• Title/Summary/Keyword: Anonymous

Search Result 434, Processing Time 0.029 seconds

Changes in Self-evaluated Health States after the Participation to the AA Program (익명의 알콜중독자(AA) 모임 참여가 주관적 건강상태에 끼친 영향)

  • 김한중;신인순
    • Health Policy and Management
    • /
    • v.10 no.3
    • /
    • pp.88-107
    • /
    • 2000
  • The Alcoholics Anonymous(AA) program has been known to be effective in many countries in helping alcoholics to stop drinking and to change their attitudes, beliefs, and behaviors. In this study, we examined AA activities among Korean AA members and measured the self-evaluated physical, social, and mental changes following the entry into the AA program. Out of identified 300 AA members who were attending 18 different AA group meetings at the time of the survey, 207 completed the self-administered questionnaire(response rate of 69.0%). T-test and ANOVA were used to compare the scores of physica(4-items), social(4-items), and menta(10-items) changes according to the level of AA activities. The proportion of the respondents who practiced the 11th step (meditation) or the 12th step (take alcoholics to a meeting after carrying messages) on the regular basis was 66.6% and 37.2%, respectively. The average time spent in meditation per week was $4.8{\pm}5.47$ hours. The length of participation in AA meetings has significantly positive impact on the average score of changes in all the 3 health states; physical(p<.01), social(p<.05), and mental states(p<.01). Also, practicing the 11th step was significantly associated with improvement of social(p<.01) and mental(p<.05), while practicing the 12th step improved only mental states(p<.01). Our findings demonstrated that not only the length of participation in AA meetings but also the practice of regular meditation(11th step) and taking alcoholics to an AA meeting after carrying messages(12th step) are very important for AA members, and lead to great positive changes in physical, social, and mental states following entry into the AA program.

  • PDF

A study of customer's emotional change by the ways of presenting pictures of clothing at online shops (온라인 쇼핑몰에서 상품 표현방식에 따른 감성변화에 관한 연구)

  • Park, Seong-Jong;Seok, Hyeon-Jeong
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2008.10a
    • /
    • pp.74-77
    • /
    • 2008
  • Online shoppers are not able to try clothing on. Therefore, the pictures of clothing on the website play a significant role when shoppers make decision on their purchase. There are generally three different ways to show clothing at online shops. The first one is showing only clothing images, and the second one is showing the pictures that have actual fitting models wearing clothing on (In this case, Model's face is mostly not shown in the picture.), and the third is showing the pictures of professional fitting models who wear goods. The shopping malls adopt each of the different ways but little is known about affect on purchasing from these three ways. The aim of this study is to figure out how the online shopper's emotional status is affected by these three ways of presenting pictures of clothing. At first, we developed a set of adjective words of human emotion to set up the evaluation criteria for user's emotional status. Those adjectives are originally from the precedent research on human emotion. To cut 99 adjectives down to a proper number for the criteria, we conducted a preliminary survey, and finally, 5 adjectives are selected as appropriate criteria for evaluating users' emotional status while they are shopping. Those five adjectives are 'possess','sensual', 'unique', 'tasteful', and 'stylish'. Then, we conducted the main survey showing 10 kinds of cloth (each cloth was consist of 3 ways). And in the page of model images, we measured the model's preference for understanding the relation with customer's emotion criteria of the product. As a result of the test there was statistically significant difference between product only images and anonymous images, but there was no significant difference between anonymous images and model images. And the preference of the model and value of the emotion criteria have large correlation except 'unique' criteria. It is expected that the result in this study will help to build new marketing strategy which satisfy customers' emotion.

  • PDF

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

An Improved Anonymous Authentication Scheme for Remote Health Monitoring System (원격 건강정보 모니터링 시스템을 위한 개선된 익명인증 기법)

  • Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1551-1560
    • /
    • 2016
  • With the advancement of wearable devices and wireless body are networks, smart healthcare systems based on such technologies have been emerging to effectively monitor patient health and disease progression. In order to implement viable smart healthcare systems, the security and privacy of patient's personal health information must be considered. Yang et al. proposed a privacy-preserving authentication scheme using key-insulation technique for remote health monitoring system, however, key-insulation technique is not properly adapted to their scheme which in turn causes a security pitfall contrary to their assertions. Besides, Yang et al.'s scheme does not guarantee user anonymity against healthcare service provider. Therefore, in this paper, we discuss the security concerns for Yang et al.'s scheme and present an improved anonymous authentication scheme.

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network (익명네트워크를 이용한 사이버공격에 대한 대응방안 연구)

  • Lee, Jung-Hyun;Ahn, Kwan-Joon;Park, Won-Hyung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2011
  • Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.

The Study on improve method of GNUnet for structured P2P Model of encording block (제안 인코딩 블록을 구조적 P2P 모델에 적용한 GNUnet 성능 개선방안)

  • Lee, Myoung-Hoon;Park, Byung-Yeon;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.75-81
    • /
    • 2005
  • The GNUnet in P2P system have solved an anonymous(publisher, storer, demander); a service of condition equal for peer. The GNUnet for an anonymous has separated a file and dispersed to the network. But, the 1Kbyte block size of the GNUnet is a creation of many additional block. I and R block has created with indirect point of D block The waste of I and R block appeared to 4% of the original file and the additional network traffic for the block transmission. To resolve the problems, this paper proposes an new scheme of file splitting distribution using P2P networks with the new GNUnet protocol, The GNUnet support minimization of the additional block and for a network traffic. It proposed an efficiency improvement of encording block and routing algorithm.

  • PDF

A Secure Protocol for Location-Aware Services in VANETs (VANET에서 안전한 위치인지 서비스를 위한 보안 프로토콜)

  • Sur, Chul;Park, Youngho;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.495-502
    • /
    • 2013
  • In this paper, we present an anonymous authentication and location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In other to achieve our goal, we propose the notion of a location-aware signing key so as to strongly bind geographic location information to cryptographic function while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides an efficient procedure based on hash chain technique for revocation checking to effectively alleviate communication and computational costs on vehicles in VANETs. Finally, we demonstrate comprehensive analysis to confirm the fulfillment of the security objectives, and the efficiency and effectiveness of the proposed protocol.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Employee's Discontent Text Analysis on Anonymous Company Review Web and Suggestions for Discontent Resolve (기업 리뷰 웹 사이트 텍스트 분석을 통한 직원 불만 표현 추출과 불만 원인 도출 및 해소 방안)

  • Baek, HyeYeon;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.357-364
    • /
    • 2019
  • As industrial information disclosure by insider's rate is around 80%, most of relevant researches explain briefly its causes are discontent of salary or human resources system. This paper scrapes texts on Jobplanet, an anonymous company review website and analyzes discontent keyword by 7 related area and their contexts to find out more details on brief causes referred above. After drawing LGG (Local Grammar Graph) by each areas with related dictionary list, this paper shows an example of concordance as a proof and several ways for human resources leakage prevention. Finally, text analysis results are compared with previous researches based on survey with limited questions and answers. This study is meaningful to expand the scope of employee discontent analysis with company review text and provide more specific, granular and honest discontent vocabularies.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.