• Title/Summary/Keyword: Office Communication

Search Result 594, Processing Time 0.023 seconds

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

Communication and Self-Esteem between Middle School Students and Their Parents (중학생의 부모-자녀간 의사소통과 자아존중감)

  • 신효식;김근화
    • Korean Journal of Human Ecology
    • /
    • v.7 no.2
    • /
    • pp.47-58
    • /
    • 2004
  • This study is designed to provide some basic materials for finding better ways to promote student-parent communication in order to elevate the sense of self-esteem among middle school students and to talk about the importance of communication between students and parents through looking at the current student-parent communication reality resulting from socio-demographic changes among male and female middle school students and analyzing some influences student-parent communication has on students' self-esteem. To attain the aforementioned purpose, total 650 2nd grade and 3rd grade middle school students were asked to fill out the questionnaire. The schools that they are attending are 2 schools in Gwangju City and 2 schools in a township in Jeonnam. 617 students responded to the survey. In order to see the general characteristics and the distribution of major variables of the respondents, the data were used to produce frequency. percentile, standard deviation and correlation quotient. and t-test. one-way Anova, Duncan's multiple range test and multiple regression analysis techniques were put to use. The results from this study are as follows: student groups that have good relations with other students seemed to be more open and active in their communication with their mother and father. Female students and students in their 2nd grade had more open talking relations with their mothers than male students and students in their 3rd grade. Students had more open talking relations with their father when father's occupation is office worker. In the difference of self-esteem that results from variables in communication between students and parents, a significant variance was presented in the level of the self-esteem of middle school students. When they had open communication with both parents, they had a high sense of self-esteem. and when their communication style was problematic, they had a low sense of self-esteem. When they had better relations with other students, when they had more open communication styles with their mother, when they had better school records, when they felt more satisfaction with communication With their father, they showed a higher level of self-esteem.

  • PDF

The Influence of Ethical Leadership and Collaborative Communication on IS Behavior in Organizations: The Role of Trust and Person-Organization Fit (조직 내 정보보안 행동 관련 윤리적 리더십과 협력적 커뮤니케이션의 영향: 신뢰 및 개인-조직 적합성 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.465-474
    • /
    • 2023
  • As the effective use and strong protection of an organization's information resources are recognized as a condition for the growth of an organization, they are increasing technological and policy investments in IS(information security). However, information exposure can occur from external invasions such as hacking and incidents related to misuse and abuse by insiders. This study proposes a mechanism that considers the organizational environment and individual characteristics from the viewpoint of promoting employees' IS participation activities. In other words, the study presents the complex effects of organizational environmental factors (ethical leadership, IS collaborative communication) and personal factors (person-organization fit) on organization trust and IS voice behavior. We surveyed office workers who asked for IS-related business activities and tested hypotheses using 422 samples. As a result, ethical leadership influenced organization trust through collaborative communication, and organization trust strengthened IS voice behavior by having an interaction effect with person-organization fit. This study suggests direction for establishing an organizational environment for promoting IS-related activities by office workers, so it provides practical implications for organizations with goals related to internal information exposure control.

When Do People Post a Comment to a News Story on the Internet?

  • Lee, Mina;Choi, Inhye;Yang, Seungchan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.434-445
    • /
    • 2015
  • In reading news stories online, people are exposed to others' comments to a news story. In spite of popularity of comments to a news story online, the understanding of why and who posts a comment is still lacking. To complement scarcity and have a better understanding of comment-posting online, this study examined psychological factors which affect the likelihood of posting a comment to a news story online. In particular, three variables were considered: The first variable was communication efficacy, that is, an individual's belief about communication practices and systems, under the supposition that the people who have greater levels of communication efficacy are more likely to post a comment. The second variable was perception of public opinion, to test that when and if people judge their position of the issue as favored by the majority, they tend to post a comment. And finally, the tone of existing comments was included, to test if the tone of comments affects the willingness to post a comment. The results showed that firstly, people at a high level of communication efficacy are more likely to post a comment compared to people at the low level of communication efficacy. Secondly, the perception of public opinion partly influenced the willingness to post a comment. Especially, when people believe communication systems contribute to develop society and also when judged that their opinion is the majority's opinion, they are more likely to post a comment. Finally, the tone of the comments influenced the willingness to post a comment only on the condition that people are confident of the communication practice and are exposed to emotional comments.

A STUDY ON THE CALL PROCESSING CAPACITY ESTIMATION OF NO.1A ESS BASED ON POSTCUTOVER MODEL (운용중인 No.1A전자교환기 호처리 용량 산출)

  • 김영선;김한호;김현우
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1987.04a
    • /
    • pp.67-71
    • /
    • 1987
  • No 1A ESS must operate in real time. Call processing capacity is the maximm number of originating plus incoming calls which the processor can process in some fixed interval of real time shile all service criteria have been satisfied. In this paper. we discuss the postcutower method of determining call processing capacity of No 1A ESS which can be applicable to an in service office and explain the usuage mithod of estimated call processing capacity of No 1A ESS in service

  • PDF

Breakthrough of Single-Quantum Signal in Double-Quantum Filtering and its Elimination

  • Jung, K.J.;Katz, J.;Hilal, S.K.;Cho, Z.H.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1993 no.05
    • /
    • pp.86-89
    • /
    • 1993
  • Breakthrough of single-quantum coherence is shown to occur even after application of a double-quantum filter with Bax's four-step phase-cycling scheme. The reason for this breakthrough is investigated and a method for its elimination is theoretically developed and experimentally demonstrated.

  • PDF

A study on the IT application for Freight Train System (화물철도에서 IT 기술 적용 방안)

  • Cho B. K.
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1219-1222
    • /
    • 2004
  • JP freight railway have national network, but to conduct management and work effectively, they need to improve communication infra and centralization of mainstay system. So in this study, the conversion of Host system into Server system and network terminal sharing according to plural system. Besides, to achieve more higher information from a new angle, IT Innovation office was inaugurated. In this study, new method will be considered to correspond administrative high-tech. for example ' E-business of freight station ', ' E-freight train ', ' Information service using IT '

  • PDF