• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.027 seconds

An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender (인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교)

  • Lim, Se-Hun;Lee, Sung-Ho;Kim, Dae-Kil
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

Efficient Image Chaotic Encryption Algorithm with No Propagation Error

  • Awad, Abir;Awad, Dounia
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.774-783
    • /
    • 2010
  • Many chaos-based encryption methods have been presented and discussed in the last two decades, but very few of them are suitable to secure transmission on noisy channels or respect the standard of the National Institute of Standards and Technology (NIST). This paper tackles the problem and presents a novel chaos-based cryptosystem for secure transmitted images. The proposed cryptosystem overcomes the drawbacks of existing chaotic algorithms such as the Socek, Xiang, Yang, and Wong methods. It takes advantage of the increasingly complex behavior of perturbed chaotic signals. The perturbing orbit technique improves the dynamic statistical properties of generated chaotic sequences, permits the proposed algorithm reaching higher performance, and avoids the problem of error propagation. Finally, many standard tools, such as NIST tests, are used to quantify the security level of the proposed cryptosystem, and experimental results prove that the suggested cryptosystem has a high security level, lower correlation coefficients, and improved entropy.

A Comparative Study on the Individual Personality and Intelligence for Criminal (개인의 성격과 지능이 범죄에 미치는 영향에 관한 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.309-336
    • /
    • 2004
  • Approximately equivalent to character disorder or character neuroses or behavioral reaction. For a discussion of the term as used currently, in the 1968 revision of psychiatric nomenclature(DSM-II). In DSM-I(1952 nomenclature), this term referred to those cases in which the personality, in its struggle for adjustment to internal and external stresses, utilized primarily a pattern of action or behavior rather than symptoms in the mental, somatic or emotional spheres. There is minimal subjective anxiety and little or no sense of distress. As thus defined, there are three main groups of personality disorder, personality pattern disturbance, personality trait disturbance and sociopathic, personality disturbance. Morton Prince asks whether a subconscious process can perform the same function as are ordinarily performed by conscious intelligence that is to say memory, perception, reasoning, imagination, volition, affectivity, etc? He cites clinical material at great length, concluding that the quality of the functions performed they frequently exhibit, that which is characteristic of intelligence.

  • PDF

The characteristics of traffic accidents and Its Counter-measures in Small-Medium City - With the case of Andong City - (중소도시 교통사고의 실태분석과 교통경찰의 대응전략 - 안동시를 중심으로)

  • Park, Dong-Kyun;Lee, Sang-Kwang
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.155-189
    • /
    • 2004
  • The mission of the police as described by law is to guard the life, body and property of all citizens. Such duties should be accurately performed based on legal and democratic procedures because the works of the police are directively influencing the overall lives of the citizens by restricting their freedom. We are frequently watching the traffic police on the street or road. Traffic policing aims to reduce crime and the opportunities for criminal activity in relation to the use of roads, that is to improve road user behavior in order to reduce accidents. The characteristics of traffic accident change is not similar in each traffic condition. The purpose of this study is to analysis a type characteristics of traffic accident change, such as number of deaths and wounded persons by the time, the vehicle, the type the road, the age group. Based on the characteristics of traffic accident change, traffic accident countermeasures are proposed, in which some variable of traffic policies such as traffic facilities, traffic regulation, and traffic safety education.

  • PDF

A Study of Research Issue about Behavior Extraction Technique for Evasive Malware (은닉형 악성코드 분석을 위한 행위 추출연구 동향)

  • Hwang, Ho;Moon, Dae-Sung;Kim, Ik-Kun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.193-195
    • /
    • 2016
  • 오늘날의 백신은 일반적으로 시그니처 기반 탐지법을 이용한다. 시그니처 탐지기법은 악성코드의 특정한 패턴을 비교하여 효율적이고 오탐율이 낮은 기법이다. 하지만 알려지지 않은 악성코드와 난독화 기법이 적용된 악성코드를 분석하는데 한계가 있다. 악성코드를 실행하여 나타나는 행위를 분석하는 동적분석 방법은 특정한 조건에서만 악성행위를 나타내는 은닉형 악성코드(Evasive Malware)를 탐지하는 데 한계를 지닌다. 본 논문에서는 은닉형 악성코드에 적용된 기법에 관하여 소개하고 나아가 이를 탐지하기 위한 방법에 관한 기술동향을 소개한다.

A Safety Analysis of Tunnel Lining for Monitoring (계측에 의한 터널 라이닝의 안전성 분석)

  • Woo, Jong-Tae;Lee, Song
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.6 no.3
    • /
    • pp.103-110
    • /
    • 2002
  • Maintenance monitoring of the tunnel which offers continuous data during and after tunneling has been applying to tunnels in order to meet the maintenance of tunnel and to confirm continuous security of the tunnel after tunneling. But, the maintenance monitoring of tunnel results for long period is not easy to find, and moreover, the rational analysis method on tunnel monitoring has not been established yet. In this study, the relationships between displacement and stress of the tunnel concrete lining using various analysis methods are compared with maintenance monitoring. The tunnel behavior were measured in the subway tunnel passing comparative soft the weathering and analyzed both security and mechanical characteristics of the tunnel concrete lining. Also, analyzed relationship between residual water pressure applied on tunnel design and one obtained by monitoring.

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.

Study of Machine Learning Method for Anormaly Detection Using Multivariate Gaussian Distribution in LPWA Network Environment (LPWA 네트워크 환경에서 다변량 가우스 분포를 활용하여 이상탐지를 위한 머신러닝 기법 연구)

  • Lee, Sangjin;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.309-311
    • /
    • 2017
  • With the recent development of the Internet (IoT) technology, we have come to a very connected society. This paper focuses on the security aspects that can occur within the LPWA Network environment of the Internet of things, and proposes a new machine learning method considering next generation IPS / IDS that can detect and block unexpected and unusual behavior of devices.

  • PDF

Numerical Analysis of Lightwave Modes in GRIN Optical Fibers by Using Eigenvalue (고유치를 이용한 GRIN 광섬유 내에서의 광파모드의 해석)

  • Sohn, Young-Ho
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.153-159
    • /
    • 2008
  • Graded-Index Multimode Optical fibers have recently received a lot of attention as regards their application and lightwave behavior in relation to broadband communication links. Accordingly, this aticle presents a novel lightwave mode analysis that solves the wave equation using a numerical analysis based on an eigenvalue problem method, thereby avoiding the typical complicated Bessel function method. Angular depedences and number of modes were observed as well. Future research implications will be possibly noticed such areas as bending effects and mode coupling analyses thru this research.

  • PDF