• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.033 seconds

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

Effects of Short-Term Music Therapy in Fire Fighters with Post-Traumatic Stress Risk (외상 후 스트레스 위기 소방관에 대한 단기간 음악치료의 효과)

  • Shim, Gyu-Sik;Kim, Nam-Song;Bang, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4040-4047
    • /
    • 2015
  • The purpose of this study was to analyze a change in Post-traumatic Stress Disorder (PTSD) level and the continuity of the effects in music therapy by applying short-term music therapy program in fire fighters with Post-traumatic Stress (PTS). Forty two fire fighters in 3 districts were randomly assigned to experimental group (21 subjects) and control group (21 subjects). Music therapy was applied in totally 10 sessions by two sessions (120 minutes) a day for 5 days. PTS level was measured immediately after the end of program, after 4 weeks, and after 12 weeks. As a result, PTS level has significantly decreased into $8.90{\pm}4.55$ from $26.52{\pm}2.32$ right after the music therapy program(p<0.05). And the effect was shown to be continued significantly up to after 4 weeks($11.95{\pm}4.57$) and after 12 weeks($13.76{\pm}5.62$)(p<0.05). As a result of research, it is considered that the music therapy is effective approach for reduction in PTS as for fire fighters who belong to the group with high risk of PTSD. Accordingly, the application of regular program for managing fire fighters' mental health is understood to likely to contribute to enhancing the field service competence.

Analysis of Village Safety Index using Accessibility to Public Facilities (공공시설 접근성을 통한 마을단위 안전지수 분석)

  • Jeon, Jeongbae;Kim, Solhee;Suh, Kyo;Yoon, Seongsoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.121-129
    • /
    • 2016
  • A disaster can be defined in many ways based on perspectives, in addition, its types are able to classify differently by various standards. Considering the different perspectives, the disaster can be occurred by natural phenomenon that is like typhoon, earthquake, flood, and drought, and by the accident that is like collapse of facilities, traffic accidents, and environmental pollution, etc. Into the modern society, moreover, the disaster includes the damages by diffusion of epidemic and infectious disease in domestic animals. The disaster was defined by natural and man-made hazards in the past. As societies grew with changes of paradigm, social factors have been included in the concept of the disaster according to new types unexpected by new disease and scientific technology. Change the concept of social disasters, Ministry of Public Safety and Security (MPSS) has provided the regional safety index, which measures the safety level of a local government. However, this regional safety index has some limitation to use because this index provides the information for city unit which is a unit of administrative districts of urban. Since these administrative districts units are on a different level with urban and rural areas, the regional safety index provided by MPSS is not be able to direct apply to the rural areas. The purpose of this study is to determine the regional safety index targeting rural areas. To estimate the safety index, we was used for 3 indicators of the MPSS, a fire, a crime, and an infectious disease which are evaluable the regional safety index using an accessibility analysis. For determining the regional safety index using accessibility from community centers to public facilities, the safety index of fire, crime, and infectious disease used access time to fire station, police office, and medical facility, respectively. An integrated Cheongju, targeting areas in this study, is mixed region with urban and rural areas. The results of regional safety index about urban and rural areas, the safety index in rural area is relatively higher than in the urban. Neverthless the investment would be needed to improve the safety in the rural areas.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

A Study on Converting the Data of Probability of Hit(Ph) for OneSAF Model (OneSAF 모델을 위한 명중률 데이터 변환 방법)

  • Kim, Gun In;Kang, Tae Ho;Seo, Woo Duck;Pyun, Jae Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2020
  • To use the OneSAF model for the analysis of Defence M&S, the most critical factor is the acquisition of input data. The model user is hard to determine the input data such as the probability of hit(Ph) and the probability of kill(Pk). These data can be obtained directly by live fire during the development test and the operational test. Therefore, this needs more time and resources to get the Ph and Pk. In this paper, we reviewed possible ways to obtain the Ph and Pk. We introduced several data producing methodologies. In particular, the error budget method was presented to convert the Ph(%) data of AWAM model to the error(mil) data of OneSAF model. Also, the conversion method which can get the adjusted results from the JMEM is introduced. The probability of a hit was calculated based on the error budget method in order to prove the usefulness of the given method. More accurate data were obtained when the error budget method and the projected area from the published photo were used simultaneously. The importance of the Ph calculation was demonstrated by sensitivity analysis of the Ph on combat effectiveness. This paper emphasizes the importance of determining the Ph data and improving the reliability of the M&S system though steady collection and analysis of the Ph data.

Realization of a Web-based Distribution System for the Monitoring of Business Press Releases and News Gathering Robots (기업 보도자료 모니터링을 위한 웹기반 배포시스템 및 기사 수집로봇 구현)

  • Shin, Myeong-Sook;Oh, Jung-Jin;Lee, Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.103-111
    • /
    • 2013
  • At present, a variety of Korean news stories have been about important online content and its importance in the press is becoming higher. Diverse news from businesses are provided to the public as press releases through newspapers or broadcasting media. For such news to become information for a press release, enterprises visit reporters, use e-mails, faxes, or couriers to deliver the information. However, such methods have problems with time, human resources, expenses, and file damage. Also, with these methods it is bothersome for enterprises to check what has been released and for the press to make frequent contact with enterprises for interviews and for content to be released. Therefore, this study aimed to realize a distribution system which enterprises can use to distribute data to be released to the press and to easily check what is to be released while the press can ask for interview requests in a simple way, as well as a news gathering robot that can collects news on the enterprises involved from articles online or in portal sites.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Human Rights-based Approach toward International Development Cooperation and Canada's ODA Accountability Act (국제개발협력의 인권적 접근과 캐나다 ODA책무법)

  • Soh, Hyuk-Sang
    • International Area Studies Review
    • /
    • v.15 no.2
    • /
    • pp.403-425
    • /
    • 2011
  • Canada became the first OECD/DAC member state that legislated the ODA Accountability Act in 2008, which prescribe Canada ODA policies to meet the guidelines and norms of international human rights while other OECD/DAC member states was just emphasizing the importance of abiding by the international human rights norms. Paying attention to the Canadian case, this article critically examines under what structural environments and process this Act was passed. This article argues that the legislation of the ODA Accountability Act is closely related with Canada's international position as middle power and diplomatic strategies. Bring up the human security issues as a niche market, Canada demonstrates the characteristics of middle power state by emphasizing human rights agenda as new foreign policy strategies. Reflecting on the negative outcomes from neoliberal aid policy of structural adjustment and promoting the new aid norms in post cold war era would also help foster the enabling environment for the value-oriented aid policies and enactment of the Accountability Act. Civil society organizations were also playing catalyst role in constructing Canada's state identity of human rights defender.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.