• Title/Summary/Keyword: Personal Security

Search Result 1,605, Processing Time 0.028 seconds

A Proposal on the personalized integrated Education Model Using the Blockchain (블록체인을 활용한 개인 맞춤형교육 통합모델 제안)

  • Yu, Kyoung-sung;Kwon, Mee-Rhan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.451-456
    • /
    • 2019
  • Our students are shocked by the results that there is an inverse proportion between academic achievement and life satisfaction. Recently, the Organization for Economic Cooperation and Development (OECD) published the PISA 2015 Student Well-Being Report. According to the report, Korean students' education is the highest among OECD countries, but their life satisfaction is the 47th ranked among the 48 OECD and non-OECD countries.[1] This is the cause of the unilateral education using collective achievement in evaluation methods. Therefore, I propose a personalized integrated model utilizing block chain technology. I suggest a personalized education and evaluation system model using selective education and personal approval rather than from teachers' unilateral education. This will no longer open the student's achievement grade system to the public. This change will be accomplished utilizing block chain technology. This technology is characterized by security, transparency and dispersion. The result of this work can be used to improve students' quality of living through a management system of personalized education and evaluation, based on the nature of education.

An Analysis of Civil Complaints about Traffic Policing Using the LDA Model (토픽모델링을 활용한 교통경찰 민원 분석)

  • Lee, Sangyub
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.57-70
    • /
    • 2021
  • This study aims to investigate the security demand about the traffic policing by analyzing civil complaints. Latent Dirichlet Allocation(LDA) was applied to extract key topics for 2,062 civil complaints data related to traffic policing from e-People. And additional analysis was made of reports of violations, which accounted for a high proportion. In this process, the consistency and convergence of keywords and representative documents were considered together. As a result of the analysis, complaints related to traffic police could be classified into 41 topics, including traffic safety facilities, passing through intersections(signals), provisional impoundment of vehicle plate, and personal mobility. It is necessary to strengthen crackdowns on violations at intersections and violations of motorcycles and take preemptive measures for the installation and operation of unmanned traffic control equipments, crosswalks, and traffic lights. In addition, it is necessary to publicize the recently amended laws a implemented policies, e-fine, procedure after crackdown.

On derivation the System Analysis and Evaluation Indicators of Blockchain-based Smart Electronic Transport Waybill Platform for Improvement of Logistics Service Operation Efficiency and Personal Information Security (물류 서비스 운영 효율과 개인정보 보안 향상을 위한 블록체인 기반 스마트 전자 운송장 플랫폼 시스템 분석 및 평가지표 도출에 관한 연구)

  • Park, Jae-Min;Won, JoNg-Woon;Seong, Ki-Deok;Kim, Young-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.75-86
    • /
    • 2020
  • With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

A study on Causes and Improvements of the Police Corruption

  • Kim, Taek
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.70-78
    • /
    • 2021
  • It is true that the police have been faithful to the role of the regime's sewer and committed many disruptions and errors, and have been criticized and criticized by the public. It should now be the foundation of the democratic police and an organization supported by the people. The problem is that the quality, personality, and values of 130,000 police officers should be changed and should be in line with the spirit of the times. One of the theories of police corruption is the "rotten apple hypothesis." The theory is that there is a high possibility that the entire police force will be corrupted, as if the defective apple in the apple box is rotten and the whole apple is rotten, without filtering out potential corrupt police officers during the recruitment phase. In other words, the cause of corruption is based on personal flaws. This study intends to analyze the causes of police corruption and improvement measures. The purpose of this study is to ensure that police officers in charge of national security are usually armed with ethics and good conduct. The police should be trusted by the people and need a stronger prescription for police corruption. In this respect, this study aims to solve the corruption problem of police officials, analyze anti-corruption, and find out what are the desirable countermeasures. The main study methods of this study are as follows; First, we first tried to collect data through research on corruption-related literature. The analysis was focused on the related papers of police corruption and government reports. Second, police corruption theory and anti-corruption alternatives were analyzed. It was reviewed focusing on the theory of corruption or translated data. Third, a literature survey was analyzed to examine the National Police Agency's perception of police corruption. Based on these research methods, we tried to derive the desirable control measures for the hypothesis of police corruption. This study is believed to have contributed to supporting the organizational corruption and culture of the apple box, including the personality of the individual's values, which is a rotten apple theory of police corruption.

An Analysis of Impact on the Quality of Life for Chronic Patients based Big Data (빅데이터 기반 만성질환자의 삶의 질에 미치는 영향분석)

  • Kim, Min-kyoung;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1351-1356
    • /
    • 2019
  • The purpose of this study is to investigate the effect of personal factors and community factors on the quality of life based on the presence of chronic patients based on the Big Data Platform. As a method of study, second data of 2017 community health survey and Statistics Korea by City·Gun·Gu public office were used and a multi-level analysis was conducted after separating EQ-5D index, individual factor and community factor. As a result, men, age, education level, monthly household income, having economic activity, the number of sports infrastructure were positively associated with the quality of life, and subjective health not good, extremely perceived stress were negatively associated with the quality of life. Research will continue to provide a platform independent of hardware that can utilize the cloud and open source for medical big data analysis in the future.

McDoT: Multi-Channel Domain Tracking Technology for Illegal Domains Collection

  • Cho, Ho-Mook;Lee, JeongYoung;Jang, JaeHoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.127-134
    • /
    • 2020
  • Recently, Harmful sites, including pornographic videos, drugs, personal information and hacking tool distribution sites, have caused serious social problems. However, due to the nature of the Internet environment where anyone can use it freely, it is difficult to control the user effectively. And the site operator operates by changing the domain to bypass the blockage. Therefore, even once identified sites have low persistence. In this paper, we propose multi-channel domain tracking technology, a technique that can effectively track changes in the domain addresses of harmful sites, including the same or similar content, by tracking changes in these harmful sites. Proposed technology is a technology that can continuously track information in a domain using OSINT technology. We tested and verified that the proposed technology was effective for domain tracking with a 90.4% trace rate (sensing 66 changes out of 73 domains).

A Study on the Consumer Disputes and Protection Measures of the Digital Healthcare Market and O2O Service (디지털헬스케어 시장과 O2O서비스 소비자분쟁 및 보호방안)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.121-138
    • /
    • 2020
  • The O2O services in the healthcare sector have only been in full swing for about three years, and unlike existing O2O consumer goods, the scale and scope of the dispute are more complicated due to restrictions on medical treatment. In this study, O2O service platform operators and medical institutions' roles and responsibilities were redefined as a countermeasure for resolving disputes in healthcare O2O services and the laws for changing the transaction environment. A change in institutional mechanisms was proposed. This study looked at the types of consumer disputes related to healthcare O2O services as insufficient information problems, problems in the course of medical service implementation, problems with immunity provisions for platform operators, cancellations, and non-compliance with refunds. All the information generated during transactions in the healthcare sector was extensive in scale and included the most sensitive information among personal information, stressing the importance of ensuring security. The area that started in the O2O range before the medical institution visit also proposed a plan to establish a system for the delivery of proven information as a pre-medical person. The scale and growth will grow faster, given that consumers can experience the information they want anytime, anywhere they want. However, the platform broker's role, a link player, will become more important because consumers who use the service will have their first meeting with non-face-to-face product providers. On the other hand, service providers may have side effects of misleading consumers by providing false information or misleading consumers through exaggerated advertisements. The O2O service market is expected to expand beyond distribution and dining out to the entire industry. However, since it is challenging to check accurate statistics on the detailed market, various disputes and consumer protection measures will be required for each detailed market, and comprehensive leading solutions will be essential in the future.