• Title/Summary/Keyword: Personal security

Search Result 1,620, Processing Time 0.034 seconds

Detection of Abnormal CAN Messages Using Periodicity and Time Series Analysis (CAN 메시지의 주기성과 시계열 분석을 활용한 비정상 탐지 방법)

  • Se-Rin Kim;Ji-Hyun Sung;Beom-Heon Youn;Harksu Cho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.9
    • /
    • pp.395-403
    • /
    • 2024
  • Recently, with the advancement of technology, the automotive industry has seen an increase in network connectivity. CAN (Controller Area Network) bus technology enables fast and efficient data communication between various electronic devices and systems within a vehicle, providing a platform that integrates and manages a wide range of functions, from core systems to auxiliary features. However, this increased connectivity raises concerns about network security, as external attackers could potentially gain access to the automotive network, taking control of the vehicle or stealing personal information. This paper analyzed abnormal messages occurring in CAN and confirmed that message occurrence periodicity, frequency, and data changes are important factors in the detection of abnormal messages. Through DBC decoding, the specific meanings of CAN messages were interpreted. Based on this, a model for classifying abnormalities was proposed using the GRU model to analyze the periodicity and trend of message occurrences by measuring the difference (residual) between the predicted and actual messages occurring within a certain period as an abnormality metric. Additionally, for multi-class classification of attack techniques on abnormal messages, a Random Forest model was introduced as a multi-classifier using message occurrence frequency, periodicity, and residuals, achieving improved performance. This model achieved a high accuracy of over 99% in detecting abnormal messages and demonstrated superior performance compared to other existing models.

A Study of Influencing Factors for Intentional Inaccurate Information Provision in Conversations with Chatbots: In the Context of Online Dating Services (챗봇과의 대화에서 의도적인 부정확한 정보 제공에 대한 영향 요인 연구: 온라인 데이팅 서비스 이용 상황에서)

  • Chanhee Kwak;Junyeong Lee;Jinyoung Min;HanByeol Stella Choi
    • Knowledge Management Research
    • /
    • v.25 no.3
    • /
    • pp.73-98
    • /
    • 2024
  • Chatbots are becoming increasingly popular as interactive communication tools that provide not only convenience but also a friendly and humanized experience. Due to the interactive nature of chatbots, they can exchange information with users to perform various tasks, and users sometimes intentionally provide inaccurate information. Considering social presence of conversational agents, perceived risk of providing personal information, and trust in algorithms as key influencing factors, this study explores the effects of those factors on the intention to provide inaccurate information in the context of online dating services and examine whether these effects vary across types of conversational agents. We conducted an analysis of structural equation model using data collected from Amazon Mechanical Turk (MTurk). The analysis results showed significant relationships between factors related to the intention to provide inaccurate information and empirically confirmed that those relationships vary by types of conversational agents. Out findings have academic implications for the behavior of providing inaccurate information in online environments and practical implications for designing chatbots to reduce such intentions. We also discuss the ethical implications of the consequences of inaccurate information online.

A Study of Detainees' Perceptions of the Detention Facilities of the Police Station and their Operation (경찰서 유치장 시설 및 운영에 관한 유치인의 인식연구)

  • Jung, Woo-Yeoul;Park, Dong-Kyun;Kim, Do-Kyun
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.423-449
    • /
    • 2007
  • This research is to investigate the detention facilities of police stations and their real operations through the perceptions of detainees at police station cells and to present the policy suggestions for them. To fulfill the research, a questionnaire was made out on the basis of 'the Regulation on Detention and Escort for Suspects'. 'the Regulation on a Standard Plan for Detention Facilities' and 'the Regulation on the Lowest Standard to Treat Detainees' ; and detainees at 23 police station cells under the jurisdiction of Kyungbuk Local Police Agency were asked to answer it. Policy suggestions following from the result of the investigation of detainees' perceptions of the detention facilities of the police stations are as follows; Firstly, the structure of police station cells should be arranged in straight lines in order to take their human rights into consideration and more detention facilities are needed to be built in order to separate male, female, handicapped and juvenile inmates. Secondly, shower rooms and washrooms outside the cells should always be open to detainees whenever they need to be used. Thirdly, any detention facilities deficient in fire fighting equipment should have exit doors installed as soon as possible in case of an emergency and provide sufficient fire extinguishers considering the number of detainees and the size of the facilities. Fourthly, the detention facilities should have sufficient windows for ventilation and take necessary measures to obtain natural lighting instead of electric lighting. Fifthly, air conditioners should be equipped properly taking account of the number of detainees and the dimensions of the facilities. Policy suggestions according to the result of the investigation of detainees' perceptions of the operation of detention facilities of police stations are as follows; Firstly, the problem of operating the detention facilities must deal with worn-out facilities and measures to secure the budget should be taken as soon as possible. Secondly, considering that most detained suspects have difficulties in livelihood, daily necessaries must be issued to them. Thirdly, personal belongings deposited by inmates must be properly managed with the same documentation throughout the police station detention facilities. The number of female guards to take exclusive charge of the physical checkups and processing of female detainees should be increased. Also the facilities for handicapped detainees must be expanded, improved and managed properly. Fourthly, except for handcuffs and ropes to bind detainees in the detention facilities, helmets to prevent self-harm must be withdrawn. The budget to improve the quality of meal issued by the government must be urgently secured and the price of private food sent to detainees must be readjusted to be in line with the consumer price. Health and medical care and sanitation for detainees must be substantial, and also sunbathing and outdoor exercises should be allowed to detainees.

  • PDF

A Study on the Sailing Speed of Ancient Ships - especially on the average speed and the effect of the wind, the tide, and the man-power at the oar - (고대 선박의 항해속도 연구 - $\ll$고려도경$\gg$을 중심으로-)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.155-231
    • /
    • 2009
  • Xu-Jing(徐競) an official of the Song(宋), a medieval Kingdom of China, wrote a book titled $\ll$Koryo Tu Jing(高麗圖經)$\gg$ which explains his travel to the Koryo as a member of diplomatic mission in 1123. $\ll$Koryo Tu Jing$\gg$ is the record of his personal experience in Koryo with many explanatory illustrations and especially contains 5 months' voyage record of his diplomatic fleet. His fleet set sail at a port located in the Ding Hai Xian(定海縣), Ming Zhou(明州) via a few islands of Koryo [Hyup Kye San(俠界山) , the Kun San Do(群山島) , the Ja Yon Do(紫燕島) , the Keup Su Mun(急水門) in Kang Hwa Gun(江華郡) and the Hap Gul(蛤窟) ] and finally arrived the Port Ye Song Hang(禮成港) . According to the Xu-Jing's record his fleet sailed the sea with the help of the favorable seaward winds and tides as the usual way of ancient sailing. The Xu- Jing's Fleet sailed the sea between the Mei Cen(梅岑), Ming Zhou(明州) of China and the Hyup Kye San(俠界山) of Koryo from about 5:00 a.m., May 24th(of the lunar calendar) to about 5:00 p.m., June 2nd. At this section, the average speed of the seaward winds was 19.45km/h and the average speed of the fleet which sailed only by the power of the winds was 6.29km/h. This means that 32.3% of the favorable seaward winds' speed was equal to the speed of the ancient fleet which sailed only by the power of the favorable seaward winds. The fleet sailed the sea between the Ja Yon Do(紫燕島) and the Keup Su Mun(急水門) from about 9:00 a.m., June 10th to about 1:00 p.m., the same day. At this section the fleet sailed by the power of tides in addition to the favorable seaward winds without oaring. The average speed of the winds was not different from that of former section and the average speed of the tides was 1.937km/h. And at this section the average speed of the fleet increased by 0.41km/h than that of the former section. This means that 21.1% of the speed of the tides was equal to the increased speed of the ancient fleet by virtue of the tides. The fleet sailed the sea between Keup Su Mun(急水門) and the Hap Gul(蛤窟) from about 1:00 p.m., June 10th to about 3:00 p.m., the same day. At this section, there were no seaward winds and the fleet sailed only by the powers of tides and oaring. And at this section, the tide increased the average speed of the fleet by 0.3114km/h and the fleet could sail at the speed of 4.3km/h. So we can conclude that the average speed of ancient fleet without any influences of the seaward winds and tides was 3.98 km/h. We can make use of the various sailing speeds of ancient fleets when judging their maritime activities. If we make use of the various sailing speeds of the ancient fleets as calculated in this article, we will be able to get various important informations about the certain ancient fleet's maritime maneuver. For example, we can infer the sailing routs of a certain fleet and the time when the fleet passed a certain spot by making use of the various sailing speeds of the ancient fleet. In this article I did not take account of the shapes of ships that consist of the ancient fleets and the sizes of the various ships and fleets. It was because that such factors would not change the foresaid conclusions seriously.

  • PDF

The Achievements and limitations of the U. S. Welfare Reform (미국 복지개혁의 성과와 한계)

  • Kim, Hwan-Joon
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.129-153
    • /
    • 2003
  • This study examines the socio-economic impacts of recent welfare reform in the United States. Based on the neo-conservative critique to the traditional public assistance system for low-income families, the 1996 welfare reform has given greater emphases on reducing welfare dependency and increasing work effort and self-sufficiency among welfare recipients. In particular, the welfare reform legislation instituted 60-month lifetime limits on cash assistance, expanded mandatory work requirements, and placed financial penalties for noncompliance. With the well-timed economic boom in the second half of the 1990s, the welfare reform seems to achieve considerable progress; welfare caseload has declined sharply to reach less than 50% of its 1994 peak, single mothers' labor force participation has increased substantially, and child poverty has decreased. In spite of these good signals, the welfare reform also has several potential problems. Many welfare leavers participate in the labor market, but not all (or most) of them. The economic well being of working welfare leavers did not increased significantly, because earnings increase was canceled out by parallel decrease in welfare benefits. Furthermore, most of working welfare leavers are employed in jobs with poor employment stability and low wages, making them highly vulnerable to frequent layoff, long-time joblessness, persistent poverty, and welfare recidivism. Another serious problem of the welfare reform is that a substantial number of welfare recipients are faced with extreme difficulties in finding jobs, because they have severe barriers to employment. The new welfare system with 5-year time limit can severely threaten the livelihoods of these people. The welfare reform presupposes that welfare recipients can achieve self-reliance by increasing their labor market activities. However, empirical evidences suggest that many people are unable to respond to the new, work-oriented welfare strategy. It may be a very difficult task to achieve both objectives of the welfare reform((1) providing adequate income security for low-income families and (2) promoting self-sufficiency) at the same time, because sometimes they are conflicting each other. With this in mind, a possible solution can be to distinguish welfare recipients into "(Very)-Hard-to-Employ" group and "(Relatively)-Ready-to-Work" group, based on elaborate examinations of a wide range of personal conditions. For the former group, the primary objective of welfare policies should be the first one(providing income security). For the "Ready-to-Work" group, follow-up services to promote job retention and advancement, as well as skill-training and job-search services, are very important. The U. S. experiences of the welfare reform provide some useful implications for newly developing Korean public assistance policies for the able-bodied low-income population.

  • PDF

The Effect of Ex-prisoner's Perception of Stigma on Trust in Interpersonal Relationship (낙인에 대한 출소자의 인식이 대인관계에서 신뢰에 미치는 영향)

  • Gong, Jung Sik
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.57-84
    • /
    • 2018
  • This study assumes that the perception of the ex-prisoner's against stigma will affect trust in interpersonal relationship. Prior studies have suggested that there is a stigma at the base of the awareness where people avoid and discriminate against ex-prisoner's. This in turn affects ex-prisoner's' recividicism, but there is no study about ex-prisoner's perception of stigma in Korea. Although stigma can be explained in numerous ways, this study is based on the opinion of Phillips(2016), which divides the subscale of stigma as perceived public stigma, perceived personnel stigma, and self stigma. He insisted that ex-prisoner's believe perceived public stigma higher than self-stigma. these results are consistent with this study. However, it is important to note that although ex-prisoner's are more aware of public stigma than self-stigma, they are actually more influenced by self stigma in pereonal relationships. This means that ex-prisoner's are more susceptible to internal psychological awareness than external social recognition. Therefore, the development and intervention of the program to overcome the internal self-stigma of the released prisoner is required. In this study, first, stigma, especially self-stigma turned out to have influence on the interpersonal trust. Therefore, as self-stigma level increased, the interpersonal trust decreased in most cases. Second, it was shown that stigma has the greatest influence on children out of family members, co-workers out of social relationship, self trust out of general relationship in. This confirms that stigma is a factor that greatly influences relationship between important people for ex-prisoner's. Third, since self-sigma negatively reestablish self-identity, make individuals recognize themselves as deviators and show bad lifestyle, which lead them to become habitual offender, ex-prisoner's need to make efforts to overcome self-stigma, and development and intervention of program that can make ex-prisoner's have positive self identity is requested. Fourth, although participants in the study were only male, it seems that there is difference in recognition of stigma by gender, and influence of stigma not only on interpersonal relationships, but also on social reintegration and recidivism imply that these might be good future research topics.

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.