• Title/Summary/Keyword: Fake Information

Search Result 213, Processing Time 0.024 seconds

An exploratory study on the Press Arbitration Act, freedom of expression, and regulation of false and manipulated information (언론중재법과 표현의 자유 그리고 허위·조작 정보의 규제에 대한 탐색적 연구)

  • Kim, Jea-young
    • Journal of Arbitration Studies
    • /
    • v.31 no.4
    • /
    • pp.71-97
    • /
    • 2021
  • The meaning of the amendment to the Media Arbitration Act in our society is not limited to media companies. And it's not just a problem for a specific group. It expresses public value because it is an issue that can affect members of society as a whole and furthermore, it becomes a bill that can infringe or strengthen individual freedom guaranteed by the Constitution, but makes different arguments. Freedom of speech is not achieved in a day and should not be easily lost by someone. Although it is not a frequent problem, fatal threats arising from wrong media reports take away an individual's present and future. It is because of this problem that the responsibility is important. Freedom of speech and control are heading in different directions, but they are the same as the front and back of the coin. The freedom pursued is different, but it consists of one body. If freedom and responsibility of speech made up of one body criticize or ignore each other, the results are scattered into a distorted On the other hand, the flexion of responsibility without freedom serves as a speaker that conveys the ideology of some classes or represents the interests of a particular group. The fact that the media should act as the air of society means that it should represent the interests of the majority, make them aware of the rights of unfair or marginalized members, and be their strength.

Some Academic Debates in the Geological Society of Korea (한국의 지질학분야에서 있었던 학술논쟁)

  • Seong-Young Yang
    • Journal of the Korean earth science society
    • /
    • v.44 no.6
    • /
    • pp.533-539
    • /
    • 2023
  • This article reviews a few academic discussions in our geological society. The author presents his opinion on the discussions regarding the ages of the Okcheon Group, Myogog Formation, and hominid footprints of the Jeju Island, as well as on the inaccurate reportage in mass media. The academia advances via healthy debates and discussions. The arguments for and against Darwin's "Origin of Species" and scientific debates regarding Wegener's "Continental Drift Hypothesis" are well known. In academic debates or discussions, authority should not be involved in any form. Academic research should be conducted based on scientific principles and evidence-free of personal preferences or other nonacademic factors. Opponents should challenge with scientific approaches, suggesting alternatives based on science. Opposition without scientific basis is not productive in conducting academic research in search of scientific truth. Often, the news media delivers inaccurate information to the public-intentionally or unintentionally. There must be a mechanism to immediately identify and rectify inaccurate, false, or fake information for the benefit of the public and the credibility of the news media.

Training of Accounting Professionals Following the Introduction of Block Chain Technology (블록체인 기술 다식부기 시스템 도입에 따른 회계전문인 육성 방안)

  • Yang, Haejin;Bae, Kheesu
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.4
    • /
    • pp.41-50
    • /
    • 2019
  • Block chain technology revolutionizes the 'double entry bookkeeping' of accounting principles in 600 years. It will be an opportunity for you to become one. The advent of the block chain will revolutionize the accounting world. It is no exaggeration to say that it is a skill. The use of block chains for accounting leads to the occurrence of transactions. It's easy to identify a transaction, and it's easy to fake or tamper with it. The accounting industry because it is difficult to communicate transparent accounting information to stake holders. Transformations will be possible across the board (Carlozo, 2017). An entity shall provide financial information that is useful to interested parties in making reasonable economic decisions. Transactions arising from business activities are recorded and provided in the books. Interested parties are here. We need to make decisions to protect our interests and make those decisions rationally. To make a decision, we know how the outcome of the decision will affect our self-interest. Because it has to do so, it uses corporate information for this purpose. But the investor is one way of doing business. It is difficult to trust the information provided by (Yermack, 2017). As a result, ICO companies, startups, small businesses lose a lot of business opportunities because they don't have investors. In addition, the management mixes cash flows with accounting interests to indicate changes in cash flows. It experiences failure in its business due to its inability to analyze and predict faithfully. But it's a blockhead in accounting. Applying the factors and recording them in the book will result in a number of benefits for different stake holders. It can be provided. The financial information in the block chain is not subject to further review or verification. It can improve the timeliness and increase reliability of financial information because it cannot be forged or tampered with (Delloitte, 2016). Based on the fourth industrial revolution, the pace of change in all sectors of society has never been faster. Based on block chain technology, decision-making structure is based on vertical structure of the past. Transforming into a horizontal structure collapses existing tools and advances transparency and decentralization a change of Copernican interpersonal awareness with the trend of the times, which is becoming angry with modern people.

Parametric and Non Parametric Measures for Text Similarity (텍스트 유사성을 위한 파라미터 및 비 파라미터 측정)

  • Mlyahilu, John;Kim, Jong-Nam
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.193-198
    • /
    • 2019
  • The wide spread of genuine and fake information on internet has lead to various studies on text analysis. Copying and pasting others' work without acknowledgement, research results manipulation without proof has been trending for a while in the era of data science. Various tools have been developed to reduce, combat and possibly eradicate plagiarism in various research fields. Text similarity measurements can be manually done by using both parametric and non parametric methods of which this study implements cosine similarity and Pearson correlation as parametric while Spearman correlation as non parametric. Cosine similarity and Pearson correlation metrics have achieved highest coefficients of similarity while Spearman shown low similarity coefficients. We recommend the use of non parametric methods in measuring text similarity due to their non normality assumption as opposed to the parametric methods which relies on normality assumptions and biasness.

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

Real Time Moving Object Detection Based on Frame Difference and Doppler Effects in HSV color model (HSV 컬러 모델에서의 도플러 효과와 영상 차분 기반의 실시간 움직임 물체 검출)

  • Sanjeewa, Nuwan;Kim, Won-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.77-81
    • /
    • 2014
  • This paper propose a method to detect moving object and locating in real time from video sequence. first the proposed method extract moving object by differencing two consecutive frames from the video sequence. If the interval between captured two frames is long, it cause to generate fake moving object as tail of the real moving object. secondly this paper proposed method to overcome this problem by using doppler effects and HSV color model. finally the object segmentation and locating is done by combining the result that obtained from steps above. The proposed method has 99.2% of detection rate in practical and also this method is comparatively speed than other similar methods those proposed in past. Since the complexity of the algorithm is directly affects to the speed of the system, the proposed method can be used as low complexity algorithm for real time moving object detection.

Exercise Detection Method by Using Heart Rate and Activity Intensity in Wrist-Worn Device (손목형 웨어러블 디바이스에서 사람의 심박변화와 활동강도를 이용한 운동 검출 방법)

  • Sung, Ji Hoon;Choi, Sun Tak;Lee, Joo Young;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.4
    • /
    • pp.93-102
    • /
    • 2019
  • As interest in wellness grows, There is a lot of research about monitoring individual health using wearable devices. Accordingly, a variety of methods have been studied to distinguish exercise from daily activities using wearable devices. Most of these existing studies are machine learning methods. However, there are problems with over-fitting on individual person's learning, data discontinuously recognition by independent segmenting and fake activity. This paper suggests a detection method for exercise activity based on the physiological response principle of heart rate up and down during exercise. This proposed method calculates activity intensity and heart rate from triaxial and photoplethysmography sensor to determine a heart rate recovery, then detects exercise by estimating activity intensity or detecting a heart rate rising state. Experimental results show that our proposed algorithm has 98.64% of averaged accuracy, 98.05% of averaged precision and 98.62% of averaged recall.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

A Study on Vehicle License Plate Recognition System through Fake License Plate Generator in YOLOv5 (YOLOv5에서 가상 번호판 생성을 통한 차량 번호판 인식 시스템에 관한 연구)

  • Ha, Sang-Hyun;Jeong, Seok Chan;Jeon, Young-Joon;Jang, Mun-Seok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.699-706
    • /
    • 2021
  • Existing license plate recognition system is used as an optical character recognition method, but a method of using deep learning has been proposed in recent studies because it has problems with image quality and Korean misrecognition. This requires a lot of data collection, but the collection of license plates is not easy to collect due to the problem of the Personal Information Protection Act, and labeling work to designate the location of individual license plates is required, but it also requires a lot of time. Therefore, in this paper, to solve this problem, five types of license plates were created using a virtual Korean license plate generation program according to the notice of the Ministry of Land, Infrastructure and Transport. And the generated license plate is synthesized in the license plate part of collectable vehicle images to construct 10,147 learning data to be used in deep learning. The learning data classifies license plates, Korean, and numbers into individual classes and learn using YOLOv5. Since the proposed method recognizes letters and numbers individually, if the font does not change, it can be recognized even if the license plate standard changes or the number of characters increases. As a result of the experiment, an accuracy of 96.82% was obtained, and it can be applied not only to the learned license plate but also to new types of license plates such as new license plates and eco-friendly license plates.

Hybrid phishing site detection system with GRU-based shortened URL determination technique (GRU 기반 단축 URL 판별 기법을 적용한 하이브리드 피싱 사이트 탐지 시스템)

  • Hae-Soo Kim;Mi-Hui Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.213-219
    • /
    • 2023
  • According to statistics from the National Police Agency, smishing crimes using texts or messengers have increased dramatically since COVID-19. In addition, most of the cases of impersonation of public institutions reported to agency were related to vaccination and reward, and many methods were used to trick people into clicking on fake URLs (Uniform Resource Locators). When detecting them, URL-based detection methods cannot detect them properly if the information of the URL is hidden, and content-based detection methods are slow and use a lot of resources. In this paper, we propose a system for URL-based detection using transformer for regular URLs and content-based detection using XGBoost for shortened URLs through the process of determining shortened URLs using GRU(Gated Recurrent Units). The F1-Score of the proposed detection system was 94.86, and its average processing time was 5.4 seconds.