• Title/Summary/Keyword: Party School

Search Result 265, Processing Time 0.027 seconds

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

S.O.S : Shield of Steam Protection Based on API Call Birthmark in Online Game ESD DRM (S.O.S : Shield of Steam API 콜 버스마크 기반의 온라인 게임 ESD DRM 보호)

  • Oh, Dong Bin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1297-1307
    • /
    • 2018
  • The rise of Online game ESD(Electronic Software Distribution) like Steam, the method of game piracy are more diversified. In Online Game ESD, Software DRM is applied to game because we have to play in offline situation, but it is easily bypassed due to low security level. In this study, we analyze crack files of pirated games to learn how to bypass Steam DRM and to establish countermeasures for based on API call birthmark. The generated birthmark showed more than 85% resilience in representing crack groups and 95% credibility in detecting cracked games. With this study, it is possible to enhance the security of the online game Electronic Software Distribution platform, and to provide a high level of game piracy protection for indie game developers, especially those who can not purchase Third Party DRM to protect their own games.

Investigating the Determinants of Trust in the Internet Shopping Mall Environments: Focusing on the Moderation Effects of Perceived Risk and Perceived Price (인터넷 쇼핑몰에서의 신뢰 형성 요인에 관한 연구: 인지된 위험 및 가격의 조절효과를 중심으로)

  • Lee, Kyu-Ha;Kwahk, Kee-Young
    • Information Systems Review
    • /
    • v.17 no.2
    • /
    • pp.1-27
    • /
    • 2015
  • Internet shopping has continued to grow rapidly in the past decade. The main cause of this growth was the cheap price and convenience. However, internet shopping is uncertain compared to off-line shopping malls. Consumers don't have a chance to directly see and touch the products they will purchase. Many previous studies have suggested a trust to resolve this uncertainty. For purposes of the study, we examined how trust affects word-of-mouth effect and third-party assurance. Furthermore, using perceived risk and perceived price as moderating effects, we analyzed to see how each group-that is, those with high perceived risk and low perceived risk and those with high perceived price and low perceived price-shows differences in trust building. The results of empirical study found that both two variables of word-of-mouth effect and third-party assurance have significant impacts in trust building of internet shopping malls. It was proven that each group-those with high perceived risk and low perceived risk and those with high perceived price and low perceived price-showed differences in trust building. The results are expected to provide both the researchers of the trust study and hands-on worker with important implications.

Quantification Model Development of Human Accidents on External Construction Site by Applying Probabilistic Method (확률론적 기법을 활용한 건설현장 외부 인명피해 정량화 모델 개발)

  • Ha, Sun-Geun;Kim, Tae-Hui;Son, Ki-Young;Kim, Ji-Myong;Son, Seung-Hyun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.6
    • /
    • pp.611-619
    • /
    • 2018
  • The researches have only conducted regarding construction safety management and risk on interior construction site(workers) and is insufficient about the exterior construction site(third party). As a result, ordinary people who were near construction sites have injured and hold a negative view when they think about the construction industry because construction industry have been exposed to them having a high accidents rate through media. In addition, the importance of industrial disaster prevention is emphasized at this point in time, the overall safety management system should be constructed with considering construction site external(third human) for improving the negative image of the construction industry among ordinary people. Therefore, the objective of this study is to develop the quantification model of human accident utilizing the insurance claim payout occurred construction site exterior(third party). In the future, it can be used as a reference for developing the safety management checklist in construction site interior exterior and development for forecasting control system of human accident.

The Effects of Human and Institutional Factors on Succession Intentions of Small and Medium Enterprises (인적 요인 및 제도적 요인이 중소기업 승계 의도에 미치는 영향)

  • Bae, Jung-sik;Kang, Shin-gi
    • Journal of Venture Innovation
    • /
    • v.6 no.1
    • /
    • pp.139-159
    • /
    • 2023
  • As the founders of small and medium-sized businesses age, the issue of business succession becomes increasingly important. In this study, we empirically analyzed the impact of various human and institutional factors on corporate succession intentions, including the CEO's competency, the successor's competency, third-party stakeholders, and institutional factors such as legislation, taxation, and trust. We surveyed CEOs who were currently running small and medium-sized enterprises (SMEs), and received a total of 201 valid questionnaires. We then conducted an empirical analysis using the multiple regression analysis method. Our results showed that both the CEO's competency and the successor's competency, which are human factors, had a significant positive impact on corporate succession intention. Institutional factors such as taxation and trust also had a significant positive impact on corporate succession intention. However, third-party stakeholders and legislation did not have a significant effect on corporate succession intention. Among the factors that had a significant impact, the size of the influence was in the order of successor's competency, CEO's competency, taxation, and trust. These research results have both academic and practical implications. By going beyond existing studies that focus solely on human factors, we have revealed that institutional factors such as taxation and trust have a very important impact on corporate succession.

The Current State and Tasks of School Climate Change Education (학교 기후 변화 교육의 현황과 과제)

  • Yun, Sun-Jin
    • Hwankyungkyoyuk
    • /
    • v.22 no.2
    • /
    • pp.1-22
    • /
    • 2009
  • Even though climate change is visibly proceeding and public concern about climate change is increasing both nationally and internationally, teenagers' and students' perception of climate change is relatively low in Korea. Since climate change is a problem with long-term effects, it is young people including children and juveniles of the current generation and future generations who are more affected by climate change. They are the most interested party who should know why climate change happens, what kind of impacts will be given, and how to respond to the problem. Based on the aforementioned concern, this study aims to explore the extent and contents of school education with regard to climate change in Korea as well as in other advanced countries and to provide policy suggestions. This study finds that school climate change education requires consideration of multiple aspects including reorganization of school curriculum, revitalization of related programs by school, expansion of teachers' training chances, in which multiple institutions such as the Ministry of Environment, the Ministry of Education, Science and Technology, Offices of Education are related and, consequently, the activation of climate change education program is by no means simple. Therefore, for effective climate change education in schools, cooperation and coordination of related institutions are essential, along with development of diverse school education curriculums and programs and training programs for teachers.

  • PDF

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

Attribute-Based Two-Party Key Agreement (속성 기반의 이자간 키 교환 방법)

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.77-80
    • /
    • 2008
  • 속성 기반의 키 교환 방법은 사용자의 아이디가 다수의 속성들로 표현되고, 사용자가 지정한 정책을 만족하는 속성들을 소유한 두 사용자간에 안전한 키 교환이 가능한 방법이다. 속성 기반 키 교환은 기존의 아이디 기반 키 교환 (Identity-Based Key Agreement) 방법과 달리 키 교환을 수행할 상대방을 미리 결정할 필요가 없다. 즉, 사용자는 단지 키 교환을 맺고자 하는 상대 사용자가 어떠한 속성을 가지기를 지정한 정책을 지정하고 이 정책을 만족하는 임의의 사용자와 키 교환을 수행하게 된다. 속성 기반 키 교환은 사용자를 자신이 수행하는 역할들의 리스트로 기술하여 접근 통제를 가능하게 하는 역할 기반 접근 통제 (Role-Based Access Control) 시스템에 적용이 가능하다.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.