• Title/Summary/Keyword: Online protection

Search Result 251, Processing Time 0.083 seconds

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox (소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

Literature Investigation Regarding Cupping Therapy and Analysis of Current Professional's Cupping Treatment (부항요법에 대한 문헌고찰 및 부항시술 현황 조사)

  • Lee, Byeong-Yee;Song, Yun-Kyung;Lim, Hyung-Ho
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.18 no.2
    • /
    • pp.169-191
    • /
    • 2008
  • Objectives : This study was performed to report the present situation of the cupping treatment to make standardization of cupping treatment in Korea. Methods : We searched relevant case reports, surveys, and review articles using a databases of online bibliography. And we had research to oriental medical doctor with questionnaire about the cupping treatment. Results : 1. Cupping treatment is used for diagnoisis, protection and treatment for many kinds of diseases such as musculoskeletal diseases, internal diseases, sequela of cerebral attacks and so on in Korea. 2. Adequate cupping area is the area of lesion. 3. Cupping time and pressure are various. 4. Adequate amount of venesection is 10cc. 5. Adequate dry cupping term is 1 time/day and adequate wet cupping term is 1 time/2~3days. 6. Cognition of adverse reaction of cupping treatment is different among the doctors. 7. Method of disinfection of cup is different among the doctors. Conclusions : The result of this study will help to make the a guideline of cupping treatment. And we have to go ahead studying to make standardization of cupping treatment.

A Study on the Integrated Simulation and Condition Monitoring Scheme for a PMSG-Based Variable Speed Grid-Connected Wind Turbine System under Fault Conditions (PMSG 적용 가변속 계통연계형 풍력발전 시스템의 통합 시뮬레이션 및 스위치 개방고장 진단기법 연구)

  • Kim, Kyeong-Hwa;Song, Hwa-Chang;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.3
    • /
    • pp.65-78
    • /
    • 2013
  • To analyze influences under open fault conditions in switching devices, an integrated simulation and condition monitoring scheme for a permanent magnet synchronous generator (PMSG) based variable speed grid-connected wind turbine system are presented. Among various faults in power electronics components, the open fault in switching devices may arise when the switches are destructed by an accidental over current, or a fuse for short protection is blown out. Under such a faulty condition, the grid-side inverter as well as the generator-side converter does not operate normally, producing an increase of current harmonics, and a reduction in output and efficiency. As an effective way for a condition monitoring of generation system by online basis without requiring any diagnostic apparatus, the estimation schemes for generated voltage, flux linkage, and stator resistance are proposed and the validity of the proposed scheme is proved through comparative simulations.

Research on Consumer Responses to Similar Social Value Seeking Activities Conducted by Fashion Social Enterprises and Cause-Related Marketing (패션 사회적기업과 공익연계마케팅의 유사한 사회적가치 추구 활동에 대한 소비자 반응 연구)

  • Seo, Min Jeong
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.4
    • /
    • pp.506-520
    • /
    • 2019
  • This study first investigates relationships among fashion consumer's positive emotion toward social value seeking activities (SVSA), enterprise image (EI), enterprise-perceived quality (EPQ), and purchase intention. Additionally, it demonstrates if the confirmed relationships are different in similar SVSA between social enterprise and cause-related marketing (CRM). An online experiment using a 2 (the implementation organization of social values: social enterprise vs CRM) ${\times}2$ (SVSA: support of vulnerable group vs environmental protection) factorial design was conducted to test the established hypotheses. Participants were randomly assigned to one of four conditions, and the collected data were analyzed using a partial least squares structure equation modeling (PLS-SEM) and partial least squares multi-group analysis (PLS-MGA). The results revealed that positive emotion toward SVSA directly influenced EI and purchase intention. EI and EPQ were identified as sequential mediators linking positive emotion toward SVSA and purchase intention. A finding for similarity in consumer response paths between social enterprises and CRM highlights that social enterprises need to develop a marketing strategy distinguished from CRM.

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF

Effects of Young Children's Competence on Mastery Motivation Moderated by Mothers' Overprotective Parenting: Focus on Temperament Types of Young Children (유아의 유능감이 숙달동기에 미치는 영향에서 어머니 과보호의 조절효과: 유아의 기질 유형에 따른 차이를 중심으로)

  • Ji-Eun Song;Nary Shin
    • Korean Journal of Childcare and Education
    • /
    • v.19 no.2
    • /
    • pp.21-42
    • /
    • 2023
  • Objective: This study aims investigate the moderating effect of mothers' overprotective parenting in the influence of young children's competence, as determined by their temperament, on mastery motivation. Methods: An online survey was conducted on 429 mothers with children aged 3-5. The collected data was analyzed using K-means clustering in SPSS 23.0 and the Process macro Model 2. Results: Children's temperaments were categorized into four types : easy-active temperament, easy-inactive temperament, slow temperament, and difficult temperament. It was confirmed that children's competence directly affected their mastery motivation when they had easy-inactive, slow, or difficult temperament. It was also found that mothers' intrusive control had a direct main effect on object persistence when children had easy temperament, while there was no effect on mastery pleasure. The moderating effects of mothers' anxious protection on the pathway from children's competence to object persistence were significant only among children with a slow temperament. Conclusion/Implications: This study highlights the need for mothers to adapt their parenting behavior to their children's temperament type. The study confirmed partial moderating effects of mothers' overprotective parenting in the influence of children's competence, as determined by their temperament, on mastery motivation.

Analysis of Security Vulnerabilities and Personal Resource Exposure Risks in Overleaf

  • Suzi Kim;Jiyeon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.109-115
    • /
    • 2024
  • Overleaf is a cloud-based LaTeX editor, allowing users to easily create and collaborate on documents without the need for separate LaTeX installation or configuration. Thanks to this convenience, users from various fields worldwide are writing, editing, and collaborating on academic papers, reports, and more via web browsers. However, the caching that occurs during the process of converting documents written on Overleaf to PDF format poses risks of exposing sensitive information. This could potentially lead to the exposure of users' work to others, necessitating the implementation of security measures and vigilance to caution against such incidents. This paper delves into an in-depth analysis of Overleaf's security vulnerabilities and proposes various measures to enhance the protection of intellectual property.

Assessing Tourist Perceived Attributes of Overtourism

  • Margherita Puzoni;Ju Hyoung Han
    • Asia-Pacific Journal of Business
    • /
    • v.15 no.1
    • /
    • pp.71-85
    • /
    • 2024
  • Purpose - The purpose of this study is to assess the perceived importance and satisfaction of domestic tourists who visited Venice, Italy, regarding the attributes of overtourism. Design/methodology/approach - An online survey was conducted to measure the tourist perceived attributes of overtourism from November 8th to 22nd, 2023. Convenience sampling was employed to target study participants who are domestic tourists in Venice, Italy. A total of 127 responses were used for analysis, including frequency analysis, paired-sample t-tests, and Importance-Performance Analysis (IPA). Findings - First, the results of the IPA showed that attributes related to urban facilities and spaces directly associated with travel behavior were highly rated in both importance and satisfaction by tourists. Second, attributes related to carrying capacity were perceived as highly important but had lower satisfaction level. Third, tourists evaluated the management of affordable prices for tourism products as both less important and less satisfying. Lastly, attributes related to the protection of local businesses showed higher satisfaction levels compared to their perceived importance. Research implications or Originality - This study contributes to an extended understanding of overtourism by examining the phenomenon from the tourists' perspective.

The risk of the Information-oriented society and the role of private security (정보화 사회의 위험적 요소와 민간시큐리티의 역할)

  • Gong, Bae Wan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Informatization of society through the computer and the Internet, because large amounts of information production and exchange and new way of communicating is born. Passive way past the one-sided information flows actively interact to evolve in a manner of information producers and information consumers distinction and personal relationships that enhance the online Social Networking Service (SNS) has developed into the social structure of. Thus, the spread of information work closely with the social network structure spark social conflict may act as a factor, and systems and the environment, personal and cultural adaptation of speed to keep up with the rapid development of science and technology as the inability conflict and confusion should lead to even. This paper the characteristics of the information society, with a look at the evolution of social risk factors as the wavelength of information about this look at the role of private security sought to evaluate. Information Society in time and space by shrinking the area of human life that has brought the convenience and simplicity, whereas the non-performance due to the nature of anonymous raises many social side-effects are. This made the preparation of national regulatory measures, but for the protection of personal protection devices in the private sector has not yet been discussed. Way of life and property of the purchaser to protect an individual's private security will have to charge it.