• Title/Summary/Keyword: Ransom

Search Result 20, Processing Time 0.027 seconds

Structure and Texture: A Note on Ransom′s Dualism (틀과 결: 랜섬의 이원론에 대한 고찰)

  • 봉준수
    • Lingua Humanitatis
    • /
    • v.1 no.1
    • /
    • pp.195-217
    • /
    • 2001
  • According to John Crowe Ransom, "the poem is a loose logical structure with an irrelevant local texture." As is implied in the opposition between "structure" and "texture," Ransom′s is a dualistic, that is, non-organic, theory of poetry, in which the poem′s sound does not have any expressive function while its figurative language always goes beyond the realm of abstract meaning and celebrates the ontological density of the world. His theory relies heavily upon a series of oppositions-poetry and prose, art and science, concrete and universal, artistic and utilitarian, to name only a few-in order to uphold the humanistic value of poetry ("poetry as knowledge"). There is, however, a sense that his theoretical consistency derives from a determined refusal to see the blurry borderline between the oppositions. It is more or less easy to point out where Ransom′s theory falters, but more critical efforts should be made to probe into the personal and cultural significance of his persistent dualistic viewpoint. For Ransom the southerner, life demands the precarious balance between the oppositions as the very precondition for its existence and his dualism represents a way to understand man′s fallen state at the realistic level.

  • PDF

Method of Signature Extraction and Selection for Ransomware Dynamic Analysis (랜섬웨어 동적 분석을 위한 시그니처 추출 및 선정 방법)

  • Lee, Gyu Bin;Oak, Jeong Yun;Im, Eul Gyu
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.99-104
    • /
    • 2018
  • Recently, there are increasing damages by ransomware in the world. Ransomware is a malicious software that infects computer systems and restricts user's access to them by locking the system or encrypting user's files saved in the hard drive. Victims are forced to pay the 'ransom' to recover from the damage and regain access to their personal files. Strong countermeasure is needed due to the extremely vicious way of attack with enormous damage. Malware analysis method can be divided into two approaches: static analysis and dynamic analysis. Recent malwares are usually equipped with elaborate packing techniques which are main obstacles for static analysis of malware. Therefore, this paper suggests a dynamic analysis method to monitor activities of ransomware. The proposed method can analyze ransomwares more accurately. The suggested method is comprised of extracting signatures of benign program, malware, and ransomware, and selecting the most appropriate signatures for ransomware detection.

Korean Wage Gap: Do the Marital Status of Workers and Female Dominance of an Occupation Matter? (한국 노동시장에서의 성별 임금격차 변화 - 혼인상태 및 직종특성별 비교 -)

  • Jung, Jin Hwa
    • Journal of Labour Economics
    • /
    • v.30 no.2
    • /
    • pp.33-60
    • /
    • 2007
  • This study analyzes the trend of the gender wage gap and its sources in the Korean labor market for the years 1985-2004. Following Oaxaca and Ransom (1994), the gender wage gap is composed of the productivity-related gap and non-productivity-related gap (unobserved productivity gap and discrimination). Empirical findings indicate that both the productivity-related gap and non-productivity-related gap have dwindled, while the decline of the former far excelled that of the latter. The non-productivity-related gender wage gap is much larger for married women than for single women, possibly implying a lower unobserved productivity of married women because of their childcare responsibilities. The non-productivity-related gap is also very substantial in the male-dominated occupations as compared to the female=dominated occupations, supporting the existence of network externalities in employment.

  • PDF

Promotion and Wage in the Internal Labour Market : Sexual Differences (기업내부노동시장의 승진과 임금: 성별 차이를 중심으로)

  • 금재호
    • Korea journal of population studies
    • /
    • v.25 no.1
    • /
    • pp.181-211
    • /
    • 2002
  • Using the fourth data of the Korea Labor and Income Panel Study (KLIPS), this paper analyzed sexual differences in the promotion possibility and the promotion experience. Effects on wage of the promotion possibility and the promotion experience have been also discussed in detail. The promotion probability of a male worker in his current job is as high as twice than that of a female worker after controlling other independent variables. However, if we restrict the analysis to workers who either can be or was promoted, the sexual difference in the promotion possibility is greatly narrowed. This result suggests that the continuous career development without disruption is critical for the promotion of female workers. Analysing the sexual difference in wage using Oaxaca and Ransom's methodology, explanatory variables, such as human capital, residential area, etc., explained 69.5% of wage difference between male and female workers. Especially, 13.9% of wage difference was contributed to sexual differences in the promotion possibility and the promotion experience. This kind of empirical result emphasized once again the importance of promotion on wage.

2019 국내·외 주요 및 신규 랜섬웨어 동향 분석

  • Park, Eunhu;Kim, Soram;Lee, Sehun;Kim, Jongsung
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.39-48
    • /
    • 2019
  • 랜섬웨어(Ransomware)는 몸값(Ransom)과 소프트웨어(Software)의 합성어로 사용자 시스템을 장악하여 중요 문서 및 파일을 암호화하고 암호화된 파일의 복호화를 대가로 가상 화폐를 요구한다. 랜섬웨어로 인한 피해는 매년 증가하고 있으며 새로운 랜섬웨어의 등장과 변종의 출현이 빈번하다. 이에 본 논문은 2019년에 등장하거나 영향을 주고 있는 랜섬웨어에 대한 유포방법, 유포 대상, 알고리즘 사용 현황을 밝히고 국내 외 피해 사례를 소개한다. 그리고 분기 별로 감염율 상위 5개의 랜섬웨어를 살펴보고 평균 요구 금액에 대해 기술한다. 마지막으로 주요 및 신규 랜섬웨어 대해 유포 경로, 특징, 암호화 알고리즘, 복호화 요소 및 복호화 도구에 대해서는 표로 요약하며 자세히 서술한다.

Ramsonware: Holding your Data Hostage

  • Lopez, Erik Miranda;Moon, Seo Yeon;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.304-306
    • /
    • 2016
  • In the recent years ransomware has become one of the most popular malware used by criminals. This particular type of malware is notorious for locking users' data or systems and unscrambling it only after the victims pay a fee. With more and more individuals, companies and public agencies being targeted and the ransom being as high as $17,000, the need for countermeasures against this kind of malware is greater than ever. This paper explores how the malware infects and encrypts its victims. Then, it suggests mitigation techniques based on how the ransomware spreads, making special emphasis on countermeasures in order to protect end-users.

Propagation Modeling of WannaCryptor Wormable Malware (WannaCryptor 워머블 악성코드 확산 방식 연구)

  • Park, Tae Hwan;Lee, Howoong;Shin, Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.389-396
    • /
    • 2020
  • WannaCryptor is a type of ransomware which encrypts users' personal data or files and demands ransom payment in order to regain access. But it peculiarly spreads by itself like a Internet worm using Windows vulnerabilities of shared folder. In this paper, we analyzed and estimated the spread of WannaCryptor focusing on the wormable spread features different from the existed ransomware. Thus we observed its behaviors in virtual environments, and experimented the various spreads of WannaCryptor based on our prediction modeling.

Study on Gender Pay Gap of Scienceand Engineering Labor Force (과학기술인력의 성별 임금격차에 관한 연구)

  • Shim, Jung-Min;Park, Jin-Woo;Cho, Keun-Tae
    • Journal of Technology Innovation
    • /
    • v.22 no.1
    • /
    • pp.89-117
    • /
    • 2014
  • Employing female in the field of science and engineering is becoming increasingly important with diversity and creativity emerging as key factors to build Creative Economy. Under these circumstances, it is necessary to recognize and discourage gender discrimination in the labor market by analyzing wages - the market value of labor which determines one's economic status. This study uses the Oaxaca-Ransom decomposition (1994) to analyze the gender wage gap and identify factors influencing the pay gap in science and engineering labor force. The results of this study are as follows: First, the average wage of female scientists and engineers reaches only 65% of that of male labor force, and the male scientist and engineers are superior in terms of personal attributes, for instance, education background. Second, looking at the factors that influence wages, wage premiums are associated with higher education background, older age, longer period of service, and weekly working hours for both male and female in managerial positions. Third, the wage decomposition shows that in the case of science and engineering labor force, the productivity difference by personal attributes reaches about 58%, and gender discrimination by the characteristics of the labor market stands at about 41%. This means the wage gap by productivity level in science and engineering labor force is wider, and the gender gap is smaller compared to non-science and engineering fields. However, the results of an analysis on specialties and education background of male and female scientists and engineers suggest that the discrimination against women is more serious when the percentage of the female labor force is low and the percentage of temporary workers in the labor market is high. In order to eliminate this discrimination, it is necessary to reduce the imbalance of female scientists and engineers in the labor market, among others, while female scientists and engineers, themselves, need to make continuous efforts to strengthen their capabilities.

A Legal Review on Abuse Cases of Virtual Currency and Legal Responses (가상화폐의 악용사례와 법적 대응방안에 관한 고찰)

  • Hwang, Suk-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.585-594
    • /
    • 2018
  • Virtual currencies have emerged along with new technologies such as block chain, artificial intelligence (AI), and big data. This study examines the benefits of a security-enhanced block chain resulting from individual trading, decentralized from governments, as well as the problems associated with misuse of virtual currencies. Virtual currencies, due to its anonymity, is vulnerable to financial crimes, such as ransom-ware, fraud, drug trafficking, tax evasion and money laundering. Use of virtual currencies can facilitate criminals avoid detection from investigative agencies. Government regulatory policy continues to address these concerns, and the virtual currency exchange has also announced a self-regulation proposal. However, a fundamental solution remains necessary. The purpose of this paper is to investigate the problems regarding abuse of virtual currency and to identify a practical system for transactions involving virtual currencies. However, in order to promote transactions involving virtual currencies and to institutionalize a governance system, multilateral cooperation is required. Although the restricting the use of virtual currencies regarding minors and foreign trade, as well as the introduction of a real-name system are considered promising prospects, many problems remain. Virtual currency is not a simple digital item but a method of redesigning the function of money. Coordinated efforts are needed globally to be able to further activate the positive aspects concerning the use of virtual currencies.