• Title/Summary/Keyword: 정보 유포

Search Result 197, Processing Time 0.023 seconds

Korean Media Partisanship in the Report on THAAD Rumor Network and Frame Analysis (사드 루머(THAAD rumor) 보도에 나타난 한국 언론의 정파성 네트워크 분석과 프레임 분석을 중심으로)

  • Hong, Juhyun;Son, Young Jun
    • Korean journal of communication and information
    • /
    • v.84
    • /
    • pp.152-188
    • /
    • 2017
  • This study stereotyped the media on the basis of ideological inclinations and media types and explored the news coverage through word analysis, network analysis, and frame analysis. There was no difference between conservative media and progressive media in terms of the amount of news. The conservative mainstream media considered the THAAD rumor as an unnecessary misunderstanding and a rumor based conflict of the south-south. The progressive mainstream media mentioned much about Hwang Gyoan, external influences, and lies and highlighted the government's opinion that there was external influence that spread a vicious rumor. Conservative media mentioned on the bringing about social disturbance and in case of progressive media mentioned social disturbance, and progressive media mentioned the responsibility of government and the attitude of conservative media about the diffusion of the rumor. In conclusion the press framed the THAAD rumor on the basis of their ideological inclinations instead of the role of journalist.

  • PDF

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

Manbojeonseo(萬寶全書) Geumdoron(琴道論) in the old scores of Joseon(朝鮮) (조선시대 고악보에 나타난 『만보전서(萬寶全書)』의 금도론(琴道論))

  • Choi, Sun-a
    • (The) Research of the performance art and culture
    • /
    • no.20
    • /
    • pp.251-307
    • /
    • 2010
  • Manbojeonseo, a kind of an encyclopedia published several times in Ming Ch'ing dynasty, includes useful information for scholars and common people on daily lives. In 1720, Manbojeonseo was first introduced to Joseon(朝鮮) dynasty by the diplomatic corps visiting Ch'ing dynasty, and widely circulated in the society as an useful information magazine or an individual collection of reference book. Since Manbojeonseo includes the systematically-organized contents of Geumdoron(琴道論, a theory of a heptachord), it could provide a useful reference when the Geumdoron was inserted as the contents of old scores. For an instance, Obultan(五不彈), Tangeumsuji(彈琴須知), and Taeeumgibeop(太音紀法) recorded in Hangeumsinbo(韓琴新譜, 1724) clearly acknowledge Manbojeonseo as their common source. In this paper, the order and the contents of Geumdorons from four different Manbojeonseo are compared. At first, the comparative analysis of Manbojeonseo (1610) edited by Seo Giryong(徐企龍) and Manbojeonseo(1612) edited by Yu Jamyeong(劉子明) are carried out focusing on the contents of the Geumdoron, where both Manbojeonseos contain considerable amount of Geumdoron sections. The tables of the contents in both Manbojeonseos are composed of upper and lower levels classified into 4 large divisions for each. While the contents of the upper level is presumably older and focused more on the theory of the cardinal virtues, the contents of the lower one is relatively new and centered more on the skills for the real play of a heptachord(琴), the lyrics and the musical scores composed of Gamjabo(減字譜). Therefore, it could be said that the upper level is metaphysical while the lower level is physical. One of the differences between those two Manbojeonseos lies in the order and the terminology found in the large divisions. In the case of Manbojeonseo(1612), some terms in the large division represent and theoretically group the detailed descriptions in the small divisions such as 5 demands or 7 taboos in the play of the heptachord. In addition, a few lower divisions were newly added or revised in order to enhance the completeness of Geumhangmun(琴學門, study of a heptachord), and the detailed classification was revised and polished to improve the reasonableness. In Manbojeonseo(1614) composed by the same editor as Manbojeonseo(1610), the contents of the Geumdoron become much briefer than those of Manbojeonseo(1610) and Manbojeonseo(1612). In the case of Manbojeonseo(1739), a new type of the Geumdoron is included called Oeumjeongjobo(五音正操譜) while carrying a similarly brief section of the Geumdoron. Finally, the Geumdorons in Manbojeonseo and several old scores are comparatively analyzed. While the Geumbo(琴譜) owned by Gugagwon(國樂院) and Hangeumsinbo contains relatively old Geumdoron, Yuyeji(遊藝志) and Bangsanhanssigeumbo(芳山韓氏琴譜) adopt practical and relatively new Geumdorons different from the former old scores and similar to Manbojeonseo(1739) considering the order and the contents. In particular, the contents of the Geumdoron in Geumheonakbo(琴軒樂譜) is notably unique containing much of the upper and the lower levels of Manbojeonseo(1612), therefore thought to have actively adopted the contents of new Geumdorons.

Cultural Conflicts and Characteristics of Anti-Korean Wave in Southeast Asia: Case Studies of Indonesia and Vietnam (동남아시아 반한류에 나타난 문화적 갈등과 특성: 인도네시아와 베트남을 중심으로)

  • KIM, Su Jeong;KIM, Eun June
    • The Southeast Asian review
    • /
    • v.26 no.3
    • /
    • pp.1-50
    • /
    • 2016
  • This paper aims to investigate the cultural conflicts and characteristics of anti-Korean Wave discourse taken placed among Southeast Asian countries. To do this, it takes Vietnam and Indonesia as the study cases, which have been showing a trend of anti-Korean Wave discourse as well as high popularity of Hallyu. As research methods, the paper analyzes both on-line discourses of anti-Korean Wave and the email audience interviews from both countries. The results show some significant differences between the two countries as well as the similarity that Anti-Korean Wave discourses have been actively produced and disseminated through on-line media. As for Indonesia, the Anti-Korean Wave discourse pivots on the elements clashing between Indonesia's religion and cultural values and Korean consuming culture. According to the Anti-Korean Wave discourse, K-pop contents and entertainers are criticized for damaging the society's morals and cultural identities based on Islamic rules and values. Thus, the sentiment of the Anti-Korean Wave is likely to lead to the cultural nationalism for the sake of their cultural identity. As for Vietnam, anti-Korean Wave discourse mainly consists of issues on enthusiastic K-pop fans' anti-social behaviors and generational conflicts which are presumed attributed as the chief factor of the Anti-Korean Wave. In the Vietnamese discourse, social elites and adults treat the enthusiastic K-pop fans as those who are in need of educational care or psychological therapy. Unlike the Indonesian case, anti-Korean Wave discourse in Vietnam criticized the K-pop and the performer's competence for being cheap sexy and incompetence. They also denounce Korean dramas for their trite, typical story lines, use of excessive emotion, and unrealistic nature. However, the two country's interview participants have in common both acknowledged that rather than considering the Anti-Korean Wave as an issue that needs to be resolved it should be embraced as a natural cultural phenomenon.