• Title/Summary/Keyword: Issue Tracking

Search Result 182, Processing Time 0.026 seconds

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

Evaluation of Performance and Construction the New National Test Road Sites of Modified Asphalt (신설국도의 시험시공을 통한 표층용 개질 아스팔트 공용성 평가)

  • Cho, Gyu-Tae
    • International Journal of Highway Engineering
    • /
    • v.4 no.3 s.13
    • /
    • pp.43-49
    • /
    • 2002
  • Asphalt pavements have to perform under the conditions of heavily-loaded vehicles due to the industrialization and large temperature variance between the summer and the winter. Due to these factors, a characteristics change of early permanent deformation becomes a big issue, and to remedy this problem many research to use modified asphalt are being widely conducted. However, most of the modified asphalt is being paved after milling the surface course and applying tackcoating, and it is being used mostly for the repair and maintenance purpose rather than pavement of new national road. The purpose of this investigation is to obtain some fundamental data for the evaluation of the performance and long-term performance of the construction material mixtures by the laboratory test and field experiments. For the field experiment, 200m of two-lanes national road, that is being paved for the new national road under the direction of Pusan Regional Construction Management Office, was paved with SBS PMA and PSMA asphalt mixtures, which are an modified asphalt mixtures used for the surface course, on top of the base course paved with other modified asphalt mixtures. The remaining section of the new national road was paved with dense grade mixture. The laboratory tests assessed and analyzed the mixture characteristics by Marshall's stability test, strength tests and wheel-tracking test. On the basis of the evaluation result of the temperature control and roughness of the newly constructed road at the field experiment site, it is desired to evaluate and identify the most economic modified asphalt mixtures by long-term performance evaluation and LCC(Life Cycle Cost) analysis in order to apply the test result to the design of new road construction in the future.

  • PDF

Evaluation of Photochemical Reflectance Index (PRI) Response to Soybean Drought stress under Climate Change Conditions (기후변화 조건에서 콩 한발스트레스에 대한 광화학 반사 지수 반응 평가)

  • Sang, Wan-Gyu;Kim, Jun-Hwan;Shin, Pyeong;Baek, Jae-Kyeong;Lee, Yun-Ho;Cho, Jung-Il;Seo, Myung-Chul
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.4
    • /
    • pp.261-268
    • /
    • 2019
  • Climate change and drought stress are having profound impacts on crop growth and development by altering crop physiological processes including photosynthetic activity. But finding a rapid, efficient, and non-destructive method for estimating environmental stress responses in the leaf and canopy is still a difficult issue for remote sensing research. We compared the relationships between photochemical reflectance index(PRI) and various optical and experimental indices on soybean drought stress under climate change conditions. Canopy photosynthesis trait, biomass change, chlorophyll fluorescence(Fv/Fm), stomatal conductance showed significant correlations with midday PRI value across the drought stress period under various climate conditions. In high temperature treatment, PRI were more sensitive to enhanced drought stress, demonstrating the negative effect of the high temperature on the drought stress. But high CO2 concentration alleviated the midday depression of both photosynthesis and PRI. Although air temperature and CO2 concentration could affect PRI interpretation and assessment of canopy radiation use efficiency(RUE), PRI was significantly correlated with canopy RUE both under climate change and drought stress conditions, indicating the applicability of PRI for tracking the drought stress responses in soybean. However, it is necessary to develop an integrated model for stress diagnosis using PRI at canopy level by minimizing the influence of physical and physiological factors on PRI and incorporating the effects of other vegetation indices.

Building a Log Framework for Personalization Based on a Java Open Source (JAVA 오픈소스 기반의 개인화를 지원하는 Log Framework 구축)

  • Sin, Choongsub;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.8
    • /
    • pp.524-530
    • /
    • 2015
  • A log is for text monitoring and perceiving the issues of a system during the development and operation of a program. Based on the log, system developers and operators can trace the cause of an issue. In the development phase, it is relatively simple for a log to be traced while there are only a small number of personnel uses of a system such as developers and testers. However, it is the difficult to trace a log when many people can use the system in the operation phase. In major cases, because a log cannot be tracked, even tracing is dropped. This study proposed a simplified tracing of a log during the system operation. Thus, the purpose is to create a log on the run time based on an ID/IP, using features provided by the Logback. It saves an ID/IP of the tracking user on a DB, and loads the user's ID/IP onto the memory to trace once WAS starts running. Before the online service operates, an Interceptor is executed to decide whether to load a log file, and then it generates the service requested by a certain user in a separate log file. The load is insignificant since the arithmetic operation occurs in a JVM, although every service must pass through the Interceptor to be executed.

The Identified Self: Location-Based Technologies, Surveillance, and Non-place (식별되는 자: 위치기반기술, 원격성과 감시의 문제, 그리고 비-장소(non-place))

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.1-31
    • /
    • 2016
  • This essay examines the recent proliferation of location-based services (LBS) within the context the expansion of the technologies of remote identification, monitoring, and tracking. Following the spatial turn in the social sciences, this essay aims to analyze LBS as a surveillance technology that can re-shape the spatial configuration of its users and their identity. The analytic focus of this essay is on LBS within the global information infrastructure, and it utilizes key LBS examples in the US and South Korea. First, as a way to discuss the technical possibilities of LBS for spatial coordination and surveillance, this essay investigates its technical architecture in terms of information flow. It then discusses the issue of privacy in LBS by analyzing some of its key legal and regulatory issues. The combination of the global information infrastructure with location-related technologies has enabled LBS companies to expand the scope of surveillance over the ever-increasing computer-mediated activities, prompting heated discussions over whether LBS is capturing "Every Moment in Your Life." This essay concludes with a discussion on how location technologies have provided a key platform for the rise of surveillance capitalism through the creation of what Marc $Aug{\acute{e}}$ called a "non-place," a place where the identified self is constituted by LBS.

Changes in the Energy Landscape from Multi-Level Perspective: A Case Study of the Photovoltaic Module Carbon Certification System (다층적 관점에서 바라본 에너지경관의 변동: 태양광 모듈 탄소인증제를 사례로)

  • Jang, Geunyong
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.24 no.4
    • /
    • pp.367-385
    • /
    • 2021
  • This study examined changes in the energy landscape, focusing on the photovoltaic module carbon certification system. As the global photovoltaic market has been reorganized around Chinese companies, the South Korean government has pushed to strengthen the competitiveness of the nation's photovoltaic industry. However, a limitation remains in that the government-led effort was not sufficient to bring about dynamic changes in the energy landscape. Against this backdrop, this study explored the stages leading to the multi-level perspectives of "macro-environment, socio-technical regime, and niche" to track the process of the government and domestic photovoltaic companies as part of a socio-technical regime responding to global market changes. In particular, this study raised an issue with the conceptual discussion of multi-level perspective, which placed a particular emphasis on the rate of change at each level and the niche in which innovative experiments take place, and thus attempted to fill this gap by tracking the energy landscape that varies differently from space. These spatial discussions can track different carbon emissions coefficients and industrial characteristics for each country, and have a higher level of explanatory power for the system thus constructed. In addition, through discussions on the problems and implications of the government-led introduction of renewable energy policies, this study suggests the need to create and implement a field-oriented system.

Individualism and collectivism in ethical decision making (문화성향은 윤리적 의사결정의 과정에 영향을 주는가?)

  • Hong Im Shin
    • Korean Journal of Culture and Social Issue
    • /
    • v.21 no.1
    • /
    • pp.67-96
    • /
    • 2015
  • Do cultural differences affect moral decisions? Two studies were conducted to investigate whether attitudes of individualism vs. collectivism have an impact on ethical decision making. Study 1 (N=92) showed that utilitarianism was preferred in a situation, in which an intervention resulted in the best outcome (i.e., saving more people's lives), while deontology was preferred in a situation, in which the focus was on negative consequences of the intervention (i.e. personal sacrifices). Additionally, there were differences between the idiocentrics and the allocentrics groups regarding morality aspects. In the idiocentrics group, harm and fairness were regarded as more important than other moral aspects, while in the allocentrics group, not only harm and fairness, but also ingroup and authority were perceived as critical moral aspects. In Study 2 (N=30), after lexical decision tasks were conducted for culture priming, the mouse tracking method was used to explore response dynamics of moral decision processes, while judging appropriateness of interventions in moral dilemmas. In Study 2, in a condition, in which the small number of victims were focused upon, there were more maximal deviations and higher Xflips in the individualism priming group than in the collectivism priming group, which showed that the participants in the individualism condition had more deliberative processes before choosing their answers between utilitarianism and deontology. In addition, the participants in the individualism priming condition showed more maximal deviations in the mouse trajectories regarding ingroup related interventions in moral dilemmas than those in the collectivism priming condition. These results implicated the possibilities that the automatic emotional process and the controlled deliberative process in moral decision making might interact with cultural dispositions of the individuals and the focus of situations.

  • PDF

Study on the Application of Casting Flow Simulation with Cut Cell Method by the Casting process (Cut Cell 방법을 활용한 공정별 주조유동해석 적용 연구)

  • Young-Sim Choi
    • Journal of Korea Foundry Society
    • /
    • v.43 no.6
    • /
    • pp.302-309
    • /
    • 2023
  • In general, castings often have complex shapes and significant variations in thickness within a single product, making grid generation for simulations challenging. Casting flows involve multiphase flows, requiring the tracking of the boundary between air and molten metal. Additionally, considerable time is spent calculating pressure fields due to density differences in a numerical analysis. For these reasons, the Cartesian grid system has traditionally been used in mold filling simulations. However, orthogonal grids fail to represent shapes accurately, leading to a momentum loss caused by the stair-like grid patterns on curved and sloped surfaces. This can alter the flow of molten metals and result in incorrect casting process designs. To address this issue, simulations in the Cartesian grid system involve creating a large number of grids to represent shapes more accurately. Alternatively, the Cut Cell method can be applied to address the problems arising from the Cartesian grid system. In this study, analysis results based on the number of grid in the Cartesian grid system for a casting flow analysis were compared with results obtained using the Cut Cell method. Casting flow simulations of actual products during various casting processes were also conducted, and these results were analyzed with and without applying the Cut Cell method.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF