• Title/Summary/Keyword: Fake Information

Search Result 213, Processing Time 0.025 seconds

Effect of Characteristics and Texture of Sight and Touch on the Tactile Preferences for the Black Fabrics (블랙 패션 소재의 특성과 시촉각적 질감이 촉감 선호도에 미치는 영향)

  • Kim, Yeo-Won;Choi, Jong-Myoung
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.3
    • /
    • pp.556-564
    • /
    • 2011
  • The purpose of this study was to analyze the effect of the structural properties, the color characteristics and the texture of sight and touch on the tactile preferences for the black fabrics. Male and female university students were asked to evaluate the texture of sight and touch and tactile preference to the nine different black fabrics which were selected on the basis of the previous research results. Data were analyzed by using frequency analysis, mean, factor analysis, t-test, F-test, correlation and regression analysis. The texture of sight and touch for black fabrics was classified into four factors: smoothness, bulkiness, extensibility, firmness. This texture of sight and touch factors showed a significant correlative relationship to the structural properties and color characteristics of the black fabrics. There were significant differences according to black fabrics on the point of texture of sight and touch. The velvet was evaluated the most smooth fabric, while the velvet and fake leather were evaluated the most bulky fabrics. Also, the jersey and lace fabrics were evaluated the most extensible fabrics, while the melton was evaluated as the most firm fabrics. There were significant correlative relationships not only between the structural properties and the texture of sight and touch but also between the color characteristics and the texture for black fabrics. Also, among the structural properties, the color characteristics and the texture of sight and touch of black fabrics, major variable factor of influencing on the tactile preference was turned out to be the texture of sight and touch.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

A Case Study of Using PBL

  • Park, Hae Rang
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.100-105
    • /
    • 2021
  • This study examines the effectiveness of the study through a case of PBL(problem-based-learning) class conducted in a balanced culture course called at 00- University in the second semester of 2020. The effects of learning are as follows: First, PBL(problem-based-learning) has sufficient active interaction between the teacher and the learner. In the face of prolonged non-face-to-face learning, the PBL teaching method has sufficient interaction between the professors-learner and the learner. Second, PBL learning can actively utilize various problems that fit the characteristics of the subject and actively utilize the process of role sharing and collaboration. By presenting various problem situations suitable for the subject, students will be able to share roles individually or as a team, and fully experience the process of collaboration and discussion in the process of investigating the data. Third, critical perceptions of problem situations can be extended. In modern times, a variety of problem situations arise and critical perceptions of them must be fully learned. In a mass production and mass consumption society, students should develop the ability to blindly recognize and distinguish between real and fake information in a flood of information. The limitations identified in this class case are, first, the nature of the subject, "Understanding Culture and Philosophy," which makes it possible to discuss the global cultural phenomenon, but it should be discussed in terms of philosophy. Second, it is not easy to work as a team on non-face-to-face online. Nevertheless, PBL is a very effective method of learning in which active interactions and learning activities take place between professors and students, whether face-to-face or face-to-face online learning.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

Delphi Research on the Terms and Components of Proper Youtube Use (올바른 유튜브 사용 용어 및 구성 요소에 대한 델파이 연구)

  • Jang, Sung-Ho;Oh, Seong-Eun;Shin, Jung-Mi;Shin, Sung-Man
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.53-60
    • /
    • 2021
  • The purpose of this study is to examine the terms and components related to the proper use of YouTube. The Delphi was conducted on 11 panels and the results are as follows. First, as a result of examining how the use of YouTube will change in the future, it is agreed that it will be used more actively and more diverse than now, but that maladaptive problems such as fake news and addictive use will occur. Second, the terminology of proper/improper use of Youtube was derived as 'adaptive use' and 'maladaptive use'. Third, as a result of the components of adaptive use of YouTube, it is that were 'Information and content sorting ability', 'Self-regulation ability', 'Information acquisition and delivery ability', 'Understanding motivation and desire to use', 'Time-of-use control ability', 'Consideration of ripple effect'. Finally, the implications and limitations of this study were discussed.

How Does the Media Deal with Artificial Intelligence?: Analyzing Articles in Korea and the US through Big Data Analysis (언론은 인공지능(AI)을 어떻게 다루는가?: 뉴스 빅데이터를 통한 한국과 미국의 보도 경향 분석)

  • Park, Jong Hwa;Kim, Min Sung;Kim, Jung Hwan
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.175-195
    • /
    • 2022
  • Purpose The purpose of this study is to examine news articles and analyze trends and key agendas related to artificial intelligence(AI). In particular, this study tried to compare the reporting behaviors of Korea and the United States, which is considered to be a leader in the field of AI. Design/methodology/approach This study analyzed news articles using a big data method. Specifically, main agendas of the two countries were derived and compared through the keyword frequency analysis, topic modeling, and language network analysis. Findings As a result of the keyword analysis, the introduction of AI and related services were reported importantly in Korea. In the US, the war of hegemony led by giant IT companies were widely covered in the media. The main topics in Korean media were 'Strategy in the 4th Industrial Revolution Era', 'Building a Digital Platform', 'Cultivating Future human resources', 'Building AI applications', 'Introduction of Chatbot Services', 'Launching AI Speaker', and 'Alphago Match'. The main topics of US media coverage were 'The Bright and Dark Sides of Future Technology', 'The War of Technology Hegemony', 'The Future of Mobility', 'AI and Daily Life', 'Social Media and Fake News', and 'The Emergence of Robots and the Future of Jobs'. The keywords with high centrality in Korea were 'release', 'service', 'base', 'robot', 'era', and 'Baduk or Go'. In the US, they were 'Google', 'Amazon', 'Facebook', 'China', 'Car', and 'Robot'.