• Title/Summary/Keyword: Information Protection Recognition

Search Result 122, Processing Time 0.022 seconds

Analysis of Environmental Consciousness and Protection Behavior to Establish Protected Area Management - Focused on Hebei Spirit Oil Spill - (보호지역 관리정책 수립을 위한 국민 환경의식 및 실천 행동수준 분석 - 허베이 스피리트호 유류유출사고를 중심으로 -)

  • Sim, Kyu-Won
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.2
    • /
    • pp.259-265
    • /
    • 2012
  • The purpose of this study intends to suggest a basic information to establish protected area policy by analyzing environmental consciousness and environmental protection behavior of citizen after Hebei Spirit oil spill. During May-June of 2011, a total of 987 respondents completed at 5 major cities (Seoul, Busan, Daegu, Daejeon, Gwangju) in Korea. The result showed that more previous experience of environment as recognition of oil spill damaged area, volunteer activity experience, participation in the organization for environmental conservation, and participation in education program led to more positive attitude to environment. Therefore, the result of this study will contribute to manage protected area in balancing ecological conservation and utilization.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

A Study on Policy Strategies for Settlement of North Korean Defectors in Korean Society

  • Cho, Woo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.117-122
    • /
    • 2018
  • This study aims to search for policy strategies for settlement of North Korean defectors in Korean society, develop strategies based on the results and present their implications. For the purposes, this study set up a cause and effect model referring to previous bibliographical and statistical data. The results are presented as follows: First, to overcome anxiety of exposure in the defectors, personal information should be protected. Second, their psychological problems should be solved and they should be emotionally stable for better adaptation to Korean society. Third, keeping in mind that North Korean defectors are Korean people, the issue of nationality should be institutionally managed. Fourth, as one of difficulties they have is economic problems, practical support measures should be developed to solve them. Fifth, the federal government and local governments should be active in changing their recognition on them and provide the Korean community education for citizens to resolve cultural differences.

Design and Implementation of the DRM Supporting Smart Multimedia Streaming in Ubi-Home (Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 DRM 설계 및 구현)

  • Park Jong-Hyuk;Lee Sang-Jin;Hong In-Hwa;Ahn Tae-Won;Lee Deok-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.293-301
    • /
    • 2006
  • In this paper, we design and implement the UHSNS-DRM(Ubi-Home Smart Multimedia Streaming-Digital Right Management) in Ubi-Home. The proposed system support flexible distribution platform for digital content copyright protection and management in Ubi-Home. This system also can provide multimedia streaming service to authorized users who are using PC, STB, PDA, and Portable Device, etc. Furthermore, we adopt concept of domain authentication and it help to improve the efficiency of license management for all devices in Ubi-Home. We design user's location recognition algorithm in order to provide intelligent services. Of course, this algorithm is applied for the proposed system. Start after striking space key 2 times.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

A Study on the Investigation of the Awareness for the Privacy of the Users at the School Libraries (학교도서관 이용자의 프라이버시에 대한 인식조사연구)

  • Sim, Jae-yun;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.31-63
    • /
    • 2015
  • This research was based on the investigation of the awarenesses of librarians of issues regarding the privacy of the users of school libraries. It sought to determine if, by raising the issue of the importance of the need for the protection of the personal information of the users of the school libraries, and the implications of not paying attention to the rules in effect, the awareness regarding the privacy of the users of school libraries would be improved. For this, previous research related to the privacy of the students, the legal basis for the protection of the privacy of the domestic and foreign students, and the types of the infringements upon the protection of their personal information were investigated. A survey was conducted to measure the awareness of issues related to the privacy of the users of the library. The research showed the results as follows: First, the awarenesses regarding the privacy of the users of the school libraries appeared low, and low recognition was also found regarding the awareness of the cases of the infringements upon the privacy of the users of the school libraries; regarding the awareness in relation to the protection of privacy; regarding the seriousness of the privacy problems of the users; and regarding the factors that can encroach upon the privacy of the users. Second, regarding the seriousness felt when the library records of the users of the school libraries are leaked to the outside, 41.6% of the respondents responded by saying "It is serious", and 18.4% responded by saying "It is not serious". Third, as a result of investigating the awareness regarding whether the consent of the person concerned is needed in case a third party requests access to reading the records in the library, 68.5% of the respondent responded "It is needed", and only 10.4% responded "It is not needed". Last, in the investigation into whether the respondents had the experience of being educated as to the rules related to the privacy of the users at a school or an external organization, over 80% of the respondents answered that they did not receive it.

Knowledge and Attitude about Radiation Safety Management in Dental Hygiene Students (치위생과 학생의 방사선 안전관리에 대한 지식과 태도)

  • Ju, Jongwook;Mun, Wonsuk
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.6 no.3
    • /
    • pp.73-81
    • /
    • 2018
  • Purpose : This study identified knowledge, attitudes and behavior for radiation safety management of dental hygiene student. And to provide basic data for the development of effective education program for safety management for radiation protection. Methods : A questionnaire survey of questionnaires was conducted on the second and third grade dental hygiene students at three - year college in 'A' area of Gyeongnam province. The questionnaire of 37 items was used to investigate knowledge and attitude about radiation protection. The collected data were analyzed using frequency analysis, mean, standard deviation, t-test, ANOVA and pearson's correlation Analysis using the SPSS 21.0 program. Result : Results obtained from this study are as follows. 1. Knowledge level of radiation safety management by general characteristics showed statistically significant difference. 2. Radiation safety education knowledge score was higher in the case of radiation safety education(t=1.660, p<.05). 3. The radiation safety management attitude score was a statistically significant difference between the groups according to 'achievement' (F=1.660, p<.001). In the case of 'radiation protection facilities', there was a statistically significant difference between groups according to the recognition of radiation protection facilities (F=6.001, p<.001). 4. As a result of investigating the relationship between radiation safety management knowledge and attitude, the higher the knowledge level of radiation safety management, the higher the attitude(p<.001). Conclusion : Therefore, radiation safety management education should be organized systematically and it is required to improve not only safety management knowledge, attitude level but also action level.

The Improvement of the LIDAR System of the School Zone Applying Artificial Intelligence (인공지능을 적용한 스쿨존의 LIDAR 시스템 개선 연구)

  • Park, Moon-Soo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1248-1254
    • /
    • 2022
  • Efforts are being made to prevent traffic accidents in the school zone in advance. However, traffic accidents in school zones continue to occur. If the driver can know the situation information in the child protection area in advance, accidents can be reduced. In this paper, we design a camera that eliminates blind spots in school zones and a number recognition camera system that can collect pre-traffic information. It is designed by improving the LIDAR system that recognizes vehicle speed and pedestrians. It collects and processes pedestrian and vehicle image information recognized by cameras and LIDAR, and applies artificial intelligence time series analysis and artificial intelligence algorithms. The artificial intelligence traffic accident prevention system learned by deep learning proposed in this paper provides a forced push service that delivers school zone information to the driver to the mobile device in the vehicle before entering the school zone. In addition, school zone traffic information is provided as an alarm on the LED signboard.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.