장치의 데이터 노출 및 탈취 문제를 해결하기 위하여, 보안 USB 저장장치가 등장하였으나, 데이터를 보호하기 위한 다양한 보안기술을 적용함에도 불구하고, 사용자 인증 우회나 비밀번호 노출과 같은 취약점으로 인하여, 보안 USB에 저장된 중요한 자료나 민감한 정보가 노출되는 문제점이 지속해서 발견되는 실정이다. 이에 따라, 보안 USB의 취약점 연구도 지속적으로 연구되고 있지만, 보안 USB 취약점을 분석하는 것은 수동적이고, 많은 노력과 시간이 소요되므로, 취약점을 자동으로 진단하고 분석하는 도구가 요구된다. 따라서, 본 논문에서는 자동화된 취약점진단 및 분석 도구를 제작하기 위하여, F 제품을 대상으로, 해당 제품에서 제공하는 비밀번호인증에서 발생하는 취약점을 분석하고 실증하며, 그 결과를 기반으로 최종적으로는 보안 USB 취약점 익스플로잇 도구 프로토타입을 개발한다.

A Cohort Study on Cancer Risk by Low-Dose Radiation Exposure among Radiation Workers of Nuclear Power Plants in Korea (저준위 방사선 노출의 암 유발에 관한 국내 원전종사자 코호트 연구)

  • Lim, Young-Khi;Yoo, Keun-Young
    • Journal of Radiation Protection and Research
    • /
    • v.31 no.2
    • /
    • pp.53-63
    • /
    • 2006
  • The increased risk of cancer with exposure to low-dose radiation was estimated through longitudinal study for radiation workers at the nuclear power plants in Korea. The radiation dose data were collected from the Radiation Safety Management System(RSMS) of the Korea Hydro & Nuclear Power Co., Ltd(KHNP). The cancer risks with radiation exposure were evaluated in terms of relative mortality ratios(RMR) and relative incidence ratios(RIR) to the unexposed employees at the nuclear power plants, and of the standardized mortality ratios(SMR) and standardized incidence ratios(SIR). There were no significant increases of canters of all sites in the exposed group either in RIR[1.08, 95% confidence interval(CI) 0.74-1.58] or in RMR[1.21, CI 0.70-2.08]. Neither SIR[0.81, CI 0.28-0.96] nor SMR[0.86, CI 0.66-1.10] significantly deviated from 1.0 for cancers of all sites. The trend analysis did not identify evident dose-response relationship due to insufficient numbers of the cases. Consequently, it is concluded that increases in cancer risks in the radiation worker group exposed to low doses at the nuclear power plants in Korea are not identified at this time.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Effect of Anthropomorphic Chatbot's Self-disclosure and Emotional Expression on User Experience - Focused on Conversational Error in Financial Service (의인화된 챗봇의 자기노출과 감정표현이 사용자 경험에 미치는 영향 - 금융서비스에서의 대화 오류 상황을 중심으로)

  • Kim, Hwanju;Kim, Jiyeon;Choi, Junho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.445-455
    • /
    • 2022
  • Financial service chatbots are hindering user experience with conversational errors and machine-like responses. This study aims to examine the effect of self-disclosure and emotional expression of an anthropomorphic chatbot on user experience before conversation errors occur in financial services. In financial inquiries, scenarios were designed based on self-disclosure type (positive vs. negative) and emotional expression level(high confident vs. low confident), and online experiments were conducted. The result revealed that when anthropomorphic chatbot provided self-disclosure and emotional expression, the main effect has been shown on trust, annoyance, service recovery, and intention to continuous use. In addition, interaction effects were significant in trust and annoyance. In conclusion, this paper demonstrated that anthropomorphic chatbot's positive self-disclosure and confident emotional expression influenced trust and annoyance.

Investigating the Role of Interaction Privacy Management Behavior on Facebook

  • Gimun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.181-189
    • /
    • 2024
  • The purpose of this study is to investigate the role of interaction privacy management behavior (Use of IPCs), which has received relatively little attention. To this end, this study proposes an integrated model that theorizes the relationship between the main variables of the privacy calculation model and interaction privacy management behavior. Empirical analysis of this model shows that the use of IPCs lowers risks, increases benefits, and in turn promotes increased self-disclosure. These results have implications for expanding the theoretical logic of the privacy calculation model because users' self-disclosure includes not only the limited exposure proposed in the model but also unrestricted exposure through the use of IPC.