• Title/Summary/Keyword: Anonymity

Search Result 523, Processing Time 0.041 seconds

Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community (온라인 커뮤니티에서 사용되는 댓글의 형태를 고려한 악플 탐지를 위한 전처리 기법)

  • Kim Hae Soo;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.103-110
    • /
    • 2023
  • With the spread of the Internet, anonymous communities emerged along with the activation of communities for communication between people, and many users are doing harm to others, such as posting aggressive posts and leaving comments using anonymity. In the past, administrators directly checked posts and comments, then deleted and blocked them, but as the number of community users increased, they reached a level that managers could not continue to monitor. Initially, word filtering techniques were used to prevent malicious writing from being posted in a form that could not post or comment if a specific word was included, but they avoided filtering in a bypassed form, such as using similar words. As a way to solve this problem, deep learning was used to monitor posts posted by users in real-time, but recently, the community uses words that can only be understood by the community or from a human perspective, not from a general Korean word. There are various types and forms of characters, making it difficult to learn everything in the artificial intelligence model. Therefore, in this paper, we proposes a preprocessing technique in which each character of a sentence is imaged using a CNN model that learns the consonants, vowel and spacing images of Korean word and converts characters that can only be understood from a human perspective into characters predicted by the CNN model. As a result of the experiment, it was confirmed that the performance of the LSTM, BiLSTM and CNN-BiLSTM models increased by 3.2%, 3.3%, and 4.88%, respectively, through the proposed preprocessing technique.

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.

Analysis of the Danmu Phenomenon on the Chinese Video Platform Bilibili - Focused on Henry Jenkins' Concept of Participatory Culture (중국 동영상 플랫폼 Bilibili의 탄막 현상 분석- 헨리 젠킨스의 참여문화 개념을 중심으로)

  • HUANG SHIYI;Kwon Hochang
    • Trans-
    • /
    • v.15
    • /
    • pp.81-104
    • /
    • 2023
  • This paper analyzes the danmu phenomenon with the concept of participatory culture proposed by Henry Jenkins. Unlike other comments, Danmu is a function that allows users to post anonymously while watching a video, and comments posted at that time are immediately displayed on the screen and can be viewed by other viewers. The service was first launched by Niconico. In this paper, the danmu phenomenon in the Chinese video platform Bilibili is analyzed by focusing on three aspects. First, in terms of creative sharing under collective intelligence, we explore how users create their own creations and share them with other users through danmu. Second, in the collaboration model under public participation, the method and meaning of collective cooperation through users' interaction is dealt with. Third, in terms of financial support of commercial capital, the influence of danmu videos to create commercial profits is analyzed as a case. In addition, the negative aspects and challenges of participatory culture in Bilibili are analyzed. Negative aspects such as participation gap, copyright infringement, excessive use of danmu and problems of anonymity were reviewed, and major challenges to realize the potential of danmu as a participatory culture were suggested. This paper comprehensively analyzes danmu using research methods such as literature review and case studies, and through this, tries to derive insights on how participatory culture and danmu interact and evolve in modern society. Danmu, as a participatory medium, is an important tool that promotes individual and collective creation and interaction, and is pioneering a new boundary between the media industry and its users.

The Relationship between Driving Behavior, Driving Anger, and Ambivalence Over Emotional Expressiveness in an Anonymous Situation (익명상황의 운전행동과 운전분노 및 정서표현갈등과의 관계)

  • Bo Young Yun ;Soon Chul Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.17 no.3
    • /
    • pp.321-341
    • /
    • 2011
  • This study examines how anonymity between drivers affects aggressive driving and why, in an anonymous situation, some drive aggressively and others do not. Two surveys were conducted. The first survey covered 200 participants and found that people are more likely to drive aggressively in an anonymous situation than in a face-to-face situation. The second survey covered 384 participants with a history of aggressive driving and found that these aggressive drivers could be classified into three groups using a two-step cluster analysis. Drivers who often exhibit aggressive driving in anonymous situations were found in the second questionnaire to have a high tendency towards driving anger and towards ambivalence over emotional expressiveness. The tendency towards self-defensive ambivalence factor, one of the factors in the ambivalence over emotional expressiveness questionnaire, was also found to be high. Individuals who tended to drive aggressively in an anonymous situation were found to be susceptible to driving anger, usually faced ambivalence over emotional expressiveness, and typically were indecisive. The results of this study suggest that rather than intensifying the enforcement of traffic regulations, a better remedy for those who drive recklessly would be to have them undertake some candid self-reflection.

  • PDF

A Study on the Trust Mechanism of Online Voting: Based on the Security Technologies and Current Status of Online Voting Systems (온라인투표의 신뢰 메커니즘에 대한 고찰: 온라인투표 보안기술 및 현황 분석을 중심으로)

  • Seonyoung Shim;Sangho Dong
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.47-65
    • /
    • 2023
  • In this paper, we investigate how the online voting system can be a trust-based system from a technical perspective. Under four principles of voting, we finely evaluate the existing belief that offline voting is safer and more reliable than online voting based on procedural processes, technical principles. Many studies have suggested the ideas for implementing online voting system, but they have not attempted to strictly examine the technologies of online voting system from the perspective of voting requirements, and usually verification has been insufficient in terms of practical acceptance. Therefore, this study aims to analyze how the technologies are utilized to meet the demanding requirements of voting based on the technologies proven in the field. In addition to general data encryption, online voting requires more technologies for preventing data manipulation and verifying voting results. Moreover, high degree of confidentiality is required because voting data should not be exposed not only to outsiders but also to managers or the system itself. To this end, the security techniques such as Blind Signature, Bit Delegation and Key Division are used. In the case of blockchain-based voting, Mixnet and Zero-Knowledge Proof are required to ensure anonymity. In this study, the current status of the online voting system is analyzed based on the field system that actually serves. This study will enhance our understanding on online voting security technologies and contribute to build a more trust-based voting mechanism.

Smoking Adolescents' Acquisition of Cigarettes and Status of Proof of Age (흡연을 하는 청소년의 담배 구입 경로 및 신분 확인의 유무)

  • Kim, Hee Ra;Kim, Ji Young;Lee, Gee Hyung;Choung, Ji Tae;Park, Sang Hee
    • Clinical and Experimental Pediatrics
    • /
    • v.48 no.4
    • /
    • pp.363-368
    • /
    • 2005
  • Purpose : The aim of this study is to identify where and how adolescents acquire cigarettes and how many were asked for identification while purchasing cigarettes. Methods : This study was conducted in 2003; participants were 2,200 students in middle and high schools, aged from 13 to 18 years old(males 1,098; females 1,102) in Ansan, Korea. The questionnaire assured them of anonymity, and self-administered in school. The data was analyzed with chisquare test for trends. Results : The prevalence of smoking was about 20 percent among respondents, was higher in males than in females, and in older students than in younger students(P<0.001). The most frequent source of cigarettes was purchased from a store(36.3 percent). About 29.2 percent of the students borrowed from friends or family members. By sex, the main sources of cigarettes were purchase from a store and borrowing. Younger students were borrowed more cigarettes; older students purchased more cigarettes from stores. Only 48.8 percent were asked for proof of age during their purchase. Of those asked for proof of age, about 73.3 percent answered that this made it difficult to buy cigarettes(P<0.001), and they thought that it was more difficult when asked for a photo ID than simply being asked their age(P=0.019). Conclusion : So far, there has been no systemic prevention of adolescents' smoking. It is difficult for minors to purchase cigarettes if asked for proof of age, but most minors go to stores to purchase cigarettes. Therefore, prevention efforts should include educating retailers not to sell cigarettes to minors and enforcing existing laws requiring youth to provide proof of age when attempting to buy cigarettes.

The Influence of Self-discrepancy in Virtual and Cross Worlds on Individuals' Activities in Online Communities (가상세계 및 공간간의 자기차이가 온라인 커뮤니티 활동에 미치는 영향에 관한 연구)

  • Lee, Ju-Min;Shin, Kyung-Shik;Suh, A-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.23-45
    • /
    • 2011
  • People could possess different self-identity under virtual world from physical world because of anonymity of the virtual world and this difference could influence their behavior in the virtual world. Based on self-discrepancy theory, this research proposes that continuous use model in self-expression goal. We defined the difference bet ween actual self~identity and ideal self~identity in the virtual world as "self-discrepancy in virtual world", and the difference between actual self-identity in the physical world and actual self-identity in the virtual world as "cross-world self-discrepancy". Before testing hypothesis, we compare the actual self-identity in the online community with the actual self-identity in the physical world, and with ideal self-identity in the virtual world. We derived an index for two different types of self-identity in terms of Personal Self-identity and Social Self-identity through factor analysis. Our results show that online community members have a higher level of ideal self-identity than actual self-identity in online community, and they have better personal self-identity in online community than physical world while a lower level of social self-identity in online community than physical world. The results of the hypothesis testing analysis based on 300 respondents showed that "self-discrepancy in virtual world" negatively influenced perceived usefulness for self-expression while "cross-world self-discrepancy" positively influenced perceived usefulness for self-expression. The perceived usefulness for self-expression and ease of use positively influence both continuous use and knowledge contribution. Specially, the effect of perceived usefulness for self-expression on knowledge contribution is much bigger than the effect of ease of use. This study extends self-discrepancy theory to virtual worlds by suggesting various types of self-discrepancy and by applying the effect of self-discrepancies in online community. Also, this study extends technology acceptance model in the personal goal in terms of self-expression. This study hopes to offer practical insights by suggesting positive effect of self-discrepancy on behavior in the online community.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Visual Characteristics and The Principal of Formation of ChangSayng-Do in the Late Chosun Dynasty (조선 후기 장생도(長生圖)의 구성원리와 조형적 특성)

  • Kim Jun-Keun
    • Journal of Science of Art and Design
    • /
    • v.8
    • /
    • pp.63-94
    • /
    • 2005
  • ChangSayng-Do in the late Chosun dynasty was a kind of traditional painting which sublimated the philosophy and emotion of everyday life into an aesthetic consciousness through a long history of Korean people . It would represent a human wish and desire to live a long and healthy life, which was implicated by way of Taoism. The major themes of ChangSayng-Do - mountains, the sun, cloud, water, rock, deer, tortoises, cranes, pine trees, bamboos, peaches, and herbs of eternal youth - were all symbols used. to wish for a long-life and immortality in real world. All or some of these items were represented in paintings, which resulted in the various kinds of ChangSayng-Do. The main concern of this thesis will be centered around the naturalistic subjects shown in ChangSayng-Do. This thesis consists of four chapters. The first chapter describes the purpose of and need for the research, and its method and scope. The second chapter deals with the origin and style of ChangSayng-Do, and the background of its formation. It is found out that the formative characteristic of ChangSayng-Do lies in the archetype, the unity of man and nature following the traditional view of nature. It is also found out that ChangSayng-Do implied the notions of Supernatural Being, Yin-Yang and Five Elements, Taoism, and Confucianism as well as Korean shamanism. Third chapter is largely about an analytic investigation into symbolic visualization of ChangSayng-Do. Firstly, the subject matters shown in ChangSayng-Do consist of items of wishful omen for long-life and good luck, and any motif in a picture implies a symbolism of eternal youth and long-life. Secondly, the view of colors shown in ChangSayng-Do is closely connected to Five Elements and Five Direction, a traditional oriental philosophy of universe, and these symbolic colors are based on shamanism and Yin/Yang-Five Elements. According to an iconological analysis, it is confirmed that these viewpoints are consistent with formative principles and expressive methods of ChangSayng-Do to some extent. The fourth chapter is one of the most important elements for visualization of ChangSayng-Do. The symbolic meaning of long life and good luck is the major source of its popularity inside the palace as well as among the people in general. The fact that ChangSayng-Do was used to ornament the palace was documented in $\lceil$UiGuey(documents about Chosun dynasty$\rfloor$. Also during the late period of Chosun dynasty, the appreciators of arts had begun to spread from high level class to lower level class, and many pictures represented in $\lceil$Hanyang-Ga$\rfloor$ were the ones produced and circulated for those increased consumers. As for the folk-artistic characteristics, the anonymity and arbitrary naturalness of ChangSayng-Do demonstrates that the folk-artistic elements were fully soaked into the life styles of people in general. ChangSayng-Do further shows that a human being is located in the center of the universe, and that all the natural phenomena and ecology are observed to happen around human beings, and that the results of those happenings are connected to man's course of life. It is discovered that the subject matters of ChangSayng-Do in the late Chosun dynasty imply another idea inside metaphors and symbols. With regard to the arrangement of time and space, the unity or oneness of oneself with the world is more highly regarded than one's individual subjectivity: there exist multiple times and spaces in a single picture This reveals a wholistic view of oneness which does not permit the division between phenomenon and substance. To conclude, this thesis inquired into ChangSayng-Do in the late Chosun dynasty focusing on the expression of archetype-symbols. And through the analysis and demonstration, this thesis re-established constructional principles and formative characteristics of ChangSayng-Do and then settled a new phase of ChangSayng-Do, with a deep under-standing of fundamental thoughts of Korean people underlying ChangSayng-Do.

  • PDF

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF