• Title/Summary/Keyword: Information Secret

Search Result 864, Processing Time 0.022 seconds

A Study on Satisfaction on Use of VR Tourism Program (VR관광콘텐츠의 이용만족에 대한 연구)

  • Yang, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.184-193
    • /
    • 2019
  • With the development of the information and communication technology, tourism items or products based on new technology is created or developed for tourists. This study examines tourist's satisfaction about VR program, "Secret Wind Forest", which is the story of Gotjawal, one of famous Jeju eco-tourism attraction. In order to achieve the study goal, it identified a study model from the previous studies. It collected data using survey from visitors who used VR program. The total of 227 questionnaires was utilized for data analysis. Based on the study model, it accepted five hypotheses (H1~H5), which are as follows. Firstly, individual innovativeness has a significant effect on perceived usefulness. Secondly, individual innovativeness influenced perceived usefulness, and perceived usefulness and ease influenced usage satisfaction. These results have both theoretical and practical contribution in terms of the development to tourist products using VR program. Academics can provide basic theories such as tourism activities, behaviors, and attitudes to tourism consumer-related studies on VR tourism program in terms of content application. Practically, it can help tourist marketers who want to use VR tourism program and content developers who use VR devices to construct VR program stories using tourism resources and to plan and execute contents considering the target market.

Study on the Legal Protection of Sports Organizer's Profit and Introduction of Intellectual Property Right (경기주최자의 재산적 이익의 법적 보호방안과 지식재산권 도입론)

  • Lee, Sung-Un
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.345-382
    • /
    • 2018
  • Sports events are not copyrighted and sports organizer's profit from sports events is not subject to intellectual property law in our legislation. Most other countries, except for France, do not also recognize sports organizer's profit as an intellectual property right. For this reason, legal grounds protecting sports organizer's profit must be found from current law such as tort law or Unfair Competition and Trade Secret Protection Act. It is irrefutable that these laws play a significant role in protecting sports organizer's profit by imposing restrictions on taking unfair advantage of others' efforts or investment. Nevertheless, protecting sports organizer's profit through such laws has its limits because sports events and relevant information outside the protection category of intellectual property law are considered as public domain. Therefore, introduction of sports organizer's intellectual property right through legislation will serve to faithfully protect sports organizer's profit. Even countries where spectator sports industry is fully in force actively discuss the issue of introducing sports organizer's intellectual property right. Intellectual property law, like other laws, is keenly subject to international trends due to market globalization and sensitively responds to the trends. I believe that further discussions are highly required about the introduction of sports organizer's intellectual property right that properly reflects international trends.

Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher SPARKLE SCHWAEMM (경량암호 SPARKLE SCHWAEMM에 대한 Grover 공격 비용 분석 및 양자 후 보안 강도 평가)

  • Yang, Yu Jin;Jang, Kyung Bae;Kim, Hyun Ji;Song, Gyung Ju;Lim, Se Jin;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.453-460
    • /
    • 2022
  • As high-performance quantum computers are expected to be developed, studies are being actively conducted to build a post-quantum security system that is safe from potential quantum computer attacks. When the Grover's algorithm, a representative quantum algorithm, is used to search for a secret key in a symmetric key cryptography, there may be a safety problem in that the security strength of the cipher is reduced to the square root. NIST presents the post-quantum security strength estimated based on the cost of the Grover's algorithm required for an attack of the cryptographic algorithm as a post-quantum security requirement for symmetric key cryptography. The estimated cost of Grover's algorithm for the attack of symmetric key cryptography is determined by the quantum circuit complexity of the corresponding encryption algorithm. In this paper, the quantum circuit of the SCHWAEMM algorithm, AEAD family of SPARKLE, which was a finalist in NIST's lightweight cryptography competition, is efficiently implemented, and the quantum cost to apply the Grover's algorithm is analyzed. At this time, the cost according to the CDKM ripple-carry adder and the unbounded Fan-Out adder is compared together. Finally, we evaluate the post-quantum security strength of the lightweight cryptography SPARKLE SCHWAEMM algorithm based on the analyzed cost and NIST's post-quantum security requirements. A quantum programming tool, ProjectQ, is used to implement the quantum circuit and analyze its cost.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF