• Title/Summary/Keyword: 제안 주체

Search Result 745, Processing Time 0.024 seconds

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties (그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석)

  • Jeong, Sihyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.567-575
    • /
    • 2020
  • As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

A Study on Data Compliance Measures of Digital Healthcare Service - Focusing on Personal Information Lifecycle (디지털 헬스케어 서비스의 데이터 컴플라이언스 방안에 관한 연구 - 개인정보 라이프사이클을 중심으로)

  • Jung, Jaeeun;Yang, Jinhong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.134-143
    • /
    • 2022
  • 'Data' is the key component that leads Digital Healthcare. Most of the Healthcare Data is personal information of data subject and includes Sensitive Information. It is very important for companies to use data lawfully and safely during the lifecycle of data collection, use, provision, and destruction. However, small and medium-sized enterprises(SMEs), ventures, and startups, which account for 78% of the Healthcare Services Industry, have had difficulties in performing tasks related to personal information protection. The personal Information Protection Act's requirements depending on the purpose of using Personal Information are different. Also, the requirements for each personal information lifecycle are varied. Therefore, this study suggests six purposes for companies to use healthcare data. It examines the considerations during the lifecycle in which personal information is collected to be destroyed.

A Discussion on Critical Pedagogy as a Philosophy in Education for Alternative Education in Korea (한국 대안교육의 교육철학으로서 비판교육학 논의)

  • Hur, Changsoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.477-487
    • /
    • 2021
  • Alternative education in Korea has grown into an educational movement since the 1990s. The alternative education is affecting and growing the public education system such as innovative schools, free semester systems, and high school credit systems. In 2021, an institutional foundation was also established to be recognized and supported as an educational institution. As a result of reflecting on the alternative education movement for 20 years, it is understood as stagnant lost time in the second half of the decade. It is discussing reorganizing the meaning of future-oriented "alternatives" with the new "alternatives". The poverty of educational philosophy has also been highlighted as an issue, but no special discussions have been underway. Thus, the study discussed to propose an educational philosophy that could capture the ideologies of alternative education. Critical pedagogy aims to foster human beings who are subjective, autonomous, active and self-reliant through conscious emancipation. In recent years, critical pedagogy have discussed ecological environment and feminism. The educational philosophy of scholars such as Freire and Illich was the basis of the early alternative educational movement. Considering this, the study discusses that Korea's alternative education movement can be understood through critical education and is reasonable as an educational philosophy for new alternatives in the future.

A Study on Data Linkage Between Public Data Portals and Individual Portals (공공데이터 포털과 개별 포털 간의 데이터 연계방안 연구)

  • Jin Ho, Park;Sang Woo, Han
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.249-269
    • /
    • 2022
  • The Public Data Portal(data.go.kr) is a gateway for searching and using public data in South Korea. In 2021, the Ministry of Public Administration and Security established individual portal maintenance plans. Individual portals refer to portals built by public institutions in Korea other than the public data portal. According to the maintenance plan, the Korea Intelligence Information Society, the operator of the public data portal, needs to establish operating and data integration plans to link the public data portal and individual portals. In this study, we investigated the current operating status and data integration methods of the public data portal in South Korea, the United States, the United Kingdom, and France, and proposed that the adoption of a top-down approach is efficient when integrating data. In addition, we divided the specific procedures that should be pursued when integrating data into five stages: determination of data integration standard methods, analysis of metadata status, expansion of operating infrastructure, confirmation of data import, and launch of services.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Understanding Child Abuse Based on Big Data Analysis -A Basic Study on the Development of Machine Learning Algorithm- (빅데이터 분석에 기반한 아동학대의 이해 -머신러닝 알고리즘 개발 기초연구-)

  • Bae, Jungho;Burm, Eunae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2022
  • The purpose of this study is to provide basic data on policy development using big data analysis and machine learning algorithms as part of preparing measures to prevent child abuse. In order to analyze big data for developing machine learning algorithms to prevent child abuse, frequency analysis, related word analysis, and emotional analysis were performed after defining academic databases and social network service data as big data. related words, and emotional analysis were conducted. As a result of the study, a preventive child abuse algorithm can be developed by preparing a data collection and sharing network system to prevent child abuse from the perspective of children affected by child abuse, perpetrators, and government authorities. Although it will be possible by institutionalizing infant self-esteem, depression, and anxiety tests with clues that depression and anxiety appear due to a decrease in self-concept in the characteristics of children affected by child abuse. We suggest that continuous progress of big data collection and analysis and algorithm development research to prevent child abuse, and expects that effective policies to prevent child abuse will be realized to eradicate child abuse crimes.

Analysis on Writing Status of Laboratory Notebook by Science-Gifted High School Students (과학고 및 영재학교에 재학 중인 과학영재의 연구노트 작성실태 분석)

  • Hyeoksang Yu;Jiwon Lee
    • Journal of Science Education
    • /
    • v.46 no.3
    • /
    • pp.266-277
    • /
    • 2022
  • We analyzed the responses of 152 science-gifted high school students by surveying the status and recognition of writing and keeping laboratory notebooks to develop guidelines and education plans. Science-gifted students did not write laboratory notes diligently, despite recognizing that it is crucial to do so. Mentors also tended not to provide faithful guidance and inspection. There was an insufficient practice in using research evidence in laboratory notebooks, such as including names and dates for authentication. In addition, while a high ratio of students owned their own laboratory notebooks, there was not a high level of recognition regarding the retention period, ownership, and responsibility. Based on these results, we propose suggestions for improving educational institutions for gifted students in science. First, it is necessary to strengthen the guidance for science-gifted students to faithfully write laboratory notebooks. Second, education on writing laboratory notebooks should be provided. Third, science-gifted high schools should prepare regulations for the management of lab notes and conduct education based on them.

A Study on Detailed Nondisclosure Criteria for the Administrative Departments (행정각부 비공개 대상정보 세부기준 개선방안 연구)

  • Youseung Kim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.3
    • /
    • pp.115-136
    • /
    • 2023
  • The purpose of this study is to discuss problems and seek improvement plans based on a critical analysis of the detailed standards for nondisclosure of 19 administrative departments in accordance with Article 26 of the Government Organization Act. To this end, the status of information disclosure-related regulations in 19 administrative departments was analyzed, and 6,094 cases of nondisclosed information were investigated and analyzed. In addition, through interviews with seven information disclosure experts, the analysis contents of this study were shared and reviewed. Furthermore, opinions on the effectiveness, problems, and system improvement areas of the detailed standards for nondisclosed information were collected. As a conclusion, three improvement measures were proposed: first, the legislation on the establishment of detailed standards for nondisclosure; second, the establishment of a system for regular substantive inspection of detailed standards for nondisclosure; and third, the improvement in the service of detailed standards for nondisclosure.

A Developing a Machine Leaning-Based Defect Data Management System For Multi-Family Housing Unit (기계학습 알고리즘 기반 하자 정보 관리 시스템 개발 - 공동주택 전용부분을 중심으로 -)

  • Park, Da-seul;Cha, Hee-sung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.5
    • /
    • pp.35-43
    • /
    • 2023
  • Along with the increase in Multi-unit housing defect disputes, the importance of defect management is also increased. However, previous studies have mostly focused on the Multi-unit housing's 'common part'. In addition, there is a lack of research on the system for the 'management office', which is a part of the subject of defect management. These resulted in the lack of defect management capability of the management office and the deterioration of management quality. Therefore, this paper proposes a machine learning-based defect data management system for management offices. The goal is to solve the inconvenience of management by using Optical Character Recognition (OCR) and Natural Language Processing (NLP) modules. This system converts handwritten defect information into online text via OCR. By using the language model, the defect information is regenerated along with the form specified by the user. Eventually, the generated text is stored in a database and statistical analysis is performed. Through this chain of system, management office is expected to improve its defect management capabilities and support decision-making.

The Value of Peace and the Acts of Women of the Old Testament from the Migrational Perspective (이주의 관점으로 본 구약성서의 여성들의 행동과 평화의 가치)

  • Choi, Eunyoung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.321-328
    • /
    • 2016
  • This study seeks the applicable value for contemporary multiculturalism based on the women (Hagar, Tamar, Rahab, Ruth, A great woman who lives in Shunem, A nameless servant girl) of the Old Testament who experienced migration. The article critiques uses of scripture that emphasize the roles of the women in the household. It provides a new interpretation through the perspective of feminist criticism, narrative criticism, and reader-response criticism. The article introduces the examples of six migrant women who created peace with people around them through their positive roles despite the fact that women had limited function under patriarchal society at that time. It suggests, while recognizing the difference regarding race, gender, and class between migrants and non-migrants, women and men, that they should not be used as the tools of discrimination. Furthermore, through these women from the Bible, the reader may find role models of independent women who are working for peace and social justice.