• Title/Summary/Keyword: 환경적 침해

Search Result 394, Processing Time 0.026 seconds

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

Behavioral Contextualization for Extracting Occupant's ADL Patterns in Smart-home Environment (스마트 홈 환경에서의 재실자 일상생활 활동 패턴 추출을 위한 행동 컨텍스트화 프로세스에 관한 연구)

  • Lee, Bogyeong;Lee, Hyun-Soo;Park, Moonseo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.1
    • /
    • pp.21-31
    • /
    • 2018
  • The rapid increase of the elderly living alone is a critical issue in worldwide as it leads to a rapid increase of a social support costs (e.g., medical expenses) for the elderly. In early stages of dementia, the activities of daily living (ADL) including self-care tasks can be affected by abnormal patterns or behaviors and used as an evidence for the early diagnosis. However, extracting activities using non-intrusive approach is still quite challenging and the existing methods are not fully visualized to understand the behavior pattern or routine. To address these issues, this research suggests a model to extract the activities from coarse-grained data (spatio-temporal data log) and visualize the behavioral context information. Our approach shows the process of extracting and visualizing the subject's spaceactivity map presenting the context of each activity (time, room, duration, sequence, frequency). This research contributes to show a possibility of detecting subject's activities and behavioral patterns using coarse-grained data (limited to spatio-temporal information) with little infringement of personal privacy.

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

A Study of Internet Filtering for Public Information Resources (공공정보자원에서의 인터넷 필터링에 관한 연구)

  • Kim, You-Seung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.111-133
    • /
    • 2007
  • Illegal and harmful information on the Internet have been a great concern not only for regulatory authorities, but also all the public institutes, such as public libraries and schools, that provide Internet access service. In particular, for public libraries which play an important role in organizing, opening and providing information resources in the information society, providing Internet access service are indispensible. Therefore, any changes of Internet content regulatory system may have direct effects on services of public libraries. Due to unique characteristics of the Internet, content refutation on the Internet has made a best use of various regulatory methods, ranging from governmental regulation to self-refutation and technical regulatory methods. However, nation by nation. technical regulatory methods on the Internet have been developed in quite different ways. Applying them on public library has been strongly criticised for violating freedom of expression and rights of access to information. This article begins with a theoretical discussion about free speech rights and refutation on Internet. Then it examines filtering software which is one of the most popular technical regulatory methods based on both technical and socio-humanities' prospects and analyses several governments' regulatory approaches to Internet filtering. As a conclusion, issues concerning Internet filtering at public institutes are critically apprised.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

A Study on the Reliability and Validity of the Collection of the Ethnography Method of Service Experience Data - Focusing on I know You_AI Service - (서비스경험데이터의 에스노그라피 방식 수집에 대한신뢰성과 타당성 연구 - I know you_AI 서비스를 중심으로 -)

  • Ahn, Jinho;Lee, Jeungsun
    • Journal of Service Research and Studies
    • /
    • v.10 no.4
    • /
    • pp.43-55
    • /
    • 2020
  • Recently, as the importance of experience data increases, there are many attempts to deal with experience data from a data science perspective. In the case of approaching as a collection method of a quantitative survey method that seeks to quantify numerically such as big data, it is difficult to interpret the value of experience in a wide range, and it is relatively expensive and time consuming, and personal information infringement There is a limit to the analysis due to the risk of However, since ethnography, a procedure for collecting experience data based on qualitative research, is mainly carried out in the natural real environment of future customers from the perspective of users, it is possible to confirm the nature that customers face with a small sample. In addition, it is also easy to interpret the relational dimension of the empirical data. Although the ethnography method of collecting experiential data is economical and efficient, it is important to reduce errors in the collection process because the lack of scientific procedures for the data collection process can be a problem. It is important to secure the validity of whether the correct measurement tool is used for ethnography-based experiential data collection and to secure the reliability of the use of a valid measurement tool and method by accurately selecting the measurement target. From this point of view, it is necessary to verify the reliability of the research method that clearly selects the measurement target and secures the validity for the development of the correct measurement method and tool for the collection of ethnography experience data. Therefore, in this study, a verification study was conducted on the data and methodology cases of the'I know you_AI' service that analyzes the customer experience of self-employed based on the ethnography method of collecting experience data..

An Effectiveness Analysis of Landscape Management for the Historic and Cultural Environment Preservation Area of the Pungnammun Gate, Jeonju, by Applying 3D Visual Exposure (3차원 시각노출도를 이용한 전주 풍남문 역사문화환경보존지역의 경관 관리 효과 분석)

  • Lee, Jae-Yong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.2
    • /
    • pp.30-37
    • /
    • 2018
  • The uniformed regulations for control of the height of buildings owned by individuals to protect landscape of cultural properties are causing serious social conflicts by limiting the development of landowners. It is urgent need of introducing indicators that can resolve such conflicts and evaluate the regulations of buildings, which can satisfy urban development as well as landscape management of cultural properties. Therefore, the purpose of this study is to simulate landscape changes according to the Cultural Heritage Protection Act and National Land Planning and Utilization Act by using Unity3D in the Pungnammun Gate(Treasure No. 308) of Jeonju and its surroundings, where architectural cultural property forms the symbolic landscape of the city. Then some items such as view points, target points were introduced and the quantitative evaluation of landscapes was attempted by applying the indicator of 3D Visual Exposure. As a result, the viewing opportunity and viewing area of Pungnammun Gate were not significantly influenced by changes in landscape according to the two laws. However, the change of the height of buildings by the National Land Planning and Utilization Act, which has the greatest development capacity, confirmed the possibility of weakening the identification of the Pungnammun Gate by increasing 3D Visual Exposure of the background buildings more than two times. Finally, it was confirmed that the skyline of Pungnammun Gate was clearly infringed upon development under the National Land Planning and Utilization Act, but the skyline was maintained similar to the current situation in the regulation by the Cultural Heritage Protection Act. Thus, this study is meaningful in that the application of 3D Visual Exposure showed the possibility of utilization as an indicator for quantitatively evaluating the protection of view on cultural property and skyline according to the changes of building heights.

Deterioration Diagnosis and Conservation Treatment of the Three-storied Stone Pagoda in the Cheongryongsa Temple, Anseong, Korea (안성 청룡사삼층석탑의 풍화훼손도 진단과 보존처리)

  • Lee, Sun-Myung;Lee, Myeong-Seong;Jo, Young-Hoon;Lee, Chan-Hee;Jeon, Seong-Won;Kim, Ju-Ok;Kim, Sun-Duk
    • Economic and Environmental Geology
    • /
    • v.40 no.5
    • /
    • pp.661-673
    • /
    • 2007
  • Rock materials of the three-storied stone pagoda in the Cheongryongsa temple in Korea are mainly composed of gneissose two-mica granite and fine-grained granite. This stone pagoda shows structural instability due to cracks and breaking-out of the stones. The surface properties of the stone is highly degraded by various inorganic pollutants and epilithic biospecies. Therefore, this study carried out comprehensive deterioration diagnosis by non-destructive methods, and some conservation treatments base on the diagnosis were carried out to reduce weathering progress. As the treatments, the biospecies and lichen that covering on the stone surfaces were removed by dry and wet cleaning, and degraded concrete applied to the pagoda for restoration in the past was removed and repaired with epoxy resin. Oxidized iron plates inserted between the rock properties were also substituted titanium stainless steels. After all processes are completed, we sprayed consolidant on the rock surface. Finally, the ground of the stone pagoda was rearranged using small rock aggregates, and the fence was established for control of artificial deterioration by visitors and environmental maintenance.

A Study on the Impact of the COVID-19 Pandemic on the Rights and OSH of Seafarers and Tendency in 2022 Amendments of Maritime Labour Convention (팬데믹이 선원의 권리 및 안전보건에 미친 영향과 2022년 해사노동협약 개정 동향 연구)

  • Hyun-Wook Doo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.7
    • /
    • pp.1191-1200
    • /
    • 2022
  • The COVID-19 pandemic can be deemed one of the greatest hardships faced by mankind in the 21st century. All industries have been severely affected and workers are still experiencing deep difficulties due to the changed working and living environment. Seafarers have been recognized by the international community as key workers since the pandemic began. They are also working internationally to establish a Level Playing Field through the protection of their rights through the Seafarers' Employment Agreement and the implementation of international labour standards. However, despite the obligations under international conventions to be implemented by State parties and the recommendations by international organizations, the rights of seafarers under the Maritime Labour Convention were violated were violated and their occupational safety and health of seafarers were further threatened throughout the pandemic. This article analyzes the impact of the international shipping industry and the implementation of the Maritime Labour Convention based on each country's measures during the COVID-19 pandemic. Furthermore, the amendments of the Maritime Labour Convention adopted through the fourth Special Tripartite Committee were analyzed based on the conference documents and reports to comprehend the implied meaning. The adopted eight amendments to the Maritime Labour Convention are expected to positively affect the seafarers' rights, safety and health in the future, but the international community's efforts should continue because the issues of maximum working hours, maximum service period on board, and the repatriation of seafarers still remain unsettled.