• Title/Summary/Keyword: Korea society

Search Result 346,167, Processing Time 0.296 seconds

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on the Acceptance Factors of the Capital Market Sentiment Index (자본시장 심리지수의 수용요인에 관한 연구)

  • Kim, Suk-Hwan;Kang, Hyoung-Goo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.1-36
    • /
    • 2020
  • This study is to reveal the acceptance factors of the Market Sentiment Index (MSI) created by reflecting the investor sentiment extracted by processing unstructured big data. The research model was established by exploring exogenous variables based on the rational behavior theory and applying the Technology Acceptance Model (TAM). The acceptance of MSI provided to investors in the stock market was found to be influenced by the exogenous variables presented in this study. The results of causal analysis are as follows. First, self-efficacy, investment opportunities, Innovativeness, and perceived cost significantly affect perceived ease of use. Second, Diversity of services and perceived benefits have a statistically significant impact on perceived usefulness. Third, Perceived ease of use and perceived usefulness have a statistically significant effect on attitude to use. Fourth, Attitude to use statistically significantly influences the intention to use, and the investment opportunities as an independent variable affects the intention to use. Fifth, the intention to use statistically significantly affects the final dependent variable, the intention to use continuously. The mediating effect between the independent and dependent variables of the research model is as follows. First, The indirect effect on the causal route from diversity of services to continuous use intention was 0.1491, which was statistically significant at the significance level of 1%. Second, The indirect effect on the causal route from perceived benefit to continuous use intention was 0.1281, which was statistically significant at the significance level of 1%. The results of the multi-group analysis are as follows. First, for groups with and without stock investment experience, multi-group analysis was not possible because the measurement uniformity between the two groups was not secured. Second, the analysis result of the difference in the effect of independent variables of male and female groups on the intention to use continuously, where measurement uniformity was secured between the two groups, In the causal route from usage attitude to usage intention, women are higher than men. And in the causal route from use intention to continuous use intention, males were very high and showed statistically significant difference at significance level 5%.

A Study on the Roles and Ideological Development of Welfare Characteristics in Parks (공원복지 역할 및 이념 전개 양상에 관한 연구)

  • Han, So-Young;Cho, Han-Sol;Zoh, Kyung-Jin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.1
    • /
    • pp.69-81
    • /
    • 2015
  • Under the premise that parks have been a performing field of welfare ideology that benefits the citizen from the past, the present study began with a basic question on what substance a park has and how it has worked. Therefore, this study tried to find out the theoretic background that can explain the roles of a park as an instrument for welfare, of which topic is currently being discussed, and examine how the ideology in the debate regarding welfare characteristics of parks are differentiated from those of social welfare. In addition, this study divided the process of development of parks defined by Galen Cranz in an attempt to view how welfare benefits offered by parks have changed in their development and looked into the roles and types of welfare functions that parks provided to the citizens under a certain social situation by period. Furthermore, the characteristics and development of the ideology underlying a welfare park were examined by function and element in its progression. The results of this study are as follows. The functions that parks have performed so far can be classified into three categories. First, they have a remedial function. Parks have given direct services to 'the socially disadvantaged' such as relief, fostering, and rehabilitation. Second, parks have played a preventive function. They aim to reinforce the functions of individual, family, group, and community. Third, they have exerted a developmental function. They function to promote change of society in a way for it to contribute to social development. Looking into the roles and functions of parks from the perspective of their beneficiary class and benefits, the following were discovered. First, the beneficiaries of welfare characteristics in parks have expanded to the general public from the poor class, and the benefits of parks have spread into the public including the underprivileged in a real sense. Second, the significance of welfare characteristics in parks has also changed from literal benefits to caring for basic human rights. Third, the purpose of welfare characteristics in parks has changed from providing minimal conditions to optimal conditions. At its beginning, the ideology of welfare in parks remained ideal, confining itself to their idealistic characteristics; but as time went on, they created several social benefits in response to various social demands, developing into a field where welfare ideology manifests and is realized in an active manner. Furthermore, it was witnessed that the parks and welfare of the present times are standing at the point of contact for participation and universal well-being. The present study reconsidered the meaning and value of parks from perspective of them as a provider of welfare benefits as well as examined how the welfare ideology of parks is connected to practice. By doing so, this study discovered the various roles, values, and ideology that parks should bear in the future. Therefore, this study is expected to be a good example for future research related to the topic.

A Semantic Comparative Study of Formative Idea and Landscape Elements Composition of Damyang 'Soswaewon(潭陽瀟灑園)' & Suzhou 'Canglang Pavilion(蘇州滄浪亭)' (담양소쇄원(潭陽瀟灑園)과 소주창랑정(蘇州滄浪亭)의 조영사상과 경관구성요소에 관한 의미(意味) 비교연구)

  • Wei-Tiantiani, Wei-Tiantian;Kim, Jai-Sik;Kim, Jeong-Moon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.36-47
    • /
    • 2017
  • In this research, sematic comparative study on formative idea and landscape elements composition was made between Soswaewon which was a remote villa garden in Joseon Dynasty and Canglang Pavilion which was built at a time when Neo-confucianism had been created in Song dynasty. From which the summary was resulted as below: Firstly, Soswaewon was fully devoted to Neo-confucianism among Korean remote villa gardens, Canglang-Pavilion was deeply affiliated with Neo-confucianism the deep-rooted thought. Adding a comment, as a richly historied Chinese private garden it was the best preserved even now and the farmost point from now and approximately 500 years advanced than Soswaewon, moreover Sosunheum the builder belonged to gentry society in Song dynasty. Secondly, Both Soswaewon and Canglang-Pavilion were remarkable thank to nature friendly concept which was deeply rooted in the eremitic thought(隱逸思想). Most of all, it might be interpreted the location of Soswaewon lay down in a mountain, as to be swallow hidden(小隱) but that of Canglang-Pavilion lay down in a city, as to be middle hidden(中隱). Thirdly, approaching with comparative study to gardens' factors implicated in symbolization when naming both Soswaewon and Canglang-Pavilion, neo-confucianism in Song dynasty in which diverse thoughts ranging Confucianism and Buddhism and Taoism had formed ensemble and developed was deeply built in Soswaewon, as to be in consistency to nature and to be a basis for comprehending diverse symbolization factors found in Canglang-Pavilion. Fourthly, given that forms or factors of gardens was tangibly came up with thoughts' variation we surely underwent to comparative study. Through which we could know Soswaewon was made by maximizing use of nature but minimizing addition of artificial things. In other words, it was trial of expressing semantic feature of the site in a way blending natural circumstance and liberal one. One of the representatives, Daebongdae in Soswaewon was a site where the owner's idea came up with. Scenary was recreated and nature was represented in interspace of Canglang-Pavilion with the high wall around the border, for which it renounced the world. To the end, it was understood there was the location characteristic of Canglang-Pavilion which let us look down from mountain and take some time for introspection. It might be said that the cultural root was in common between Korea and China, however it was found there were lots of differences in forms and features of gardens. We were able to interpret that social and cultural background were led to gardens' formation in which individual characteristic of two nations were blended, from which difference was resulted.

A Study on Gardening Theories of Li, Yu in 'Xian Qing Ou Ji' (한정우기(閑情偶寄)를 통해 본 이어(李漁)의 조원(造園) 이론)

  • Zhang, Lin;Jung, Woo-Jin;Sung, Jong-Sang
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.137-148
    • /
    • 2018
  • Li Yu's Xian Qing Ou Ji was written during the late Ming and early Qing Dynasty when material culture flourished due to the development of the commercial economy. Xian Qing Ou Ji is considered a retrospective work that reflects the rich material society at that time. This study focuses on his gardening theories through the interpretation and analysis of these two texts of 'Jushibu(居室部)' and 'Zhongzhibu(種植部)' in Xian Qing Ou Ji. The results are summarized as follows. First, he explained the method of garden configuration and orientation according to the topography utilizing the theory of 'suiting one's measures to local conditions(因地制宜)'. He emphasized the detailed understanding of topography as the starting point for all the gardening theories. It stated that he tried to adjust the height of the terrain artificially to create an ideal form of 'anterior high and posterior low(前低後高)'. The successful arrangement of houses, pavilions, rockery and waterways et al. was able to be achieved because of his accurate understanding of topography. Second, 'borrowing scenery(取景在借)' means 'borrowing the outside scenery to the inside'. He applied this theory by 'viewing in motion(動觀)' and 'viewing in repose(靜觀)'. 'Viewing in motion' is seen as a positive methodology for landscape enjoyment. For example, the view through a window changes with movements of the boat, and it can portray thousands of landscape paintings which can be seen through the windows. In the case of 'viewing in repose', the window is regarded as a means of attracting outside garden views to the inside. Third, he emphasized 'the firmness of objects(制體宜堅)', where the design of windows and railings must be considered ahead of others. Fourth, he interpreted the contents of 'the pursuit of novelty(創異標新)'. This generalizes the characteristics of his gardening theory. The contents included 'hall wall(廳壁)', 'variable sun visor(活?)', 'hanging boards and couplets(聯?)' and 'method of supporting vines with bamboo screen(竹屛扶植法)'.

A Study for the Methodology of Analyzing the Operation Behavior of Thermal Energy Grids with Connecting Operation (열 에너지 그리드 연계운전의 운전 거동 특성 분석을 위한 방법론에 관한 연구)

  • Im, Yong Hoon;Lee, Jae Yong;Chung, Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.143-150
    • /
    • 2012
  • A simulation methodology and corresponding program based on it is to be discussed for analyzing the effects of the networking operation of existing DHC system in connection with CHP system on-site. The practical simulation for arbitrary areas with various building compositions is carried out for the analysis of operational features in both systems, and the various aspects of thermal energy grids with connecting operation are highlighted through the detailed assessment of predicted results. The intrinsic operational features of CHP prime movers, gas engine, gas turbine etc., are effectively implemented by realizing the performance data, i.e. actual operation efficiency in the full and part loads range. For the sake of simplicity, a simple mathematical correlation model is proposed for simulating various aspects of change effectively on the existing DHC system side due to the connecting operation, instead of performing cycle simulations separately. The empirical correlations are developed using the hourly based annual operation data for a branch of the Korean District Heating Corporation (KDHC) and are implicit in relation between main operation parameters such as fuel consumption by use, heat and power production. In the simulation, a variety of system configurations are able to be considered according to any combination of the probable CHP prime-movers, absorption or turbo type cooling chillers of every kind and capacity. From the analysis of the thermal network operation simulations, it is found that the newly proposed methodology of mathematical correlation for modelling of the existing DHC system functions effectively in reflecting the operational variations due to thermal energy grids with connecting operation. The effects of intrinsic features of CHP prime-movers, e.g. the different ratio of heat and power production, various combinations of different types of chillers (i.e. absorption and turbo types) on the overall system operation are discussed in detail with the consideration of operation schemes and corresponding simulation algorithms.

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

Research about feature selection that use heuristic function (휴리스틱 함수를 이용한 feature selection에 관한 연구)

  • Hong, Seok-Mi;Jung, Kyung-Sook;Chung, Tae-Choong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.3
    • /
    • pp.281-286
    • /
    • 2003
  • A large number of features are collected for problem solving in real life, but to utilize ail the features collected would be difficult. It is not so easy to collect of correct data about all features. In case it takes advantage of all collected data to learn, complicated learning model is created and good performance result can't get. Also exist interrelationships or hierarchical relations among the features. We can reduce feature's number analyzing relation among the features using heuristic knowledge or statistical method. Heuristic technique refers to learning through repetitive trial and errors and experience. Experts can approach to relevant problem domain through opinion collection process by experience. These properties can be utilized to reduce the number of feature used in learning. Experts generate a new feature (highly abstract) using raw data. This paper describes machine learning model that reduce the number of features used in learning using heuristic function and use abstracted feature by neural network's input value. We have applied this model to the win/lose prediction in pro-baseball games. The result shows the model mixing two techniques not only reduces the complexity of the neural network model but also significantly improves the classification accuracy than when neural network and heuristic model are used separately.

Facial Expression Control of 3D Avatar using Motion Data (모션 데이터를 이용한 3차원 아바타 얼굴 표정 제어)

  • Kim Sung-Ho;Jung Moon-Ryul
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.383-390
    • /
    • 2004
  • This paper propose a method that controls facial expression of 3D avatar by having the user select a sequence of facial expressions in the space of facial expressions. And we setup its system. The space of expression is created from about 2400 frames consist of motion captured data of facial expressions. To represent the state of each expression, we use the distance matrix that represents the distances between pairs of feature points on the face. The set of distance matrices is used as the space of expressions. But this space is not such a space where one state can go to another state via the straight trajectory between them. We derive trajectories between two states from the captured set of expressions in an approximate manner. First, two states are regarded adjacent if the distance between their distance matrices is below a given threshold. Any two states are considered to have a trajectory between them If there is a sequence of adjacent states between them. It is assumed . that one states goes to another state via the shortest trajectory between them. The shortest trajectories are found by dynamic programming. The space of facial expressions, as the set of distance matrices, is multidimensional. Facial expression of 3D avatar Is controled in real time as the user navigates the space. To help this process, we visualized the space of expressions in 2D space by using the multidimensional scaling(MDS). To see how effective this system is, we had users control facial expressions of 3D avatar by using the system. As a result of that, users estimate that system is very useful to control facial expression of 3D avatar in real-time.