• 제목/요약/키워드: Privacy Invasion

검색결과 158건 처리시간 0.028초

분산형 인공지능 얼굴인증 시스템의 설계 및 구현 (Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment)

  • 배경율
    • 지능정보연구
    • /
    • 제10권1호
    • /
    • pp.65-75
    • /
    • 2004
  • 네트워크로 연결된 환경에서 PIN 번호를 이용해 사용자의 신분을 증명하고 인증하는 방식이 일반적으로 활용되고 있다. 그러나, 아이디나 비밀번호가 해킹을 통해 유출되면 금전적인 피해뿐만 아니라 개인의 사생활까지도 침해받게 된다. 본 논문에서는 아이디나 비밀번호가 유출될 염려가 없는 안전한 인증방식으로 얼굴인식을 채택하였다. 또한, 2-Tier 간의 인증방식이 아닌 점점 분산화 되어 가는 네트워크 시스템을 고려해 3-Tier이상의 분산된 환경에서 원격으로 신분을 증명하고 인증할 수 있는 시스템을 제안하였다. 본 인증시스템의 얼굴인식 알고리즘으로는 최근 분류(Classification)와 특징추출(Feature Extraction)에서 빠른 속도와 정확성을 보이는 SVM(Support Vector Machine)과 PCA를 이용해 얼굴 특징을 분석하고, 분산된 환경에서 인공지능 기법을 활용해 인식속도 및 정확성을 높일 수 있는 분산형 인공지능 얼굴인증 모듈을 구현하였다.

  • PDF

감시사회의 도래에 따른 사회적 이슈에 관한 고찰: 혜택인가, 통제인가? (study about social issues according to the surveillance society time : benefit, controlled society?)

  • 김상진;김찬선
    • 융합보안논문지
    • /
    • 제14권2호
    • /
    • pp.73-79
    • /
    • 2014
  • 21세기에 들어와 CCTV나 몰래카메라, 사이버공간에서의 감시와 역감시 현상이 높아짐에 따라 국내에서도 감시사회에 대한 우려의 목소리가 높아지고 있다. 이러한 감시체제에 대한 주제는 사회적 이슈거리로 다루어야 함이 마땅하지만, 정부와 기업은 광고를 통하여 당장의 편리함과 안전제공이라는 긍정효과(positive effect)를 크게 부각시키며 파놉티즘(panoptisme) 현상을 더욱 일반화 시키고 있다. 다양한 혜택으로 위장한 광고들로 인하여 현대인들은 실제적으로 감시당하고 있음으로 의식하지 못한 채 자신들의 프라이버시를 유린당하고 있는 실정이다. 그러므로 이 연구는 이러한 디지털 시대에 따른 감시사회 도래에 따른 문제들을 지적함으로써 개인의 프라이버시 침해와 통제사회의 일반화를 경고하기 위한 시사점을 제공하고자 한다.

The Direction for a Sustainable Residential Environment Plan based on Resident Testimonies about the Use of the 'Streets in the Sky' of the Park Hill Flats in the United Kingdom

  • Park, Joon Young;Park, Woo Jang;Jeong, Sang Kyu
    • KIEAE Journal
    • /
    • 제14권2호
    • /
    • pp.61-68
    • /
    • 2014
  • This study aims at proposing a sound and sustainable development direction of an residential environment by analyzing testimonies of residents who lived in Park Hill flats or their surround at Sheffield City in the United Kingdom. The results are obtained through the analysis on a residential environment of Park Hill flats, opinions of the residents on its refurbishment, and effects of the building on the residential environment. The block of Park Hill flats was a community with a strong unity and solidarity, but that became increasingly a slum by the decline of the physical and social environment since the 1980s. In particular, it was identified that the deterioration of the social environment than that of the physical environment was a major cause of the decline. Nevertheless, it was found that "streets in the sky", the concept applied in Park Hill, played a key role in activating the community in the apartment complex. However, that street system in the complex has caused noise, poor security, and invasion of privacy. If such problems are solved, the streets in the sky will be a meaningful alternative for community activation and then ensuring sustainability in Korean residential environments that lost the function of the community.

스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법 (Group Key Management Method for Secure Device in Smart Home Environment)

  • 류호석;곽진
    • 정보보호학회논문지
    • /
    • 제25권2호
    • /
    • pp.479-487
    • /
    • 2015
  • IT 발전에 따라 스마트홈 서비스는 네트워크 기반의 스마트 디바이스를 통해 원격 서비스, 모니터링 서비스 등 다양한 서비스를 제공하고 있다. 그러나 스마트홈 환경에서는 악성 디바이스를 통한 데이터 위 변조, 불법 인증, 프라이버시 침해 등과 같은 보안 위협들이 존재한다. 이러한 보안 위협들에 대응하기 위한 스마트홈 환경에서의 보안에 대한 연구가 활발히 진행되고 있으나 디바이스 관리를 위한 연구는 초기 단계에 머물고 있으며, 스마트홈 환경에서의 그룹키 관리에 대한 연구가 부족한 실정이다. 따라서 본 논문에서는 스마트홈 환경에서 안전한 디바이스 관리를 위한 그룹키 관리 기법을 제안한다.

간호제공자들의 치매노인 공격행동 경험에 대한 연구 (The Experience of Nursing Staff on the Dementia Patients′ Aggressive Behavior)

  • 오진주
    • 대한간호학회지
    • /
    • 제30권2호
    • /
    • pp.293-306
    • /
    • 2000
  • Providing care to the dementia elderly with behavioral problem is a major issue in nursing homes today. This study was aimed to explore the nursing staffs′ response to aggressive dementia patients, and the effect that the aggressive behavior had on Nsgstaff. The interviews used a semi-structured questionnaire are were carried out from May to July, 1999. The subjects were 23 nursing personnel working in the nursing homes for dementia elderly. The result are as follows; 1. The types of aggressive behavior cited by the subjects was "physical", "linguistic", and "sexual". 2. The factors that caused the behavior were "symptoms of disease", "under- conditioning", "context of nursing care", "unsatisfied need", "relationship to other patients", "change of outer environment", and "invasion of one′s own privacy". 3. The response of the subjects were "unhappiness", "stress", "anger", "exaggeration", "anxiety", and "fear". 4. The management strategies listed by nursing personnel used to alleviate aggressive behavior were "ignorance" "patience" "leaving the area" "soothing sounds" "verbal punishment" "restriction and isolation" and "various management skill appliance" "adaptation". 5. The effect that aggressive behavior and were "disturbance of relationship to elderly" "decline in the amount and quality of nursing care" "interruption of task performance" "job exhaustion" "desire to leave the job" "physical impact" "stress on the cognition of others" "anxiety about health and one own future" "interference to family life′. The findings of this study will be useful in understanding the difficulties of nursing personnel when confronting the aggressive behavior of dementia partients. It also is useful as basic data in preparing efficient intervention program for these difficulties.

  • PDF

북한의 사이버공격과 대응방안에 관한 연구 (A Study on North Korea's Cyber Attacks and Countermeasures)

  • 정민경;임종인;권헌영
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

인터넷 이용자의 개인정보 유출 가능성에 대한심리적 불안에 관한 연구: 성별, 이용량, 이용 빈도를 중심으로 (A Study on the Psychological anxiety on Private information leakage to likelihood of internet users)

  • 진성철;김인경
    • 한국전자통신학회논문지
    • /
    • 제6권5호
    • /
    • pp.731-737
    • /
    • 2011
  • 본 연구는 인터넷 이용자들을 대상으로 개인정보 유출 가능성에 따른 심리적 불안에 대해서 논의하였다. 성별, 인터넷 이용량, 사이트 가입 수, 전자상거래 빈도에 따라 개인정보 유출 가능성에 대한 심리적 불안이 어떠한 차이를 나타내는지 알아보았다. 분석 결과 여성이 남성보다 심리적 불안이 더 크게 나타났으며, 인터넷을 많이 이용할수록 심리적 불안이 크게 나타났다. 하지만 사이트 가입 수나 한 달 평균 전자 상거래 빈도에 따른 개인정보 유출 가능성에 대한 심리적 불안에는 차이가 나타나지 않았다.

망원급수를 이용한 암호화 알고리즘 (A Cryptography Algorithm using Telescoping Series)

  • 최은정;사공융;박왕근
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

테크노스트레스가 반생산적 과업행동에 미치는 영향 (The Effect of Technostress on Counterproductive Work Behavior)

  • 이재강;박태경
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.1-14
    • /
    • 2015
  • Due to advances in information and communication technologies (ICTs) and the advent of the Smartphone, people have access to the internet and can work at any time and any where. These are however likely to cause negative effects such as the personal information leakage and invasion of privacy. Caused by negative aspects of ICTs, the stress is so-called technostress. Recently, it is reported that managers tend to task order to their subordinates using an SNS or mobile messenger on a real-time basis after office hours or even on holiday, leading to a sharp increase in technostress. While previous studies of stress indicate that it is associated with the counter-productive work behavior (CWB), no empirical evidence has shown about the relationship between technostress and CWB. This study aims to explore the effect of technostress on CWB. In addition, it seeks to clarify the moderating effect of leader-member exchange(LMX) in this relationship. Drawing on literature regarding technostress and CWB, hypotheses are developed and tested with the sample of 101 using regression analyses. Results show that technostress has a significantly positive effect on CWB, but LMX has an insignificant moderating effect in the relationship between technostress and CWB. Implications and limitations with suggestions for future studies are presented.

경의선 숲길공원의 범죄예방 환경디자인 개선점 연구 - 창전동 구간을 중심으로 - (A Study on Improvement of Crime Prevention Environment Design in Gyeongui Line Forest Park - In Case of Changjeon-dong section -)

  • 김연경;유다은
    • 대한건축학회논문집:계획계
    • /
    • 제36권1호
    • /
    • pp.113-124
    • /
    • 2020
  • The purpose of this study is to suggest an improvement for the CPTED(Crime Prevention Through Environmental Design) guidelines for the urban linear park. We analysed the Changjeon-dong section of Gyeongui Line Forest Park into 12 sub-areas and evaluated CPTED design applied on the park based on analysis framework derived from 15 precedent studies by conducting on-site observations. Both surveys and in-depth interviews on users of the park were conducted and the results of analysis on the evaluation from users and the on-site observation were compared. We found that the lighting condition and the height of wall and trees at the park boundaries are very important to insure natural surveillance since the adjacent areas are easy to be hidden from passers-by and subject to invasion and threat of crime while protecting the privacy of residents on the boundary. There should be improvement on management facilities and crime prevention facilities for more safe and convenient use of the linear park and the adjacent commercial use during nighttime also need to be managed for conflicts between various type of users.